Forecasting Lightning Threat Using WRF Proxy Fields
NASA Technical Reports Server (NTRS)
McCaul, E. W., Jr.
2010-01-01
Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.
The ecology of human fear: survival optimization and the nervous system
Mobbs, Dean; Hagan, Cindy C.; Dalgleish, Tim; Silston, Brian; Prévost, Charlotte
2015-01-01
We propose a Survival Optimization System (SOS) to account for the strategies that humans and other animals use to defend against recurring and novel threats. The SOS attempts to merge ecological models that define a repertoire of contextually relevant threat induced survival behaviors with contemporary approaches to human affective science. We first propose that the goal of the nervous system is to reduce surprise and optimize actions by (i) predicting the sensory landscape by simulating possible encounters with threat and selecting the appropriate pre-encounter action and (ii) prevention strategies in which the organism manufactures safe environments. When a potential threat is encountered the (iii) threat orienting system is engaged to determine whether the organism ignores the stimulus or switches into a process of (iv) threat assessment, where the organism monitors the stimulus, weighs the threat value, predicts the actions of the threat, searches for safety, and guides behavioral actions crucial to directed escape. When under imminent attack, (v) defensive systems evoke fast reflexive indirect escape behaviors (i.e., fight or flight). This cascade of responses to threat of increasing magnitude are underwritten by an interconnected neural architecture that extends from cortical and hippocampal circuits, to attention, action and threat systems including the amygdala, striatum, and hard-wired defensive systems in the midbrain. The SOS also includes a modulatory feature consisting of cognitive appraisal systems that flexibly guide perception, risk and action. Moreover, personal and vicarious threat encounters fine-tune avoidance behaviors via model-based learning, with higher organisms bridging data to reduce face-to-face encounters with predators. Our model attempts to unify the divergent field of human affective science, proposing a highly integrated nervous system that has evolved to increase the organism's chances of survival. PMID:25852451
Lynn, Spencer K.; Zhang, Xuan; Barrett, Lisa Feldman
2012-01-01
Studies of the effect of affect on perception often show consistent directional effects of a person’s affective state on perception. Unpleasant emotions have been associated with a “locally focused” style of stimulus evaluation, and positive emotions with a “globally focused” style. Typically, however, studies of affect and perception have not been conducted under the conditions of perceptual uncertainty and behavioral risk inherent to perceptual judgments outside the laboratory. We investigated the influence of perceivers’ experience affect (valence and arousal) on the utility of social threat perception by combining signal detection theory and behavioral economics. We created three perceptual decision environments that systematically differed with respect to factors that underlie uncertainty and risk: the base rate of threat, the costs of incorrect identification threat, and the perceptual similarity of threats and non-threats. We found that no single affective state yielded the best performance on the threat perception task across the three environments. Unpleasant valence promoted calibration of response bias to base rate and costs, high arousal promoted calibration of perceptual sensitivity to perceptual similarity, and low arousal was associated with an optimal adjustment of bias to sensitivity. However, the strength of these associations was conditional upon the difficulty of attaining optimal bias and high sensitivity, such that the effect of the perceiver’s affective state on perception differed with the cause and/or level of uncertainty and risk. PMID:22251054
Lynn, Spencer K; Zhang, Xuan; Barrett, Lisa Feldman
2012-08-01
Studies of the effect of affect on perception often show consistent directional effects of a person's affective state on perception. Unpleasant emotions have been associated with a "locally focused" style of stimulus evaluation, and positive emotions with a "globally focused" style. Typically, however, studies of affect and perception have not been conducted under the conditions of perceptual uncertainty and behavioral risk inherent to perceptual judgments outside the laboratory. We investigated the influence of perceivers' experienced affect (valence and arousal) on the utility of social threat perception by combining signal detection theory and behavioral economics. We compared 3 perceptual decision environments that systematically differed with respect to factors that underlie uncertainty and risk: the base rate of threat, the costs of incorrect identification threat, and the perceptual similarity of threats and nonthreats. We found that no single affective state yielded the best performance on the threat perception task across the 3 environments. Unpleasant valence promoted calibration of response bias to base rate and costs, high arousal promoted calibration of perceptual sensitivity to perceptual similarity, and low arousal was associated with an optimal adjustment of bias to sensitivity. However, the strength of these associations was conditional upon the difficulty of attaining optimal bias and high sensitivity, such that the effect of the perceiver's affective state on perception differed with the cause and/or level of uncertainty and risk.
Zandara, Martina; Villada, Carolina; Hidalgo, Vanesa; Salvador, Alicia
2018-03-13
The feeling of stress is increasing in today's societies, particularly in young adults subjected to social evaluative situations in highly competitive academic and work contexts. Threat appraisal is a primary and fundamental reaction when people face a stressful situation. The aim of this study was to investigate the role of dispositional optimism as an antecedent and displacement behavior as a consequence of threat appraisal of a social-evaluative situation of stress. A second objective was to verify the moderating role of physiological responses to stress (heart rate and cortisol reactivity) in the relationship between threat appraisal and displacement behavior. To do this, we combined the Trier Social Stress Test (TSST) with ethological analysis, self-report questionnaires, and physiological data. As expected, people who scored higher on dispositional optimism perceived stress as less threatening, and a higher perception of threat was positively related to displacement behavior patterns. Moreover, the results showed that threat appraisal fully mediates the relationship between dispositional optimism and displacement behavior, and that only heart rate reactivity (not cortisol) moderates the relationship between threat appraisal and displacement behavior.
Optimization-based decision support to assist in logistics planning for hospital evacuations.
Glick, Roger; Bish, Douglas R; Agca, Esra
2013-01-01
The evacuation of the hospital is a very complex process and evacuation planning is an important part of a hospital's emergency management plan. There are numerous factors that affect the evacuation plan including the nature of threat, availability of resources and staff the characteristics of the evacuee population, and risk to patients and staff. The safety and health of patients is of fundamental importance, but safely moving patients to alternative care facilities while under threat is a very challenging task. This article describes the logistical issues and complexities involved in planning and execution of hospital evacuations. Furthermore, this article provides examples of how optimization-based decision support tools can help evacuation planners to better plan for complex evacuations by providing real-world solutions to various evacuation scenarios.
A systematic conservation planning approach to fire risk management in Natura 2000 sites.
Foresta, Massimiliano; Carranza, Maria Laura; Garfì, Vittorio; Di Febbraro, Mirko; Marchetti, Marco; Loy, Anna
2016-10-01
A primary challenge in conservation biology is to preserve the most representative biodiversity while simultaneously optimizing the efforts associated with conservation. In Europe, the implementation of the Natura 2000 network requires protocols to recognize and map threats to biodiversity and to identify specific mitigation actions. We propose a systematic conservation planning approach to optimize management actions against specific threats based on two fundamental parameters: biodiversity values and threat pressure. We used the conservation planning software Marxan to optimize a fire management plan in a Natura 2000 coastal network in southern Italy. We address three primary questions: i) Which areas are at high fire risk? ii) Which areas are the most valuable for threatened biodiversity? iii) Which areas should receive priority risk-mitigation actions for the optimal effect?, iv) which fire-prevention actions are feasible in the management areas?. The biodiversity values for the Natura 2000 spatial units were derived from the distribution maps of 18 habitats and 89 vertebrate species of concern in Europe (Habitat Directive 92/43/EEC). The threat pressure map, defined as fire probability, was obtained from digital layers of fire risk and of fire frequency. Marxan settings were defined as follows: a) planning units of 40 × 40 m, b) conservation features defined as all habitats and vertebrate species of European concern occurring in the study area, c) conservation targets defined according with fire sensitivity and extinction risk of conservation features, and d) costs determined as the complement of fire probabilities. We identified 23 management areas in which to concentrate efforts for the optimal reduction of fire-induced effects. Because traditional fire prevention is not feasible for most of policy habitats included in the management areas, alternative prevention practices were identified that allows the conservation of the vegetation structure. The proposed approach has potential applications for multiple landscapes, threats and spatial scales and could be extended to other valuable natural areas, including protected areas. Copyright © 2016 Elsevier Ltd. All rights reserved.
Scaling range sizes to threats for robust predictions of risks to biodiversity.
Keith, David A; Akçakaya, H Resit; Murray, Nicholas J
2018-04-01
Assessments of risk to biodiversity often rely on spatial distributions of species and ecosystems. Range-size metrics used extensively in these assessments, such as area of occupancy (AOO), are sensitive to measurement scale, prompting proposals to measure them at finer scales or at different scales based on the shape of the distribution or ecological characteristics of the biota. Despite its dominant role in red-list assessments for decades, appropriate spatial scales of AOO for predicting risks of species' extinction or ecosystem collapse remain untested and contentious. There are no quantitative evaluations of the scale-sensitivity of AOO as a predictor of risks, the relationship between optimal AOO scale and threat scale, or the effect of grid uncertainty. We used stochastic simulation models to explore risks to ecosystems and species with clustered, dispersed, and linear distribution patterns subject to regimes of threat events with different frequency and spatial extent. Area of occupancy was an accurate predictor of risk (0.81<|r|<0.98) and performed optimally when measured with grid cells 0.1-1.0 times the largest plausible area threatened by an event. Contrary to previous assertions, estimates of AOO at these relatively coarse scales were better predictors of risk than finer-scale estimates of AOO (e.g., when measurement cells are <1% of the area of the largest threat). The optimal scale depended on the spatial scales of threats more than the shape or size of biotic distributions. Although we found appreciable potential for grid-measurement errors, current IUCN guidelines for estimating AOO neutralize geometric uncertainty and incorporate effective scaling procedures for assessing risks posed by landscape-scale threats to species and ecosystems. © 2017 The Authors. Conservation Biology published by Wiley Periodicals, Inc. on behalf of Society for Conservation Biology.
Regional Value Analysis at Threat Evaluation
2014-06-01
targets based on information entropy and fuzzy optimization theory. in Industrial Engineering and Engineering Management (IEEM), 2011 IEEE...Assignment by Virtual Permutation and Tabu Search Heuristics. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 2010
Qu, Jianhua; Meng, Xianlin; You, Hong
2016-06-05
Due to the increasing number of unexpected water source pollution events, selection of the most appropriate disposal technology for a specific pollution scenario is of crucial importance to the security of urban water supplies. However, the formulation of the optimum option is considerably difficult owing to the substantial uncertainty of such accidents. In this research, a multi-stage technical screening and evaluation tool is proposed to determine the optimal technique scheme, considering the areas of pollutant elimination both in drinking water sources and water treatment plants. In stage 1, a CBR-based group decision tool was developed to screen available technologies for different scenarios. Then, the threat degree caused by the pollution was estimated in stage 2 using a threat evaluation system and was partitioned into four levels. For each threat level, a corresponding set of technique evaluation criteria weights was obtained using Group-G1. To identify the optimization alternatives corresponding to the different threat levels, an extension of TOPSIS, a multi-criteria interval-valued trapezoidal fuzzy decision making technique containing the four arrays of criteria weights, to a group decision environment was investigated in stage 3. The effectiveness of the developed tool was elaborated by two actual thallium-contaminated scenarios associated with different threat levels. Copyright © 2016 Elsevier B.V. All rights reserved.
Qu, Jianhua; Meng, Xianlin; Hu, Qi; You, Hong
2016-02-01
Sudden water source pollution resulting from hazardous materials has gradually become a major threat to the safety of the urban water supply. Over the past years, various treatment techniques have been proposed for the removal of the pollutants to minimize the threat of such pollutions. Given the diversity of techniques available, the current challenge is how to scientifically select the most desirable alternative for different threat degrees. Therefore, a novel two-stage evaluation system was developed based on a circulation-correction improved Group-G1 method to determine the optimal emergency treatment technology scheme, considering the areas of contaminant elimination in both drinking water sources and water treatment plants. In stage 1, the threat degree caused by the pollution was predicted using a threat evaluation index system and was subdivided into four levels. Then, a technique evaluation index system containing four sets of criteria weights was constructed in stage 2 to obtain the optimum treatment schemes corresponding to the different threat levels. The applicability of the established evaluation system was tested by a practical cadmium-contaminated accident that occurred in 2012. The results show this system capable of facilitating scientific analysis in the evaluation and selection of emergency treatment technologies for drinking water source security.
Meuter, Renata F I; Lacherez, Philippe F
2016-03-01
We aimed to assess the impact of task demands and individual characteristics on threat detection in baggage screeners. Airport security staff work under time constraints to ensure optimal threat detection. Understanding the impact of individual characteristics and task demands on performance is vital to ensure accurate threat detection. We examined threat detection in baggage screeners as a function of event rate (i.e., number of bags per minute) and time on task across 4 months. We measured performance in terms of the accuracy of detection of Fictitious Threat Items (FTIs) randomly superimposed on X-ray images of real passenger bags. Analyses of the percentage of correct FTI identifications (hits) show that longer shifts with high baggage throughput result in worse threat detection. Importantly, these significant performance decrements emerge within the first 10 min of these busy screening shifts only. Longer shift lengths, especially when combined with high baggage throughput, increase the likelihood that threats go undetected. Shorter shift rotations, although perhaps difficult to implement during busy screening periods, would ensure more consistently high vigilance in baggage screeners and, therefore, optimal threat detection and passenger safety. © 2015, Human Factors and Ergonomics Society.
Taber, Jennifer M; Klein, William M P; Ferrer, Rebecca A; Lewis, Katie L; Harris, Peter R; Shepperd, James A; Biesecker, Leslie G
2015-08-01
Information avoidance is a defensive strategy that undermines receipt of potentially beneficial but threatening health information and may especially occur when threat management resources are unavailable. We examined whether individual differences in information avoidance predicted intentions to receive genetic sequencing results for preventable and unpreventable (i.e., more threatening) disease and, secondarily, whether threat management resources of self-affirmation or optimism mitigated any effects. Participants (N = 493) in an NIH study (ClinSeq®) piloting the use of genome sequencing reported intentions to receive (optional) sequencing results and completed individual difference measures of information avoidance, self-affirmation, and optimism. Information avoidance tendencies corresponded with lower intentions to learn results, particularly for unpreventable diseases. The association was weaker among individuals higher in self-affirmation or optimism, but only for results regarding preventable diseases. Information avoidance tendencies may influence decisions to receive threatening health information; threat management resources hold promise for mitigating this association.
Design optimization of Cassegrain telescope for remote explosive trace detection
NASA Astrophysics Data System (ADS)
Bhavsar, Kaushalkumar; Eseller, K. E.; Prabhu, Radhakrishna
2017-10-01
The past three years have seen a global increase in explosive-based terror attacks. The widespread use of improvised explosives and anti-personnel landmines have caused thousands of civilian casualties across the world. Current scenario of globalized civilization threat from terror drives the need to improve the performance and capabilities of standoff explosive trace detection devices to be able to anticipate the threat from a safe distance to prevent explosions and save human lives. In recent years, laser-induced breakdown spectroscopy (LIBS) is an emerging approach for material or elemental investigations. All the principle elements on the surface are detectable in a single measurement using LIBS and hence, a standoff LIBS based method has been used to remotely detect explosive traces from several to tens of metres distance. The most important component of LIBS based standoff explosive trace detection system is the telescope which enables remote identification of chemical constituents of the explosives. However, in a compact LIBS system where Cassegrain telescope serves the purpose of laser beam delivery and light collection, need a design optimization of the telescope system. This paper reports design optimization of a Cassegrain telescope to detect explosives remotely for LIBS system. A design optimization of Schmidt corrector plate was carried out for Nd:YAG laser. Effect of different design parameters was investigated to eliminate spherical aberration in the system. Effect of different laser wavelengths on the Schmidt corrector design was also investigated for the standoff LIBS system.
Stich, Heribert; Guggemos, W; Mühlhaus, A; Wicklein, B; Dietl, J; Hoffmann, A; Leiwering, J; Frangoulidis, D; Zange, S; Königstein, B; Ippisch, S
2015-07-01
The International Health Regulations (IHR) 2005 were conformed to German law on July 20, 2007 and described in detail by the Implementing Act (IHR DG). According to these legal bases, "designated airports" must maintain special capacities for protection against health threats, and are also responsible for performing regular IHR exercises. Representation of the optimization of established operational concepts of various professions to manage infectious biological threats without obstruction of international travel, and mediation of experience to IHR professionals. An exercise based on the case scenario of a travel-related febrile illness was performed at Munich International Airport on November 11, 2013. Preparations took 6 months and the exercise itself lasted nearly 12 h. The follow-up lasted an additional 9 months. A qualitative and quantitative evaluation of the exercise was completed. From an Individual Medicine and Public Health perspective, modular work structures and risk communication functioned adequately. The medical examination of passengers was also well managed. Areas requiring further optimization included arrival/departure times of external actors, transport of the index patient to hospital and protective measures for individual participants. Overall, a defined biological threat scenario representing a double infection with two highly pathogenic germs was handled satisfactorily without affecting international air travel. Modular supply components are an effective and forward-looking means in protection against threats occurring at airports. Key success factors include sufficient staff mobility, immediate self-protection of actors involved, effective risk communication and a strong overall coordination and monitoring of the situation.
Levkovich, Inbar; Cohen, Miri; Pollack, Shimon; Drumea, Karen; Fried, Georgeta
2015-10-01
Symptoms of depression and cancer-related fatigue (CRF) are common among breast cancer patients postchemotherapy and may seriously impair quality of life (QoL). This study aimed to assess the relationship between depression and CRF in breast cancer patients postchemotherapy and to examine their relationships to optimism and to threat and challenge appraisals. Participants included 95 breast cancer patients (stages 1-3) 1 to 6 months after completion of chemotherapy. Patients submitted personal and medical details and completed the following: physical symptom questionnaires (EORTC QLQ-C30, and QLQ-BR23), a symptoms of depression questionnaire (CES-D), the Fatigue Symptom Inventory (FSI), the Life Orientation Test (LOT-R), and a stress appraisals questionnaire. We found levels of depression, CRF, and appraisals of cancer as a threat to bemoderate and levels of optimism and appraisals of cancer as a challenge to be high. Depression and CRF were positively associated. A multivariate regression analysis revealed that 51% of the CRF variancewas explained; physical symptoms and threat appraisal were significantly associated with CRF. A 67% of the CRF variance of depression was explained; challenge and threat appraisals were significantly associated with depression [corrected]. Although CRF and depression were often experienced simultaneously and both were found to be higher among individuals who gave higher appraisals of cancer as a threat, only depression was related to optimism and challenge appraisals, while CRF was related mainly to intensity of physical symptoms. The different pattern of associations between optimism and appraisals warrants further clinical attention as well as future study.
Cooperative path planning for multi-USV based on improved artificial bee colony algorithm
NASA Astrophysics Data System (ADS)
Cao, Lu; Chen, Qiwei
2018-03-01
Due to the complex constraints, more uncertain factors and critical real-time demand of path planning for multiple unmanned surface vehicle (multi-USV), an improved artificial bee colony (I-ABC) algorithm were proposed to solve the model of cooperative path planning for multi-USV. First the Voronoi diagram of battle field space is conceived to generate the optimal area of USVs paths. Then the chaotic searching algorithm is used to initialize the collection of paths, which is regard as foods of the ABC algorithm. With the limited data, the initial collection can search the optimal area of paths perfectly. Finally simulations of the multi-USV path planning under various threats have been carried out. Simulation results verify that the I-ABC algorithm can improve the diversity of nectar source and the convergence rate of algorithm. It can increase the adaptability of dynamic battlefield and unexpected threats for USV.
SECURITY MODELING FOR MARITIME PORT DEFENSE RESOURCE ALLOCATION
DOE Office of Scientific and Technical Information (OSTI.GOV)
Harris, S.; Dunn, D.
2010-09-07
Redeployment of existing law enforcement resources and optimal use of geographic terrain are examined for countering the threat of a maritime based small-vessel radiological or nuclear attack. The evaluation was based on modeling conducted by the Savannah River National Laboratory that involved the development of options for defensive resource allocation that can reduce the risk of a maritime based radiological or nuclear threat. A diverse range of potential attack scenarios has been assessed. As a result of identifying vulnerable pathways, effective countermeasures can be deployed using current resources. The modeling involved the use of the Automated Vulnerability Evaluation for Risksmore » of Terrorism (AVERT{reg_sign}) software to conduct computer based simulation modeling. The models provided estimates for the probability of encountering an adversary based on allocated resources including response boats, patrol boats and helicopters over various environmental conditions including day, night, rough seas and various traffic flow rates.« less
Time-to-impact estimation in passive missile warning systems
NASA Astrophysics Data System (ADS)
Şahıngıl, Mehmet Cihan
2017-05-01
A missile warning system can detect the incoming missile threat(s) and automatically cue the other Electronic Attack (EA) systems in the suit, such as Directed Infrared Counter Measure (DIRCM) system and/or Counter Measure Dispensing System (CMDS). Most missile warning systems are currently based on passive sensor technology operating in either Solar Blind Ultraviolet (SBUV) or Midwave Infrared (MWIR) bands on which there is an intensive emission from the exhaust plume of the threatening missile. Although passive missile warning systems have some clear advantages over pulse-Doppler radar (PDR) based active missile warning systems, they show poorer performance in terms of time-to-impact (TTI) estimation which is critical for optimizing the countermeasures and also "passive kill assessment". In this paper, we consider this problem, namely, TTI estimation from passive measurements and present a TTI estimation scheme which can be used in passive missile warning systems. Our problem formulation is based on Extended Kalman Filter (EKF). The algorithm uses the area parameter of the threat plume which is derived from the used image frame.
Effects of optimism on creativity under approach and avoidance motivation
Icekson, Tamar; Roskes, Marieke; Moran, Simone
2014-01-01
Focusing on avoiding failure or negative outcomes (avoidance motivation) can undermine creativity, due to cognitive (e.g., threat appraisals), affective (e.g., anxiety), and volitional processes (e.g., low intrinsic motivation). This can be problematic for people who are avoidance motivated by nature and in situations in which threats or potential losses are salient. Here, we review the relation between avoidance motivation and creativity, and the processes underlying this relation. We highlight the role of optimism as a potential remedy for the creativity undermining effects of avoidance motivation, due to its impact on the underlying processes. Optimism, expecting to succeed in achieving success or avoiding failure, may reduce negative effects of avoidance motivation, as it eases threat appraisals, anxiety, and disengagement—barriers playing a key role in undermining creativity. People experience these barriers more under avoidance than under approach motivation, and beneficial effects of optimism should therefore be more pronounced under avoidance than approach motivation. Moreover, due to their eagerness, approach motivated people may even be more prone to unrealistic over-optimism and its negative consequences. PMID:24616690
Navy Enhanced Sierra Mechanics (NESM): Toolbox for predicting Navy shock and damage
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moyer, Thomas; Stergiou, Jonathan; Reese, Garth
Here, the US Navy is developing a new suite of computational mechanics tools (Navy Enhanced Sierra Mechanics) for the prediction of ship response, damage, and shock environments transmitted to vital systems during threat weapon encounters. NESM includes fully coupled Euler-Lagrange solvers tailored to ship shock/damage predictions. NESM is optimized to support high-performance computing architectures, providing the physics-based ship response/threat weapon damage predictions needed to support the design and assessment of highly survivable ships. NESM is being employed to support current Navy ship design and acquisition programs while being further developed for future Navy fleet needs.
Navy Enhanced Sierra Mechanics (NESM): Toolbox for predicting Navy shock and damage
Moyer, Thomas; Stergiou, Jonathan; Reese, Garth; ...
2016-05-25
Here, the US Navy is developing a new suite of computational mechanics tools (Navy Enhanced Sierra Mechanics) for the prediction of ship response, damage, and shock environments transmitted to vital systems during threat weapon encounters. NESM includes fully coupled Euler-Lagrange solvers tailored to ship shock/damage predictions. NESM is optimized to support high-performance computing architectures, providing the physics-based ship response/threat weapon damage predictions needed to support the design and assessment of highly survivable ships. NESM is being employed to support current Navy ship design and acquisition programs while being further developed for future Navy fleet needs.
Reentry trajectory optimization based on a multistage pseudospectral method.
Zhao, Jiang; Zhou, Rui; Jin, Xuelian
2014-01-01
Of the many direct numerical methods, the pseudospectral method serves as an effective tool to solve the reentry trajectory optimization for hypersonic vehicles. However, the traditional pseudospectral method is time-consuming due to large number of discretization points. For the purpose of autonomous and adaptive reentry guidance, the research herein presents a multistage trajectory control strategy based on the pseudospectral method, capable of dealing with the unexpected situations in reentry flight. The strategy typically includes two subproblems: the trajectory estimation and trajectory refining. In each processing stage, the proposed method generates a specified range of trajectory with the transition of the flight state. The full glide trajectory consists of several optimal trajectory sequences. The newly focused geographic constraints in actual flight are discussed thereafter. Numerical examples of free-space flight, target transition flight, and threat avoidance flight are used to show the feasible application of multistage pseudospectral method in reentry trajectory optimization.
Reentry Trajectory Optimization Based on a Multistage Pseudospectral Method
Zhou, Rui; Jin, Xuelian
2014-01-01
Of the many direct numerical methods, the pseudospectral method serves as an effective tool to solve the reentry trajectory optimization for hypersonic vehicles. However, the traditional pseudospectral method is time-consuming due to large number of discretization points. For the purpose of autonomous and adaptive reentry guidance, the research herein presents a multistage trajectory control strategy based on the pseudospectral method, capable of dealing with the unexpected situations in reentry flight. The strategy typically includes two subproblems: the trajectory estimation and trajectory refining. In each processing stage, the proposed method generates a specified range of trajectory with the transition of the flight state. The full glide trajectory consists of several optimal trajectory sequences. The newly focused geographic constraints in actual flight are discussed thereafter. Numerical examples of free-space flight, target transition flight, and threat avoidance flight are used to show the feasible application of multistage pseudospectral method in reentry trajectory optimization. PMID:24574929
Are ranger patrols effective in reducing poaching-related threats within protected areas?
Moore, Jennnifer F.; Mulindahabi, Felix; Masozera, Michel K.; Nichols, James; Hines, James; Turikunkiko, Ezechiel; Oli, Madan K.
2018-01-01
Poaching is one of the greatest threats to wildlife conservation world-wide. However, the spatial and temporal patterns of poaching activities within protected areas, and the effectiveness of ranger patrols and ranger posts in mitigating these threats, are relatively unknown.We used 10 years (2006–2015) of ranger-based monitoring data and dynamic multi-season occupancy models to quantify poaching-related threats, to examine factors influencing the spatio-temporal dynamics of these threats and to test the efficiency of management actions to combat poaching in Nyungwe National Park (NNP), Rwanda.The probability of occurrence of poaching-related threats was highest at lower elevations (1,801–2,200 m), especially in areas that were close to roads and tourist trails; conversely, occurrence probability was lowest at high elevation sites (2,601–3,000 m), and near the park boundary and ranger posts. The number of ranger patrols substantially increased the probability that poaching-related threats disappear at a site if threats were originally present (i.e. probability of extinction of threats). Without ranger visits, the annual probability of extinction of poaching-related threats was an estimated 7%; this probability would increase to 20% and 57% with 20 and 50 ranger visits per year, respectively.Our results suggest that poaching-related threats can be effectively reduced in NNP by adding ranger posts in areas where they do not currently exist, and by increasing the number of patrols to sites where the probability of poaching activities is high.Synthesis and applications. Our application of dynamic occupancy models to predict the probability of presence of poaching-related threats is novel, and explicitly considers imperfect detection of illegal activities. Based on the modelled relationships, we identify areas that are most vulnerable to poaching, and offer insights regarding how ranger patrols can be optimally deployed to reduce poaching-related threats and other illegal activites, while taking into account potential sampling biases. We show that poaching can be effectively reduced by increasing ranger patrols to areas under high risk of poaching activities, and by adding ranger patrols near these sites. These findings are broadly applicable to national parks and protected areas experiencing a high degree of poaching and other illegal activities.
Finite Element Based Optimization of Material Parameters for Enhanced Ballistic Protection
NASA Astrophysics Data System (ADS)
Ramezani, Arash; Huber, Daniel; Rothe, Hendrik
2013-06-01
The threat imposed by terrorist attacks is a major hazard for military installations, vehicles and other items. The large amounts of firearms and projectiles that are available, pose serious threats to military forces and even civilian facilities. An important task for international research and development is to avert danger to life and limb. This work will evaluate the effect of modern armor with numerical simulations. It will also provide a brief overview of ballistic tests in order to offer some basic knowledge of the subject, serving as a basis for the comparison of simulation results. The objective of this work is to develop and improve the modern armor used in the security sector. Numerical simulations should replace the expensive ballistic tests and find vulnerabilities of items and structures. By progressively changing the material parameters, the armor is to be optimized. Using a sensitivity analysis, information regarding decisive variables is yielded and vulnerabilities are easily found and eliminated afterwards. To facilitate the simulation, advanced numerical techniques have been employed in the analyses.
SURVIVABILITY THROUGH OPTIMIZING RESILIENT MECHANISMS (STORM)
2017-04-01
STATEMENT Approved for Public Release; Distribution Unlimited. PA# 88ABW-2017-0894 Date Cleared: 07 Mar 2017 13. SUPPLEMENTARY NOTES 14. ABSTRACT Game ...quantitatively about cyber-attacks. Game theory is the branch of applied mathematics that formalizes strategic interaction among intelligent rational agents...mechanism based on game theory. This work has applied game theory to numerous cyber security problems: cloud security, cyber threat information sharing
UCAV path planning in the presence of radar-guided surface-to-air missile threats
NASA Astrophysics Data System (ADS)
Zeitz, Frederick H., III
This dissertation addresses the problem of path planning for unmanned combat aerial vehicles (UCAVs) in the presence of radar-guided surface-to-air missiles (SAMs). The radars, collocated with SAM launch sites, operate within the structure of an Integrated Air Defense System (IADS) that permits communication and cooperation between individual radars. The problem is formulated in the framework of the interaction between three sub-systems: the aircraft, the IADS, and the missile. The main features of this integrated model are: The aircraft radar cross section (RCS) depends explicitly on both the aspect and bank angles; hence, the RCS and aircraft dynamics are coupled. The probabilistic nature of IADS tracking is accounted for; namely, the probability that the aircraft has been continuously tracked by the IADS depends on the aircraft RCS and range from the perspective of each radar within the IADS. Finally, the requirement to maintain tracking prior to missile launch and during missile flyout are also modeled. Based on this model, the problem of UCAV path planning is formulated as a minimax optimal control problem, with the aircraft bank angle serving as control. Necessary conditions of optimality for this minimax problem are derived. Based on these necessary conditions, properties of the optimal paths are derived. These properties are used to discretize the dynamic optimization problem into a finite-dimensional, nonlinear programming problem that can be solved numerically. Properties of the optimal paths are also used to initialize the numerical procedure. A homotopy method is proposed to solve the finite-dimensional, nonlinear programming problem, and a heuristic method is proposed to improve the discretization during the homotopy process. Based upon the properties of numerical solutions, a method is proposed for parameterizing and storing information for later recall in flight to permit rapid replanning in response to changing threats. Illustrative examples are presented that confirm the standard flying tactics of "denying range, aspect, and aim," by yielding flight paths that "weave" to avoid long exposures of aspects with large RCS.
Biobehavioral Mechanisms of Mindfulness as a Treatment for Chronic Stress: An RDoC Perspective
Garland, Eric L.; Hanley, Adam W.; Baker, Anne K.; Howard, Matthew O.
2017-01-01
Mindfulness-based interventions have been heralded as promising means of alleviating chronic stress. While meta-analyses indicate that mindfulness-based interventions significantly reduce global measures of stress, how mindfulness-based interventions modulate the specific mechanisms underpinning chronic stress as operationalized by the National Institute of Mental Health research domain criteria (RDoC) of sustained threat has not yet been detailed in the literature. To address this knowledge gap, this article aims to (1) review evidence that mindfulness-based interventions ameliorate each of the 10 elements of behavioral dysregulation characterizing sustained threat via an array of mindful counter-regulatory strategies; (2) review evidence that mindfulness-based interventions modify biological domains implicated in sustained threat, such as the hypothalamic–pituitary–adrenal axis, as well as brain circuits involved in attentional function, limbic reactivity, habit behavior, and the default mode network; and (3) integrate these findings into a novel conceptual framework of mindful self-regulation in the face of stress—the Mindfulness-to-Meaning Theory. Taken together, the extant body of scientific evidence suggests that the practice of mindfulness enhances a range biobehavioral factors implicated in adaptive stress coping and induces self-referential plasticity, leading to the ability to find meaning in adversity. These mechanistic findings can inform the treatment development process to optimize the next generation of mindfulness-based interventions for greater therapeutic efficacy. PMID:28840198
An Optimal Mitigation Strategy Against the Asteroid Impact Threat with Short Warning Time
NASA Technical Reports Server (NTRS)
Wie, Bong; Barbee, Brent; Pitz, Alan; Kaplinger, Brian; Hawkins, Matt; Winkler, Tim; Premaratne, Pavithra; Vardaxis, George; Lyzhoft, Joshua; Zimmerman, Ben
2015-01-01
To develop an innovative yet practically implementable mitigation technique for the most probable impact threat of an asteroid or comet with short warning time (i.e., when we don't have sufficient warning times for a deflection mission).
Analyzing the Interdiction of Sea-Borne Threats Using Simulation Optimization
2007-03-01
Low Threat Interdiction Operations................... 56 Table 4-4: Resource Utilization under Medium Threat Interdiction Operations...1.1.1 Emerging Concern “Over 90 percent of the nation’s $5.3 billion annual investment in the TSA goes to aviation—to fight the last war.… While...using varying mission ops tempos for the interdiction model and the competing mission model. Specifically, we look at low, medium , and high asset
Optimal response to attacks on the open science grids.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Altunay, M.; Leyffer, S.; Linderoth, J. T.
2011-01-01
Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in themore » grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.« less
NASA Astrophysics Data System (ADS)
Grujicic, M.; Arakere, G.; Pandurangan, B.; Hariharan, A.; Yen, C.-F.; Cheeseman, B. A.
2011-02-01
To respond to the advent of more lethal threats, recently designed aluminum-armor-based military-vehicle systems have resorted to an increasing use of higher strength aluminum alloys (with superior ballistic resistance against armor piercing (AP) threats and with high vehicle-light weighing potential). Unfortunately, these alloys are not very amenable to conventional fusion-based welding technologies and in-order to obtain high-quality welds, solid-state joining technologies such as Friction stir welding (FSW) have to be employed. However, since FSW is a relatively new and fairly complex joining technology, its introduction into advanced military vehicle structures is not straight forward and entails a comprehensive multi-step approach. One such (three-step) approach is developed in the present work. Within the first step, experimental and computational techniques are utilized to determine the optimal tool design and the optimal FSW process parameters which result in maximal productivity of the joining process and the highest quality of the weld. Within the second step, techniques are developed for the identification and qualification of the optimal weld joint designs in different sections of a prototypical military vehicle structure. In the third step, problems associated with the fabrication of a sub-scale military vehicle test structure and the blast survivability of the structure are assessed. The results obtained and the lessons learned are used to judge the potential of the current approach in shortening the development time and in enhancing reliability and blast survivability of military vehicle structures.
Optimal Predator Risk Assessment by the Sonar-Jamming Arctiine Moth Bertholdia trigona
Corcoran, Aaron J.; Wagner, Ryan D.; Conner, William E.
2013-01-01
Nearly all animals face a tradeoff between seeking food and mates and avoiding predation. Optimal escape theory holds that an animal confronted with a predator should only flee when benefits of flight (increased survival) outweigh the costs (energetic costs, lost foraging time, etc.). We propose a model for prey risk assessment based on the predator's stage of attack. Risk level should increase rapidly from when the predator detects the prey to when it commits to the attack. We tested this hypothesis using a predator – the echolocating bat – whose active biosonar reveals its stage of attack. We used a prey defense – clicking used for sonar jamming by the tiger moth Bertholdia trigona– that can be readily studied in the field and laboratory and is enacted simultaneously with evasive flight. We predicted that prey employ defenses soon after being detected and targeted, and that prey defensive thresholds discriminate between legitimate predatory threats and false threats where a nearby prey is attacked. Laboratory and field experiments using playbacks of ultrasound signals and naturally behaving bats, respectively, confirmed our predictions. Moths clicked soon after bats detected and targeted them. Also, B. trigona clicking thresholds closely matched predicted optimal thresholds for discriminating legitimate and false predator threats for bats using search and approach phase echolocation – the period when bats are searching for and assessing prey. To our knowledge, this is the first quantitative study to correlate the sensory stimuli that trigger defensive behaviors with measurements of signals provided by predators during natural attacks in the field. We propose theoretical models for explaining prey risk assessment depending on the availability of cues that reveal a predator's stage of attack. PMID:23671686
NASA Astrophysics Data System (ADS)
Olsen, Jolie; Sen, Sandip
2014-04-01
Steven Brams's [(1994). Theory of moves. Cambridge University Press] Theory of Moves (TOM) is an alternative to traditional game theoretic treatment of real-life interactions, in which players choose strategies based on analysis of future moves and counter-moves that arise if game play commences at a specified start state and either player can choose to move first. In repeated play, players using TOM rationality arrive at nonmyopic equilibria. One advantage of TOM is its ability to model scenarios in which power asymmetries exist between players. In particular, threat power, i.e. the ability of one player to threaten and sustain immediate, globally disadvantageous outcomes to force a desirable result long term, can be utilised to induce Pareto optimal states in games such as Prisoner's Dilemma which result in Pareto-dominated outcomes using traditional methods. Unfortunately, prior work on TOM is limited by an assumption of complete information. This paper presents a mechanism that can be used by a player to utilise threat power when playing a strict, ordinal 2×2 game under incomplete information. We also analyse the benefits of threat power and support in this analysis with empirical evidence.
On the Effectiveness of Security Countermeasures for Critical Infrastructures.
Hausken, Kjell; He, Fei
2016-04-01
A game-theoretic model is developed where an infrastructure of N targets is protected against terrorism threats. An original threat score is determined by the terrorist's threat against each target and the government's inherent protection level and original protection. The final threat score is impacted by the government's additional protection. We investigate and verify the effectiveness of countermeasures using empirical data and two methods. The first is to estimate the model's parameter values to minimize the sum of the squared differences between the government's additional resource investment predicted by the model and the empirical data. The second is to develop a multivariate regression model where the final threat score varies approximately linearly relative to the original threat score, sectors, and threat scenarios, and depends nonlinearly on the additional resource investment. The model and method are offered as tools, and as a way of thinking, to determine optimal resource investments across vulnerable targets subject to terrorism threats. © 2014 Society for Risk Analysis.
Taming The Next Set of Strategic Weapons Threats
2006-06-01
Reactors Victor Gilinsky . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 6. Coping with Biological Threats after...Regime (MTCR) is not yet optimized to cope with these challenges. Finally, nuclear technologies have become much more difficult to control. New...resistance of the most popular type of power reactor concludes that the current international nuclear safeguards system needs to be modified to cope
An Ecosystem Evaluation Framework for Global Seamount Conservation and Management
Taranto, Gerald H.; Kvile, Kristina Ø.; Pitcher, Tony J.; Morato, Telmo
2012-01-01
In the last twenty years, several global targets for protection of marine biodiversity have been adopted but have failed. The Convention on Biological Diversity (CBD) aims at preserving 10% of all the marine biomes by 2020. For achieving this goal, ecologically or biologically significant areas (EBSA) have to be identified in all biogeographic regions. However, the methodologies for identifying the best suitable areas are still to be agreed. Here, we propose a framework for applying the CBD criteria to locate potential ecologically or biologically significant seamount areas based on the best information currently available. The framework combines the likelihood of a seamount constituting an EBSA and its level of human impact and can be used at global, regional and local scales. This methodology allows the classification of individual seamounts into four major portfolio conservation categories which can help optimize management efforts toward the protection of the most suitable areas. The framework was tested against 1000 dummy seamounts and satisfactorily assigned seamounts to proper EBSA and threats categories. Additionally, the framework was applied to eight case study seamounts that were included in three out of four portfolio categories: areas highly likely to be identified as EBSA with high degree of threat; areas highly likely to be EBSA with low degree of threat; and areas with a low likelihood of being EBSA with high degree of threat. This framework will allow managers to identify seamount EBSAs and to prioritize their policies in terms of protecting undisturbed areas, disturbed areas for recovery of habitats and species, or both based on their management objectives. It also identifies seamount EBSAs and threats considering different ecological groups in both pelagic and benthic communities. Therefore, this framework may represent an important tool to mitigate seamount biodiversity loss and to achieve the 2020 CBD goals. PMID:22905190
An ecosystem evaluation framework for global seamount conservation and management.
Taranto, Gerald H; Kvile, Kristina Ø; Pitcher, Tony J; Morato, Telmo
2012-01-01
In the last twenty years, several global targets for protection of marine biodiversity have been adopted but have failed. The Convention on Biological Diversity (CBD) aims at preserving 10% of all the marine biomes by 2020. For achieving this goal, ecologically or biologically significant areas (EBSA) have to be identified in all biogeographic regions. However, the methodologies for identifying the best suitable areas are still to be agreed. Here, we propose a framework for applying the CBD criteria to locate potential ecologically or biologically significant seamount areas based on the best information currently available. The framework combines the likelihood of a seamount constituting an EBSA and its level of human impact and can be used at global, regional and local scales. This methodology allows the classification of individual seamounts into four major portfolio conservation categories which can help optimize management efforts toward the protection of the most suitable areas. The framework was tested against 1000 dummy seamounts and satisfactorily assigned seamounts to proper EBSA and threats categories. Additionally, the framework was applied to eight case study seamounts that were included in three out of four portfolio categories: areas highly likely to be identified as EBSA with high degree of threat; areas highly likely to be EBSA with low degree of threat; and areas with a low likelihood of being EBSA with high degree of threat. This framework will allow managers to identify seamount EBSAs and to prioritize their policies in terms of protecting undisturbed areas, disturbed areas for recovery of habitats and species, or both based on their management objectives. It also identifies seamount EBSAs and threats considering different ecological groups in both pelagic and benthic communities. Therefore, this framework may represent an important tool to mitigate seamount biodiversity loss and to achieve the 2020 CBD goals.
An Optimal Mitigation Strategy Against the Asteroid Impact Threat with Short Warning Time
NASA Technical Reports Server (NTRS)
Wie, Bong; Barbee, Brent W.
2015-01-01
This paper presents the results of a NASA Innovative Advanced Concept (NIAC) Phase 2 study entitled "An Innovative Solution to NASA's Near-Earth Object (NEO) Impact Threat Mitigation Grand Challenge and Flight Validation Mission Architecture Development." This NIAC Phase 2 study was conducted at the Asteroid Deflection Research Center (ADRC) of Iowa State University in 2012-2014. The study objective was to develop an innovative yet practically implementable mitigation strategy for the most probable impact threat of an asteroid or comet with short warning time (less than 5 years). The mitigation strategy described in this paper is intended to optimally reduce the severity and catastrophic damage of the NEO impact event, especially when we don't have sufficient warning times for non-disruptive deflection of a hazardous NEO. This paper provides an executive summary of the NIAC Phase 2 study results.
Integrated development of light armored vehicles based on wargaming simulators
NASA Astrophysics Data System (ADS)
Palmarini, Marc; Rapanotti, John
2004-08-01
Vehicles are evolving into vehicle networks through improved sensors, computers and communications. Unless carefully planned, these complex systems can result in excessive crew workload and difficulty in optimizing the use of the vehicle. To overcome these problems, a war-gaming simulator is being developed as a common platform to integrate contributions from three different groups. The simulator, OneSAF, is used to integrate simplified models of technology and natural phenomena from scientists and engineers with tactics and doctrine from the military and analyzed in detail by operations analysts. This approach ensures the modelling of processes known to be important regardless of the level of information available about the system. Vehicle survivability can be improved as well with better sensors, computers and countermeasures to detect and avoid or destroy threats. To improve threat detection and reliability, Defensive Aids Suite (DAS) designs are based on three complementary sensor technologies including: acoustics, visible and infrared optics and radar. Both active armour and softkill countermeasures are considered. In a typical scenario, a search radar, providing continuous hemispherical coverage, detects and classifies the threat and cues a tracking radar. Data from the tracking radar is processed and an explosive grenade is launched to destroy or deflect the threat. The angle of attack and velocity from the search radar can be used by the soft-kill system to carry out an infrared search and track or an illuminated range-gated scan for the threat platform. Upon detection, obscuration, countermanoeuvres and counterfire can be used against the threat. The sensor suite is completed by acoustic detection of muzzle blast and shock waves. Automation and networking at the platoon level contribute to improved vehicle survivability. Sensor data fusion is essential in avoiding catastrophic failure of the DAS. The modular DAS components can be used with Light Armoured Vehicle (LAV) variants including: armoured personnel carriers and direct-fire support vehicles. OneSAF will be used to assess the performance of these DAS-equipped vehicles on a virtual battlefield.
Cornwell, Brian R.; Mueller, Sven C.; Kaplan, Raphael; Grillon, Christian; Ernst, Monique
2012-01-01
Anxiety is typically considered an impediment to cognition. We propose anxiety-related impairments in cognitive-behavioral performance are the consequences of enhanced stimulus-driven attention. Accordingly, reflexive, habitual behaviors that rely on stimulus-driven mechanisms should be facilitated in an anxious state, while novel, flexible behaviors that compete with the former should be impaired. To test these predictions, healthy adults (N=17) performed a mixed-saccade task, which pits habitual actions (pro-saccades) against atypical ones (anti-saccades), under anxiety-inducing threat of shock and safe conditions. Whole-head magnetoencephalography (MEG) captured oscillatory responses in the preparatory interval preceding target onset and saccade execution. Results showed threat-induced anxiety differentially impacted response times based on the type of saccade initiated, slowing anti-saccades but facilitating erroneous pro-saccades on anti-saccade trials. MEG source analyses revealed that successful suppression of reflexive pro-saccades and correct initiation of anti-saccades during threat was marked by increased theta power in right ventrolateral prefrontal cortical and midbrain regions (superior colliculi) implicated in stimulus-driven attention. Theta activity may delay stimulus-driven processes to enable generation of an anti-saccade. Moreover, compared to safety, threat reduced beta desynchronization in inferior parietal cortices during anti-saccade preparation but increased it during pro-saccade preparation. Differential effects in inferior parietal cortices indicate a greater readiness to execute anti-saccades during safety and to execute pro-saccades during threat. These findings suggest that, in an anxiety state, reduced cognitive-behavioral flexibility may stem from enhanced stimulus-driven attention, which may serve the adaptive function of optimizing threat detection. PMID:22289426
Context aware adaptive security service model
NASA Astrophysics Data System (ADS)
Tunia, Marcin A.
2015-09-01
Present systems and devices are usually protected against different threats concerning digital data processing. The protection mechanisms consume resources, which are either highly limited or intensively utilized by many entities. The optimization of these resources usage is advantageous. The resources that are saved performing optimization may be utilized by other mechanisms or may be sufficient for longer time. It is usually assumed that protection has to provide specific quality and attack resistance. By interpreting context situation of business services - users and services themselves, it is possible to adapt security services parameters to countermeasure threats associated with current situation. This approach leads to optimization of used resources and maintains sufficient security level. This paper presents architecture of adaptive security service, which is context-aware and exploits quality of context data issue.
Pittig, Andre; van den Berg, Linda; Vervliet, Bram
2016-01-01
Extinction learning is a major mechanism for fear reduction by means of exposure. Current research targets innovative strategies to enhance fear extinction and thereby optimize exposure-based treatments for anxiety disorders. This selective review updates novel behavioral strategies that may provide cutting-edge clinical implications. Recent studies provide further support for two types of enhancement strategies. Procedural enhancement strategies implemented during extinction training translate to how exposure exercises may be conducted to optimize fear extinction. These strategies mostly focus on a maximized violation of dysfunctional threat expectancies and on reducing context and stimulus specificity of extinction learning. Flanking enhancement strategies target periods before and after extinction training and inform optimal preparation and post-processing of exposure exercises. These flanking strategies focus on the enhancement of learning in general, memory (re-)consolidation, and memory retrieval. Behavioral strategies to enhance fear extinction may provide powerful clinical applications to further maximize the efficacy of exposure-based interventions. However, future replications, mechanistic examinations, and translational studies are warranted to verify long-term effects and naturalistic utility. Future directions also comprise the interplay of optimized fear extinction with (avoidance) behavior and motivational antecedents of exposure.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Diaz, Luis A.; Clark, Gemma G.; Lister, Tedd E.
The rapid growth of the electronic waste can be viewed both as an environmental threat and as an attractive source of minerals that can reduce the mining of natural resources, and stabilize the market of critical materials, such as rare earths. Here in this article surface response methodology was used to optimize a previously developed electrochemical recovery process for base metals from electronic waste using a mild oxidant (Fe 3+). Through this process an effective extraction of base metals can be achieved enriching the concentration of precious metals and significantly reducing environmental impacts and operational costs associated with the wastemore » generation and chemical consumption. The optimization was performed using a bench-scale system specifically designed for this process. Operational parameters such as flow rate, applied current density and iron concentration were optimized to reduce the specific energy consumption of the electrochemical recovery process to 1.94 kWh per kg of metal recovered at a processing rate of 3.3 g of electronic waste per hour.« less
Diaz, Luis A.; Clark, Gemma G.; Lister, Tedd E.
2017-06-08
The rapid growth of the electronic waste can be viewed both as an environmental threat and as an attractive source of minerals that can reduce the mining of natural resources, and stabilize the market of critical materials, such as rare earths. Here in this article surface response methodology was used to optimize a previously developed electrochemical recovery process for base metals from electronic waste using a mild oxidant (Fe 3+). Through this process an effective extraction of base metals can be achieved enriching the concentration of precious metals and significantly reducing environmental impacts and operational costs associated with the wastemore » generation and chemical consumption. The optimization was performed using a bench-scale system specifically designed for this process. Operational parameters such as flow rate, applied current density and iron concentration were optimized to reduce the specific energy consumption of the electrochemical recovery process to 1.94 kWh per kg of metal recovered at a processing rate of 3.3 g of electronic waste per hour.« less
O'Donnell, Sean T; Caldwell, Michael D; Barlaz, Morton A; Morris, Jeremy W F
2018-05-01
Municipal solid waste (MSW) landfills in the USA are regulated under Subtitle D of the Resource Conservation and Recovery Act (RCRA), which includes the requirement to protect human health and the environment (HHE) during the post-closure care (PCC) period. Several approaches have been published for assessment of potential threats to HHE. These approaches can be broadly divided into organic stabilization, which establishes an inert waste mass as the ultimate objective, and functional stability, which considers long-term emissions in the context of minimizing threats to HHE in the absence of active controls. The objective of this research was to conduct a case study evaluation of a closed MSW landfill using long-term data on landfill gas (LFG) production, leachate quality, site geology, and solids decomposition. Evaluations based on both functional and organic stability criteria were compared. The results showed that longer periods of LFG and leachate management would be required using organic stability criteria relative to an approach based on functional stability. These findings highlight the somewhat arbitrary and overly stringent nature of assigning universal stability criteria without due consideration of the landfill's hydrogeologic setting and potential environmental receptors. This supports previous studies that advocated for transition to a passive or inactive control stage based on a performance-based functional stability framework as a defensible mechanism for optimizing and ending regulatory PCC. Copyright © 2018 Elsevier Ltd. All rights reserved.
He, Han-Qing; Ling, Luo-Ya; Xu, Xu-Qing
2009-02-01
To know the status of Immunization program in Zhejiang Province. The investigation on immunization program in zhejiang province was conducted, and the SWOT analysis was corducted to make a comprehensive evaluation. 11 cities, 22 counties and 44 towns were investigated in this study, and the current immunization program in Zhejiang province were explored by SWOT analysis. The SWOT Matrix, includes SO (strength-opportunity), ST (strength-threat), WO (weakness-opportunity) and WT (weakness-threat) can apply to make optimal strategy for the development of expanded program on immunization.
Optimizing the interaction of children with information and communication technologies.
Straker, L; Pollock, C
2005-04-15
This paper outlines the major changes in the lives of children in industrially advanced countries associated with the increased interaction with information and communication technologies. The potential opportunities and threats to the cognitive, social, physical and visual development of children are reviewed to emphasize the importance of optimizing the interaction. The change in children's use of technology also poses opportunities and threats for ergonomics that should be noted if the profession is to continue being relevant and useful into this century. The paper ends with a pathway to the development and implementation of guidelines about child information and communication technology use for different groups of guideline users.
Rose, Jon
2012-01-01
Background/objective Developmental phases affect how individuals cope with and challenge threats to self-concept, health and functioning. Understanding prominent models of adult psychological development can help spinal cord injury/disease (SCI/D) rehabilitation professionals facilitate positive change and growth. Design Author's theoretical model informed by literature review and personal experience. Setting Veterans administration (VA) medical center interdisciplinary outpatient clinic providing primary and specialty care to veterans with spinal cord injuries and disorders. Conclusion Threats to life expectations, health, well-being, identity, and other aspects of self create crises that can result in psychopathology or psychological growth. SCI/D can present multiple threats across the lifespan. For example, self-image, ability to perform various activities, ability to feel attractive, and even life itself may be challenged by SCI/D or its complications. Threats may be perceived at the time of injury or onset of symptoms. Also, as the injured body declines further over time, complications can cause significant temporary or permanent functional decline. Individuals interpret each of these threats in the context of current developmental needs. How people cope is influenced by developmental factors and personality traits. An integrated model of adult psychological development based on the works of Erikson, Gutmann, and Baltes is related to the literature on coping with SCI/D. This model provides insights that interdisciplinary rehabilitation teams may use to facilitate personal growth, optimal functioning, and physical health as adults with SCI negotiate normal developmental challenges throughout their lifetimes. PMID:22507022
Roese, Neal J; Olson, James M
2007-06-01
Self-serving judgments, in which the self is viewed more favorably than other people, are ubiquitous. Their dynamic variation within individuals may be explained in terms of the regulation of affect. Self-serving judgments produce positive emotions, and threat increases self-serving judgments (a compensatory pattern that restores affect to a set point or baseline). Perceived mutability is a key moderator of these judgments; low mutability (i.e., the circumstance is closed to modification) triggers a cognitive response aimed at affect regulation, whereas high mutability (i.e., the circumstance is open to further modification) activates direct behavioral remediation. Threats often require immediate response, whereas positive events do not. Because of this brief temporal window, an active mechanism is needed to restore negative (but not positive) affective shifts back to a set point. Without this active reset, an earlier threat would make the individual less vigilant toward a new threat. Thus, when people are sad, they aim to return their mood to baseline, often via self-serving judgments. We argue that asymmetric homeostasis enables optimal vigilance, which establishes a coherent theoretical account of the role of self-serving judgments in affect regulation. © 2007 Association for Psychological Science.
Roese, Neal J.; Olson, James M.
2008-01-01
Self-serving judgments, in which the self is viewed more favorably than other people, are ubiquitous. Their dynamic variation within individuals may be explained in terms of the regulation of affect. Self-serving judgments produce positive emotions, and threat increases self-serving judgments (a compensatory pattern that restores affect to a set point or baseline). Perceived mutability is a key moderator of these judgments; low mutability (i.e., the circumstance is closed to modification) triggers a cognitive response aimed at affect regulation, whereas high mutability (i.e., the circumstance is open to further modification) activates direct behavioral remediation. Threats often require immediate response, whereas positive events do not. Because of this brief temporal window, an active mechanism is needed to restore negative (but not positive) affective shifts back to a set point. Without this active reset, an earlier threat would make the individual less vigilant toward a new threat. Thus, when people are sad, they aim to return their mood to baseline, often via self-serving judgments. We argue that asymmetric homeostasis enables optimal vigilance, which establishes a coherent theoretical account of the role of self-serving judgments in affect regulation. PMID:18552989
NASA Astrophysics Data System (ADS)
Price, Stanton R.; Murray, Bryce; Hu, Lequn; Anderson, Derek T.; Havens, Timothy C.; Luke, Robert H.; Keller, James M.
2016-05-01
A serious threat to civilians and soldiers is buried and above ground explosive hazards. The automatic detection of such threats is highly desired. Many methods exist for explosive hazard detection, e.g., hand-held based sensors, downward and forward looking vehicle mounted platforms, etc. In addition, multiple sensors are used to tackle this extreme problem, such as radar and infrared (IR) imagery. In this article, we explore the utility of feature and decision level fusion of learned features for forward looking explosive hazard detection in IR imagery. Specifically, we investigate different ways to fuse learned iECO features pre and post multiple kernel (MK) support vector machine (SVM) based classification. Three MK strategies are explored; fixed rule, heuristics and optimization-based. Performance is assessed in the context of receiver operating characteristic (ROC) curves on data from a U.S. Army test site that contains multiple target and clutter types, burial depths and times of day. Specifically, the results reveal two interesting things. First, the different MK strategies appear to indicate that the different iECO individuals are all more-or-less important and there is not a dominant feature. This is reinforcing as our hypothesis was that iECO provides different ways to approach target detection. Last, we observe that while optimization-based MK is mathematically appealing, i.e., it connects the learning of the fusion to the underlying classification problem we are trying to solve, it appears to be highly susceptible to over fitting and simpler, e.g., fixed rule and heuristics approaches help us realize more generalizable iECO solutions.
Cornwell, Brian R; Mueller, Sven C; Kaplan, Raphael; Grillon, Christian; Ernst, Monique
2012-04-01
Anxiety is typically considered an impediment to cognition. We propose anxiety-related impairments in cognitive-behavioral performance are the consequences of enhanced stimulus-driven attention. Accordingly, reflexive, habitual behaviors that rely on stimulus-driven mechanisms should be facilitated in an anxious state, while novel, flexible behaviors that compete with the former should be impaired. To test these predictions, healthy adults (N=17) performed a mixed-saccade task, which pits habitual actions (pro-saccades) against atypical ones (anti-saccades), under anxiety-inducing threat of shock and safe conditions. Whole-head magnetoencephalography (MEG) captured oscillatory responses in the preparatory interval preceding target onset and saccade execution. Results showed threat-induced anxiety differentially impacted response times based on the type of saccade initiated, slowing anti-saccades but facilitating erroneous pro-saccades on anti-saccade trials. MEG source analyses revealed that successful suppression of reflexive pro-saccades and correct initiation of anti-saccades during threat was marked by increased theta power in right ventrolateral prefrontal cortical and midbrain regions (superior colliculi) implicated in stimulus-driven attention. Theta activity may delay stimulus-driven processes to enable generation of an anti-saccade. Moreover, compared to safety, threat reduced beta desynchronization in inferior parietal cortices during anti-saccade preparation but increased it during pro-saccade preparation. Differential effects in inferior parietal cortices indicate a greater readiness to execute anti-saccades during safety and to execute pro-saccades during threat. These findings suggest that, in an anxiety state, reduced cognitive-behavioral flexibility may stem from enhanced stimulus-driven attention, which may serve the adaptive function of optimizing threat detection. Published by Elsevier Inc.
NASA Astrophysics Data System (ADS)
Şahingil, Mehmet C.; Aslan, Murat Š.
2013-10-01
Infrared guided missile seekers utilizing pulse width modulation in target tracking is one of the threats against air platforms. To be able to achieve a "soft-kill" protection of own platform against these type of threats, one needs to examine carefully the seeker operating principle with its special electronic counter-counter measure (ECCM) capability. One of the cost-effective ways of soft kill protection is to use flare decoys in accordance with an optimized dispensing program. Such an optimization requires a good understanding of the threat seeker, capabilities of the air platform and engagement scenario information between them. Modeling and simulation is very powerful tool to achieve a valuable insight and understand the underlying phenomenology. A careful interpretation of simulation results is crucial to infer valuable conclusions from the data. In such an interpretation there are lots of factors (features) which affect the results. Therefore, powerful statistical tools and pattern recognition algorithms are of special interest in the analysis. In this paper, we show how self-organizing maps (SOMs), which is one of those powerful tools, can be used in analyzing the effectiveness of various flare dispensing programs against a PWM seeker. We perform several Monte Carlo runs for a typical engagement scenario in a MATLAB-based simulation environment. In each run, we randomly change the flare dispending program and obtain corresponding class: "successful" or "unsuccessful", depending on whether the corresponding flare dispensing program deceives the seeker or not, respectively. Then, in the analysis phase, we use SOMs to interpret and visualize the results.
Collaborative Point Paper on Active Protection Systems
2006-10-01
for the Hunter VHP CIED Program. Also, General Dynamics Armament and Technical Products (GDATP), Burlington, VT is contracted by the Marine Corps...the incoming threat at a relatively long distance. Specific details about the composition and mechanism of this explosive interceptor device are...relatively thin shell of ballistic steel and composite armor, also known as hybrid armor, designed to provide optimal protection from specific threats
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lynn, R.Y.S.; Bolmarcich, J.J.
The purpose of this Memorandum is to propose a prototype procedure which the Office of Munitions might employ to exercise, in a supportive joint fashion, two of its High Level Conventional Munitions Models, namely, the OSD Threat Methodology and the Joint Munitions Assessment and Planning (JMAP) model. The joint application of JMAP and the OSD Threat Methodology provides a tool to optimize munitions stockpiles. The remainder of this Memorandum comprises five parts. The first is a description of the structure and use of the OSD Threat Methodology. The second is a description of JMAP and its use. The third discussesmore » the concept of the joint application of JMAP and OSD Threat Methodology. The fourth displays sample output of the joint application. The fifth is a summary and epilogue. Finally, three appendices contain details of the formulation, data, and computer code.« less
SPOT: Optimization Tool for Network Adaptable Security
NASA Astrophysics Data System (ADS)
Ksiezopolski, Bogdan; Szalachowski, Pawel; Kotulski, Zbigniew
Recently we have observed the growth of the intelligent application especially with its mobile character, called e-anything. The implementation of these applications provides guarantee of security requirements of the cryptographic protocols which are used in the application. Traditionally the protocols have been configured with the strongest possible security mechanisms. Unfortunately, when the application is used by means of the mobile devices, the strongest protection can lead to the denial of services for them. The solution of this problem is introducing the quality of protection models which will scale the protection level depending on the actual threat level. In this article we would like to introduce the application which manages the protection level of the processes in the mobile environment. The Security Protocol Optimizing Tool (SPOT) optimizes the cryptographic protocol and defines the protocol version appropriate to the actual threat level. In this article the architecture of the SPOT is presented with a detailed description of the included modules.
SVM-Based Synthetic Fingerprint Discrimination Algorithm and Quantitative Optimization Strategy
Chen, Suhang; Chang, Sheng; Huang, Qijun; He, Jin; Wang, Hao; Huang, Qiangui
2014-01-01
Synthetic fingerprints are a potential threat to automatic fingerprint identification systems (AFISs). In this paper, we propose an algorithm to discriminate synthetic fingerprints from real ones. First, four typical characteristic factors—the ridge distance features, global gray features, frequency feature and Harris Corner feature—are extracted. Then, a support vector machine (SVM) is used to distinguish synthetic fingerprints from real fingerprints. The experiments demonstrate that this method can achieve a recognition accuracy rate of over 98% for two discrete synthetic fingerprint databases as well as a mixed database. Furthermore, a performance factor that can evaluate the SVM's accuracy and efficiency is presented, and a quantitative optimization strategy is established for the first time. After the optimization of our synthetic fingerprint discrimination task, the polynomial kernel with a training sample proportion of 5% is the optimized value when the minimum accuracy requirement is 95%. The radial basis function (RBF) kernel with a training sample proportion of 15% is a more suitable choice when the minimum accuracy requirement is 98%. PMID:25347063
The alliance relationship analysis of international terrorist organizations with link prediction
NASA Astrophysics Data System (ADS)
Fang, Ling; Fang, Haiyang; Tian, Yanfang; Yang, Tinghong; Zhao, Jing
2017-09-01
Terrorism is a huge public hazard of the international community. Alliances of terrorist organizations may cause more serious threat to national security and world peace. Understanding alliances between global terrorist organizations will facilitate more effective anti-terrorism collaboration between governments. Based on publicly available data, this study constructed a alliance network between terrorist organizations and analyzed the alliance relationships with link prediction. We proposed a novel index based on optimal weighted fusion of six similarity indices, in which the optimal weight is calculated by genetic algorithm. Our experimental results showed that this algorithm could achieve better results on the networks than other algorithms. Using this method, we successfully digged out 21 real terrorist organizations alliance from current data. Our experiment shows that this approach used for terrorist organizations alliance mining is effective and this study is expected to benefit the form of a more powerful anti-terrorism strategy.
Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory.
Dutt, Varun; Ahn, Young-Suk; Gonzalez, Cleotilde
2013-06-01
To determine the effects of an adversary's behavior on the defender's accurate and timely detection of network threats. Cyber attacks cause major work disruption. It is important to understand how a defender's behavior (experience and tolerance to threats), as well as adversarial behavior (attack strategy), might impact the detection of threats. In this article, we use cognitive modeling to make predictions regarding these factors. Different model types representing a defender, based on Instance-Based Learning Theory (IBLT), faced different adversarial behaviors. A defender's model was defined by experience of threats: threat-prone (90% threats and 10% nonthreats) and nonthreat-prone (10% threats and 90% nonthreats); and different tolerance levels to threats: risk-averse (model declares a cyber attack after perceiving one threat out of eight total) and risk-seeking (model declares a cyber attack after perceiving seven threats out of eight total). Adversarial behavior is simulated by considering different attack strategies: patient (threats occur late) and impatient (threats occur early). For an impatient strategy, risk-averse models with threat-prone experiences show improved detection compared with risk-seeking models with nonthreat-prone experiences; however, the same is not true for a patient strategy. Based upon model predictions, a defender's prior threat experiences and his or her tolerance to threats are likely to predict detection accuracy; but considering the nature of adversarial behavior is also important. Decision-support tools that consider the role of a defender's experience and tolerance to threats along with the nature of adversarial behavior are likely to improve a defender's overall threat detection.
Optimal helicopter trajectory planning for terrain following flight
NASA Technical Reports Server (NTRS)
Menon, P. K. A.
1990-01-01
Helicopters operating in high threat areas have to fly close to the earth surface to minimize the risk of being detected by the adversaries. Techniques are presented for low altitude helicopter trajectory planning. These methods are based on optimal control theory and appear to be implementable onboard in realtime. Second order necessary conditions are obtained to provide a criterion for finding the optimal trajectory when more than one extremal passes through a given point. A second trajectory planning method incorporating a quadratic performance index is also discussed. Trajectory planning problem is formulated as a differential game. The objective is to synthesize optimal trajectories in the presence of an actively maneuvering adversary. Numerical methods for obtaining solutions to these problems are outlined. As an alternative to numerical method, feedback linearizing transformations are combined with the linear quadratic game results to synthesize explicit nonlinear feedback strategies for helicopter pursuit-evasion. Some of the trajectories generated from this research are evaluated on a six-degree-of-freedom helicopter simulation incorporating an advanced autopilot. The optimal trajectory planning methods presented are also useful for autonomous land vehicle guidance.
NASA Astrophysics Data System (ADS)
Thamvichai, Ratchaneekorn; Huang, Liang-Chih; Ashok, Amit; Gong, Qian; Coccarelli, David; Greenberg, Joel A.; Gehm, Michael E.; Neifeld, Mark A.
2017-05-01
We employ an adaptive measurement system, based on sequential hypotheses testing (SHT) framework, for detecting material-based threats using experimental data acquired on an X-ray experimental testbed system. This testbed employs 45-degree fan-beam geometry and 15 views over a 180-degree span to generate energy sensitive X-ray projection data. Using this testbed system, we acquire multiple view projection data for 200 bags. We consider an adaptive measurement design where the X-ray projection measurements are acquired in a sequential manner and the adaptation occurs through the choice of the optimal "next" source/view system parameter. Our analysis of such an adaptive measurement design using the experimental data demonstrates a 3x-7x reduction in the probability of error relative to a static measurement design. Here the static measurement design refers to the operational system baseline that corresponds to a sequential measurement using all the available sources/views. We also show that by using adaptive measurements it is possible to reduce the number of sources/views by nearly 50% compared a system that relies on static measurements.
Examining HPV threat-to-efficacy ratios in the Extended Parallel Process Model.
Carcioppolo, Nick; Jensen, Jakob D; Wilson, Steven R; Collins, W Bart; Carrion, Melissa; Linnemeier, Georgiann
2013-01-01
The Extended Parallel Process Model (EPPM) posits that an effective fear appeal includes both threat and efficacy components; however, research has not addressed whether there is an optimal threat-to-efficacy ratio. It is possible that varying levels of threat and efficacy in a persuasive message could yield different effects on attitudes, beliefs, and behaviors. In a laboratory experiment, women (n = 442) were exposed to human papilloma virus (HPV) prevention messages containing one of six threat-to-efficacy ratios and one of two message frames (messages emphasizing the connection between HPV and cervical cancer or HPV and genital warts). Multiple mediation analysis revealed that a 1-to-1 ratio of threat to efficacy was most effective at increasing prevention intentions, primarily because it caused more fear and risk susceptibility than other message ratios. Response efficacy significantly mediated the relationship between message framing and intentions, such that participants exposed to a genital warts message reported significantly higher intentions, and this association can be explained in part through response efficacy. Implications for future theoretical research as well as campaigns and intervention research are discussed.
Ben-Zur, Hasida; Zeidner, Moshe
2012-07-01
The present research focuses on gender differences in resource loss, perceived threat, and negative affective reactions induced by experimental manipulation of vicarious stress. Israeli students (54.7% women) were randomly allocated to one of two conditions: (1) Threat Condition (n=98), in which participants were exposed to a video film depicting terror attacks and (2) Control Condition (n=30), in which participants viewed a video film depicting a series of non-emotive news broadcasts. Participants also completed measures of mastery, optimism, and self-esteem. The data indicated that whereas under the Threat Condition women scored lower on psychological resources and higher on perceived threat than men, no significant gender differences were observed under the Control Condition. A path analysis revealed that gender was directly related to perceived threat and resource loss, which, in turn, were related to negative affect. In addition, a greater sense of mastery was related to lower resource loss. Overall, these experimental findings suggest that gender and mastery bear prominent effects on cognitive and emotional reactions to vicarious life threat.
2017-12-01
poses a threat to regional security and economic stability—major U.S. national interests. Distributed maritime capability is demonstrated by applying...regional security, economic stability, fisheries enforcement 15. NUMBER OF PAGES 95 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT...a dominant aggressor in the South China Sea that poses a threat to regional security and economic stability—major U.S. national interests
Optimizing Targeting of Intrusion Detection Systems in Social Networks
NASA Astrophysics Data System (ADS)
Puzis, Rami; Tubi, Meytal; Elovici, Yuval
Internet users communicate with each other in various ways: by Emails, instant messaging, social networking, accessing Web sites, etc. In the course of communicating, users may unintentionally copy files contaminated with computer viruses and worms [1, 2] to their computers and spread them to other users [3]. (Hereafter we will use the term "threats", rather than computer viruses and computer worms). The Internet is the chief source of these threats [4].
NASA Astrophysics Data System (ADS)
Chapman, George B.; Johnson, Glenn; Burdick, Robert
1991-09-01
The CounterMeasure Association Technique (CMAT) is discussed which was developed for the Air Force, and is used to automatically recommend countermeasure and maneuver response to a pilot while he is under missile attack. The overall system is discussed, as well as several key technical components. These components include use of fuzzy sets to specify data uncertainty, use of mimic nets to train the CMAT algorithm to make the same resource optimization tradeoffs as made in a data base of library of training scenarios, and use of several data compression techniques to store the countermeasure effectiveness data base.
Riccardo, Flavia; Shigematsu, Mika; Chow, Catherine; McKnight, C Jason; Linge, Jens; Doherty, Brian; Dente, Maria Grazia; Declich, Silvia; Barker, Mike; Barboza, Philippe; Vaillant, Laetitia; Donachie, Alastair; Mawudeku, Abla; Blench, Michael; Arthur, Ray
2014-01-01
The Early Alerting and Reporting (EAR) project, launched in 2008, is aimed at improving global early alerting and risk assessment and evaluating the feasibility and opportunity of integrating the analysis of biological, chemical, radionuclear (CBRN), and pandemic influenza threats. At a time when no international collaborations existed in the field of event-based surveillance, EAR's innovative approach involved both epidemic intelligence experts and internet-based biosurveillance system providers in the framework of an international collaboration called the Global Health Security Initiative, which involved the ministries of health of the G7 countries and Mexico, the World Health Organization, and the European Commission. The EAR project pooled data from 7 major internet-based biosurveillance systems onto a common portal that was progressively optimized for biological threat detection under the guidance of epidemic intelligence experts from public health institutions in Canada, the European Centre for Disease Prevention and Control, France, Germany, Italy, Japan, the United Kingdom, and the United States. The group became the first end users of the EAR portal, constituting a network of analysts working with a common standard operating procedure and risk assessment tools on a rotation basis to constantly screen and assess public information on the web for events that could suggest an intentional release of biological agents. Following the first 2-year pilot phase, the EAR project was tested in its capacity to monitor biological threats, proving that its working model was feasible and demonstrating the high commitment of the countries and international institutions involved. During the testing period, analysts using the EAR platform did not miss intentional events of a biological nature and did not issue false alarms. Through the findings of this initial assessment, this article provides insights into how the field of epidemic intelligence can advance through an international network and, more specifically, how it was further developed in the EAR project.
Shigematsu, Mika; Chow, Catherine; McKnight, C. Jason; Linge, Jens; Doherty, Brian; Dente, Maria Grazia; Declich, Silvia; Barker, Mike; Barboza, Philippe; Vaillant, Laetitia; Donachie, Alastair; Mawudeku, Abla; Blench, Michael; Arthur, Ray
2014-01-01
The Early Alerting and Reporting (EAR) project, launched in 2008, is aimed at improving global early alerting and risk assessment and evaluating the feasibility and opportunity of integrating the analysis of biological, chemical, radionuclear (CBRN), and pandemic influenza threats. At a time when no international collaborations existed in the field of event-based surveillance, EAR's innovative approach involved both epidemic intelligence experts and internet-based biosurveillance system providers in the framework of an international collaboration called the Global Health Security Initiative, which involved the ministries of health of the G7 countries and Mexico, the World Health Organization, and the European Commission. The EAR project pooled data from 7 major internet-based biosurveillance systems onto a common portal that was progressively optimized for biological threat detection under the guidance of epidemic intelligence experts from public health institutions in Canada, the European Centre for Disease Prevention and Control, France, Germany, Italy, Japan, the United Kingdom, and the United States. The group became the first end users of the EAR portal, constituting a network of analysts working with a common standard operating procedure and risk assessment tools on a rotation basis to constantly screen and assess public information on the web for events that could suggest an intentional release of biological agents. Following the first 2-year pilot phase, the EAR project was tested in its capacity to monitor biological threats, proving that its working model was feasible and demonstrating the high commitment of the countries and international institutions involved. During the testing period, analysts using the EAR platform did not miss intentional events of a biological nature and did not issue false alarms. Through the findings of this initial assessment, this article provides insights into how the field of epidemic intelligence can advance through an international network and, more specifically, how it was further developed in the EAR project. PMID:25470464
Gap Analysis and Conservation Network for Freshwater Wetlands in Central Yangtze Ecoregion
Xiaowen, Li; Haijin, Zhuge; Li, Mengdi
2013-01-01
The Central Yangtze Ecoregion contains a large area of internationally important freshwater wetlands and supports a huge number of endangered waterbirds; however, these unique wetlands and the biodiversity they support are under the constant threats of human development pressures, and the prevailing conservation strategies generated based on the local scale cannot adequately be used as guidelines for ecoregion-based conservation initiatives for Central Yangtze at the broad scale. This paper aims at establishing and optimizing an ecological network for freshwater wetland conservation in the Central Yangtze Ecoregion based on large-scale gap analysis. A group of focal species and GIS-based extrapolation technique were employed to identify the potential habitats and conservation gaps, and the optimized conservation network was then established by combining existing protective system and identified conservation gaps. Our results show that only 23.49% of the potential habitats of the focal species have been included in the existing nature reserves in the Central Yangtze Ecoregion. To effectively conserve over 80% of the potential habitats for the focal species by optimizing the existing conservation network for the freshwater wetlands in Central Yangtze Ecoregion, it is necessary to establish new wetland nature reserves in 22 county units across Hubei, Anhui, and Jiangxi provinces. PMID:24062632
Gap analysis and conservation network for freshwater wetlands in Central Yangtze Ecoregion.
Xiaowen, Li; Haijin, Zhuge; Li, Mengdi
2013-01-01
The Central Yangtze Ecoregion contains a large area of internationally important freshwater wetlands and supports a huge number of endangered waterbirds; however, these unique wetlands and the biodiversity they support are under the constant threats of human development pressures, and the prevailing conservation strategies generated based on the local scale cannot adequately be used as guidelines for ecoregion-based conservation initiatives for Central Yangtze at the broad scale. This paper aims at establishing and optimizing an ecological network for freshwater wetland conservation in the Central Yangtze Ecoregion based on large-scale gap analysis. A group of focal species and GIS-based extrapolation technique were employed to identify the potential habitats and conservation gaps, and the optimized conservation network was then established by combining existing protective system and identified conservation gaps. Our results show that only 23.49% of the potential habitats of the focal species have been included in the existing nature reserves in the Central Yangtze Ecoregion. To effectively conserve over 80% of the potential habitats for the focal species by optimizing the existing conservation network for the freshwater wetlands in Central Yangtze Ecoregion, it is necessary to establish new wetland nature reserves in 22 county units across Hubei, Anhui, and Jiangxi provinces.
Sachweh, A; von Kodolitsch, Y; Kölbel, T; Larena-Avellaneda, A; Wipper, S; Bernhardt, A M; Girdauskas, E; Detter, C; Reichenspurner, H; Blankart, C R; Debus, E S
2017-01-01
Guidelines summarize medical evidence, they identify the most efficient therapy under study conditions and recommend this therapy for use. The physician now has the challenge to translate a therapy that is efficient under laboratory conditions to a patient who is an individual person. To accomplish this task the physician has to make sure that (I) the ideal typical therapy is applicable and effective in this individual patient taking the special features into consideration, that (II) therapy is compliant with the norm including guidelines, laws and ethical requirements (conformity) and that (III) the therapy meets the patient's needs. How can physicians together with the patients translate the medical evidence into an individually optimized therapy? At the German Aortic Center in Hamburg we use I‑SWOT as an instrument to identify such individually optimized therapy. With I‑SWOT, we present an instrument with which we have developed an (I) efficient, (II) conform and (III) needs-oriented therapeutic strategy for individual patients. I-SWOT cross-tabulates strengths (S) and weaknesses (W) related to therapy with opportunities (O) and threats (T) related to individual patients. This I‑SWOT matrix identifies four fundamental types of strategy, which comprise "SO" maximizing strengths and opportunities, "WT" minimizing weaknesses and threats, "WO" minimizing weaknesses and maximizing opportunities and "ST" maximizing strengths and minimizing threats. We discuss the case of a patient with asymptomatic thoracoabdominal aneurysm to show how I‑SWOT is used to identify an individually optimized therapy strategy.
NASA Astrophysics Data System (ADS)
Blasch, Erik; Kadar, Ivan; Hintz, Kenneth; Biermann, Joachim; Chong, Chee-Yee; Salerno, John; Das, Subrata
2007-04-01
Resource management (or process refinement) is critical for information fusion operations in that users, sensors, and platforms need to be informed, based on mission needs, on how to collect, process, and exploit data. To meet these growing concerns, a panel session was conducted at the International Society of Information Fusion Conference in 2006 to discuss the various issues surrounding the interaction of Resource Management with Level 2/3 Situation and Threat Assessment. This paper briefly consolidates the discussion of the invited panel panelists. The common themes include: (1) Addressing the user in system management, sensor control, and knowledge based information collection (2) Determining a standard set of fusion metrics for optimization and evaluation based on the application (3) Allowing dynamic and adaptive updating to deliver timely information needs and information rates (4) Optimizing the joint objective functions at all information fusion levels based on decision-theoretic analysis (5) Providing constraints from distributed resource mission planning and scheduling; and (6) Defining L2/3 situation entity definitions for knowledge discovery, modeling, and information projection
NASA Astrophysics Data System (ADS)
Zheng, Kuan; Liu, Jun; Zhang, Jin-fang; Hao, Weihua
2017-01-01
A large number of combustion of coal is easy to lead to the haze weather which has brought a lot of inconveniences and threat to people’s living and health in E&C China, as the dominant power source of China, the coal-fired power generation is one of the main sources to the haze. In this paper, the contribution of the combustion of coal and development of coal-fired power generation to the PM2.5 emissions is summarized based on the analysis of the present situation, the mechanism and the emission source of PM2.5. Considering the peak of carbon emissions and the constraints of atmospheric environment, the quantitative assessment method of PM2.5 by optimizing the development of coal-fired power generation is present. By the computation analysis for different scenarios, it indicates that the optimization scenario, which means the main new-installed coal-fired power generation is distributed in western and northern China, can prevent the PM2.5 effectively for both the load center and coal base regions of China. The results of this paper not only have reference value for the optimized layout of coal-fired power generation in the “13rd fifth-year” power planning, also is of great significance to deal with problems that the atmospheric pollution and climate warming in the future.
A combined emitter threat assessment method based on ICW-RCM
NASA Astrophysics Data System (ADS)
Zhang, Ying; Wang, Hongwei; Guo, Xiaotao; Wang, Yubing
2017-08-01
Considering that the tradition al emitter threat assessment methods are difficult to intuitively reflect the degree of target threaten and the deficiency of real-time and complexity, on the basis of radar chart method(RCM), an algorithm of emitter combined threat assessment based on ICW-RCM (improved combination weighting method, ICW) is proposed. The coarse sorting is integrated with fine sorting in emitter combined threat assessment, sequencing the emitter threat level roughly accordance to radar operation mode, and reducing task priority of the low-threat emitter; On the basis of ICW-RCM, sequencing the same radar operation mode emitter roughly, finally, obtain the results of emitter threat assessment through coarse and fine sorting. Simulation analyses show the correctness and effectiveness of this algorithm. Comparing with classical method of emitter threat assessment based on CW-RCM, the algorithm is visual in image and can work quickly with lower complexity.
Reactivity to unpredictable threat as a treatment target for fear-based anxiety disorders.
Gorka, S M; Lieberman, L; Klumpp, H; Kinney, K L; Kennedy, A E; Ajilore, O; Francis, J; Duffecy, J; Craske, M G; Nathan, J; Langenecker, S; Shankman, S A; Phan, K L
2017-10-01
Heightened reactivity to unpredictable threat (U-threat) is a core individual difference factor underlying fear-based psychopathology. Little is known, however, about whether reactivity to U-threat is a stable marker of fear-based psychopathology or if it is malleable to treatment. The aim of the current study was to address this question by examining differences in reactivity to U-threat within patients before and after 12-weeks of selective serotonin reuptake inhibitors (SSRIs) or cognitive-behavioral therapy (CBT). Participants included patients with principal fear (n = 22) and distress/misery disorders (n = 29), and a group of healthy controls (n = 21) assessed 12-weeks apart. A well-validated threat-of-shock task was used to probe reactivity to predictable (P-) and U-threat and startle eyeblink magnitude was recorded as an index of defensive responding. Across both assessments, individuals with fear-based disorders displayed greater startle magnitude to U-threat relative to healthy controls and distress/misery patients (who did not differ). From pre- to post-treatment, startle magnitude during U-threat decreased only within the fear patients who received CBT. Moreover, within fear patients, the magnitude of decline in startle to U-threat correlated with the magnitude of decline in fear symptoms. For the healthy controls, startle to U-threat across the two time points was highly reliable and stable. Together, these results indicate that startle to U-threat characterizes fear disorder patients and is malleable to treatment with CBT but not SSRIs within fear patients. Startle to U-threat may therefore reflect an objective, psychophysiological indicator of fear disorder status and CBT treatment response.
Buffers or Boosters? The Role of HRM Practices in Older Workers' Experience of Stereotype Threat.
Oliveira, Eduardo André da Silva; Cabral-Cardoso, Carlos José
2018-01-02
Building on the social identity approach and the HRM literature, this two-wave cross-sectional study examined the effects of negative age-based metastereotypes on the age-based stereotype threat experience of older workers and on organizational disidentification. The moderator role of HRM practices in the relationship between negative age-based metastereotypes and age-based stereotype threat was also investigated. Older workers survey results (n = 469) from 14 manufacturing companies indicated that negative age-based metastereotypes correlate positively with stereotype threat. Moderation results showed that age-awareness HRM practices (training for older workers) reinforced age-based stereotype threat, whereas general HRM practices (recognition and respect) impaired it. The article suggests that the combination of age-based metastereotypes with a stereotype threat framework contributes to further understand older workers' beliefs and attitudes. It also indicates that to be effective, HRM practices should emphasize positive social identities older workers share with their colleagues, rather than giving older workers special treatment that may, after all, reinforce stigmatization.
Self-esteem and optimism in men and women infected with HIV.
Anderson, E H
2000-01-01
Self-esteem and optimism have been associated with appraisal and outcomes in a variety of situations. The degree to which the contribution of self-esteem and optimism to outcomes over time is accounted for by the differences in threat (primary) or resource (secondary) appraisal has not been established in persons with human immunodeficiency virus (HIV). To examine the longitudinal relationship of personality (self-esteem and optimism) on primary and secondary appraisal and outcomes of well-being, mood, CD4+ T-lymphocyte count, and selected activities. Men (n = 56) and women (n = 42) infected with HIV completed eight self-report measures twice over 18 months. Hierarchical Multiple Regressions were used to examine the relationship of personality variables on appraisals and outcomes. The mediating effects of primary and secondary appraisals were explored. Self-esteem uniquely accounted for 6% of the variance in primary appraisal and 5% in secondary appraisal. Optimism accounted for 8% of the unique variance in secondary appraisal. Primary and secondary appraisal mediated differently between personality and outcome variables. A strong predictor of well-being, mood disturbance, and activity disruption at Time 2 was participants' initial level of these variables. Socioeconomic status was a strong predictor of mood. Self-esteem and optimism are important but different resources for adapting to HIV disease. Strategies for reducing threats and increasing resources associated with HIV may improve an individual's mood and sense of well-being.
A key to success: optimizing the planning process
NASA Astrophysics Data System (ADS)
Turk, Huseyin; Karakaya, Kamil
2014-05-01
By adopting The NATO Strategic Concept Document in 2010, some important changes in the perception of threat and management of crisis were introduced. This new concept, named ''Comprehensive Approach'', includes the precautions of pre-crisis management, applications of crisis-duration management and reconstruction phase of post-intervention management. NATO will be interested in not only the political and military options , but also social, economical and informational aspects of crisis. NATO will take place in all phases of conflict. The conflicts which occur outside the borders of NATO's nations and terrorism are perceived as threat sources for peace and stability. In addition to conventional threats, cyber attacks which threaten network-supported communication systems, preventing applications from accessing to space that will be used in different fields of life. On the other hand, electronic warfare capabilities which can effect us negatively are added to threat list as new threats. In the process in which military is thought as option, a harder planning phase is waiting for NATO's decision makers who struggle for keeping peace and security. Operation planning process which depends on comprehensive approach, contains these steps: Situational awareness of battlefield, evaluation of the military intervention options, orientation, developing an operation plan, reviewing the plan and transition phases.1 To be successful in theater which is always changing with the technological advances, there has to be an accurate and timely planning on the table. So, spending time for planning can be shown as one of the biggest problem. In addition, sustaining situational awareness which is important for the whole operation planning process, technical command and control hitches, human factor, inability to determine the center of gravity of opponent in asymmetrical threat situations can be described as some of the difficulties in operation planning. In this study, a possible air operation planning process is analyzed according to a comprehensive approach. The difficulties of planning are identified. Consequently, for optimizing a decisionmaking process of an air operation, a planning process is identified in a virtual command and control structure.
Automated recognition and tracking of aerosol threat plumes with an IR camera pod
NASA Astrophysics Data System (ADS)
Fauth, Ryan; Powell, Christopher; Gruber, Thomas; Clapp, Dan
2012-06-01
Protection of fixed sites from chemical, biological, or radiological aerosol plume attacks depends on early warning so that there is time to take mitigating actions. Early warning requires continuous, autonomous, and rapid coverage of large surrounding areas; however, this must be done at an affordable cost. Once a potential threat plume is detected though, a different type of sensor (e.g., a more expensive, slower sensor) may be cued for identification purposes, but the problem is to quickly identify all of the potential threats around the fixed site of interest. To address this problem of low cost, persistent, wide area surveillance, an IR camera pod and multi-image stitching and processing algorithms have been developed for automatic recognition and tracking of aerosol plumes. A rugged, modular, static pod design, which accommodates as many as four micro-bolometer IR cameras for 45deg to 180deg of azimuth coverage, is presented. Various OpenCV1 based image-processing algorithms, including stitching of multiple adjacent FOVs, recognition of aerosol plume objects, and the tracking of aerosol plumes, are presented using process block diagrams and sample field test results, including chemical and biological simulant plumes. Methods for dealing with the background removal, brightness equalization between images, and focus quality for optimal plume tracking are also discussed.
The measurement of threat orientations.
Thompson, Suzanne C; Schlehofer, Michèle M; Bovin, Michelle J
2006-01-01
To develop measures of 3 threat orientations that affect responses to health behavior messages. In Study 1, college students (N = 47) completed items assessing threat orientations and health behaviors. In Study 2, college students and community adults (N = 110) completed the threat orientation items and measures of convergent and discriminant validity. In Study 1, the control-based, denial-based, and heightened-sensitivity-based threat orientation scales demonstrated good internal consistency and correlated with engagement in health behaviors. In Study 2, the convergent and discriminant validity of the 3 measures was established. The 3 scales have good internal reliability and construct validity.
Maintaining Situation Awareness with Autonomous Airborne Observation Platforms
NASA Technical Reports Server (NTRS)
Freed, Michael; Fitzgerald, Will
2005-01-01
Unmanned Aerial Vehicles (UAVs) offer tremendous potential as intelligence, surveillance and reconnaissance (ISR) platforms for early detection of security threats and for acquisition and maintenance of situation awareness in crisis conditions. However, using their capabilities effectively requires addressing a range of practical and theoretical problems. The paper will describe progress by the "Autonomous Rotorcraft Project," a collaborative effort between NASA and the U.S. Army to develop a practical, flexible capability for UAV-based ISR. Important facets of the project include optimization methods for allocating scarce aircraft resources to observe numerous, distinct sites of interest; intelligent flight automation software than integrates high-level plan generation capabilities with executive control, failure response and flight control functions; a system architecture supporting reconfiguration of onboard sensors to address different kinds of threats; and an advanced prototype vehicle designed to allow large-scale production at low cost. The paper will also address human interaction issues including an empirical method for determining how to allocate roles and responsibilities between flight automation and human operations.
Li, Bai; Gong, Li-gang; Yang, Wen-lun
2014-01-01
Unmanned combat aerial vehicles (UCAVs) have been of great interest to military organizations throughout the world due to their outstanding capabilities to operate in dangerous or hazardous environments. UCAV path planning aims to obtain an optimal flight route with the threats and constraints in the combat field well considered. In this work, a novel artificial bee colony (ABC) algorithm improved by a balance-evolution strategy (BES) is applied in this optimization scheme. In this new algorithm, convergence information during the iteration is fully utilized to manipulate the exploration/exploitation accuracy and to pursue a balance between local exploitation and global exploration capabilities. Simulation results confirm that BE-ABC algorithm is more competent for the UCAV path planning scheme than the conventional ABC algorithm and two other state-of-the-art modified ABC algorithms.
Optimized phase mask to realize retro-reflection reduction for optical systems
NASA Astrophysics Data System (ADS)
He, Sifeng; Gong, Mali
2017-10-01
Aiming at the threats to the active laser detection systems of electro-optical devices due to the cat-eye effect, a novel solution is put forward to realize retro-reflection reduction in this paper. According to the demands of both cat-eye effect reduction and the image quality maintenance of electro-optical devices, a symmetric phase mask is achieved from a stationary phase method and a fast Fourier transform algorithm. Then, based on a comparison of peak normalized cross-correlation (PNCC) between the different defocus parameters, the optimal imaging position can be obtained. After modification with the designed phase mask, the cat-eye effect peak intensity can be reduced by two orders of magnitude while maintaining good image quality and high modulation transfer function (MTF). Furthermore, a practical design example is introduced to demonstrate the feasibility of our proposed approach.
Dhabhar, Firdaus S
2018-03-26
Our group has proposed that in contrast to chronic stress that can have harmful effects, the short-term (fight-or-flight) stress response (lasting for minutes to hours) is nature's fundamental survival mechanism that enhances protection and performance under conditions involving threat/challenge/opportunity. Short-term stress enhances innate/primary, adaptive/secondary, vaccine-induced, and anti-tumor immune responses, and post-surgical recovery. Mechanisms and mediators include stress hormones, dendritic cell, neutrophil, macrophage, and lymphocyte trafficking/function and local/systemic chemokine and cytokine production. Short-term stress may also enhance mental/cognitive and physical performance through effects on brain, musculo-skeletal, and cardiovascular function, reappraisal of threat/anxiety, and training-induced stress-optimization. Therefore, short-term stress psychology/physiology could be harnessed to enhance immuno-protection, as well as mental and physical performance. This review aims to provide a conceptual framework and targets for further investigation of mechanisms and conditions under which the protective/adaptive aspects of short-term stress/exercise can be optimized/harnessed, and for developing pharmacological/biobehavioral interventions to enhance health/healing, and mental/cognitive/physical performance. Copyright © 2018 Elsevier Inc. All rights reserved.
An Examination of Age-Based Stereotype Threat About Cognitive Decline.
Barber, Sarah J
2017-01-01
"Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.
Barber, Sarah J.
2017-01-01
“Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332
Performance optimization for space-based sensors: simulation and modelling at Fraunhofer IOSB
NASA Astrophysics Data System (ADS)
Schweitzer, Caroline; Stein, Karin
2014-10-01
The prediction of the effectiveness of a space-based sensor for its designated application in space (e.g. special earth surface observations or missile detection) can help to reduce the expenses, especially during the phases of mission planning and instrumentation. In order to optimize the performance of such systems we simulate and analyse the entire operational scenario, including: - optional waveband - various orbit heights and viewing angles - system design characteristics, e. g. pixel size and filter transmission - atmospheric effects, e. g. different cloud types, climate zones and seasons In the following, an evaluation of the appropriate infrared (IR) waveband for the designated sensor application is given. The simulation environment is also capable of simulating moving objects like aircraft or missiles. Therefore, the spectral signature of the object/missile as well as its track along a flight path is implemented. The resulting video sequence is then analysed by a tracking algorithm and an estimation of the effectiveness of the sensor system can be simulated. This paper summarizes the work carried out at Fraunhofer IOSB in the field of simulation and modelling for the performance optimization of space based sensors. The paper is structured as follows: First, an overview of the applied simulation and modelling software is given. Then, the capability of those tools is illustrated by means of a hypothetical threat scenario for space-based early warning (launch of a long-range ballistic missile (BM)).
Terrorism threats and preparedness in Canada: the perspective of the Canadian public.
Gibson, Stacey; Lemyre, Louise; Clément, Mélanie; Markon, Marie-Pierre L; Lee, Jennifer E C
2007-06-01
Although Canada has not experienced a major terrorist attack, an increased global pending threat has put preparedness at the top of the Canadian government's agenda. Given its strong multicultural community and close proximity to the recently targeted United States, the Canadian experience is unique. However, minimal research exists on the public's reactions to terrorism threats and related preparedness strategies. In order for response initiatives to be optimally effective, it is important that the public's opinions regarding terrorism and preparedness be considered. This qualitative study examined perceptions of terrorism threats among Canadians living in Central and Eastern Canada (N = 75) in the fall of 2004. Conceptualizations of terrorism threat, psychosocial impacts, and sense of preparedness were explored in a series of qualitative interviews. Findings revealed that the majority of Canadians did not feel overly threatened by terrorist attacks, due in part to a perception of terrorist threats as related to global sociopolitical events and a positive Canadian identity. In addition, while most respondents did not feel they were individually affected by the threat of terrorism, there was some concern regarding larger societal impacts, such as increased paranoia, discrimination, and threats to civil liberties. Participants' views on preparedness focused largely on the utility of emergency preparedness strategies and the factors that could mitigate or inhibit preparedness at the individual and institutional levels, with a specific focus on education. Finally, the significant relevance of these findings in shaping terrorism preparedness, both in Canada and generally, is discussed.
1982-02-01
optimization methods have been developed for problems in production and distribution modeling including design and evaluation of storage alternatives under...and winds using high frequency , X-band doppler, pulse -limited, and Delta-K radars. Development of millimeter-wave radiometric imaging systems and...generic system design concept for a system capable of defending the Fleet from the high angle threat 1.4 The first model of the drive system for a
2010-03-23
foundation of our S&T portfolio by developing a broad base of scientific knowledge from which INP, FNC, and quick reaction efforts are generated...optimally tailoring experiences, in real-time, to current cognitive and physiological states of the learner. A unique human systems design approach is...efforts include modeling human responses to blast, ballistic, and blunt trauma, as well as modeling physical and cognitive effects of blast exposure and
Potential future land use threats to California's protected areas
Wilson, Tamara Sue; Sleeter, Benjamin Michael; Davis, Adam Wilkinson
2015-01-01
Increasing pressures from land use coupled with future changes in climate will present unique challenges for California’s protected areas. We assessed the potential for future land use conversion on land surrounding existing protected areas in California’s twelve ecoregions, utilizing annual, spatially explicit (250 m) scenario projections of land use for 2006–2100 based on the Intergovernmental Panel on Climate Change Special Report on Emission Scenarios to examine future changes in development, agriculture, and logging. We calculated a conversion threat index (CTI) for each unprotected pixel, combining land use conversion potential with proximity to protected area boundaries, in order to identify ecoregions and protected areas at greatest potential risk of proximal land conversion. Our results indicate that California’s Coast Range ecoregion had the highest CTI with competition for extractive logging placing the greatest demand on land in close proximity to existing protected areas. For more permanent land use conversions into agriculture and developed uses, our CTI results indicate that protected areas in the Central California Valley and Oak Woodlands are most vulnerable. Overall, the Eastern Cascades, Central California Valley, and Oak Woodlands ecoregions had the lowest areal percent of protected lands and highest conversion threat values. With limited resources and time, rapid, landscape-level analysis of potential land use threats can help quickly identify areas with higher conversion probability of future land use and potential changes to both habitat and potential ecosystem reserves. Given the broad range of future uncertainties, LULC projections are a useful tool allowing land managers to visualize alternative landscape futures, improve planning, and optimize management practices.
Lessons from the response to the threat of transfusion-transmitted vCJD in Ireland.
Murphy, W G
2013-09-01
By the time vCJD was first described in 1996, it was already far too late to offset further disaster from transmission of the disease by blood transfusion: almost all the humans who would be infected and infectious were already diseased. Nothing done by the blood transfusion services around that time, with the exception of excluding transfusion recipients as blood donors, would have made any useful contribution to containing the extent of the epidemic. The ability to spread emerging diseases before the problem is manifest or understood is a fixed and unavoidable feature of blood transfusion as it is practiced today. A second fixed property of blood transfusion is that the root cause of disaster is not within the control of the blood transfusion universe. Strategies that have emerged to cope with similar threat in other enterprises that also contain these properties comprise the components of robust design: surveillance, preparedness for action, engagement, herding together, evasion or avoidance, early adoption of potentially useful measures, engineered resilience, defence in depth, damage limitation including modularity and removal of feedback loops, and contingency, redundancy and failure management, and ultimately, individual escape. Early adoption of leucodepletion based on the possibility that it might work rather than any hard evidence was a good example of threat management. Exclusion of previously transfused donors is a robust mechanism for containing any future infection; optimal blood use structures that provide a national transfusion rate as low as possible also constitute an effective threat management strategy. Copyright © 2013 Elsevier Masson SAS. All rights reserved.
Animal escapology I: theoretical issues and emerging trends in escape trajectories
Domenici, Paolo; Blagburn, Jonathan M.; Bacon, Jonathan P.
2011-01-01
Summary Escape responses are used by many animal species as their main defence against predator attacks. Escape success is determined by a number of variables; important are the directionality (the percentage of responses directed away from the threat) and the escape trajectories (ETs) measured relative to the threat. Although logic would suggest that animals should always turn away from a predator, work on various species shows that these away responses occur only approximately 50–90% of the time. A small proportion of towards responses may introduce some unpredictability and may be an adaptive feature of the escape system. Similar issues apply to ETs. Theoretically, an optimal ET can be modelled on the geometry of predator–prey encounters. However, unpredictability (and hence high variability) in trajectories may be necessary for preventing predators from learning a simple escape pattern. This review discusses the emerging trends in escape trajectories, as well as the modulating key factors, such as the surroundings and body design. The main ET patterns identified are: (1) high ET variability within a limited angular sector (mainly 90–180 deg away from the threat; this variability is in some cases based on multiple peaks of ETs), (2) ETs that allow sensory tracking of the threat and (3) ETs towards a shelter. These characteristic features are observed across various taxa and, therefore, their expression may be mainly related to taxon-independent animal design features and to the environmental context in which prey live – for example whether the immediate surroundings of the prey provide potential refuges. PMID:21753039
The dilemma of dual use biological research: Polish perspective.
Czarkowski, Marek
2010-03-01
Biological research with legitimate scientific purpose that may be misused to pose a biological threat to public health and/or national security is termed dual use. In Poland there are adequate conditions for conducting experiments that could be qualified as dual use research, and therefore, a risk of attack on Poland or other countries exists. Optimal solutions for limiting such threats are required, and the national system of biosecurity should enable early, reliable, and complete identification of this type of research. Scientists should have a fundamental role in this process, their duty being to immediately, upon identification, report research with dual use potential. An important entity in the identification system of dual use research should also be the Central Register of Biological and Biomedical Research, which gathers information about all biological and biomedical research being conducted in a given country. Publishers, editors, and review committees of journals and other scientific publications should be involved in evaluating results of clinical trials. The National Council of Biosecurity should be the governmental institution responsible for developing a system of dual use research threat prevention. Its role would be to develop codes of conduct, form counsel of expertise, and monitor the problem at national level, while the Dual Use Research Committee would be responsible for individual cases. In Poland, current actions aiming to provide biological safety were based on developing and passing an act about genetically modified organisms (GMO's) and creating a GMO Committee. Considering experiences of other nations, one should view these actions as fragmentary, and thus insufficient protection against dual use research threats.
Gorka, Stephanie M.; Lieberman, Lynne; Shankman, Stewart A.; Phan, K. Luan
2016-01-01
Heightened reactivity to uncertain threat (U-threat) is an important individual difference factor that may characterize fear-based internalizing psychopathologies (IPs) and distinguish them from distress/misery IPs. To date, however, the majority of existing research examining reactivity to U-threat has been within individuals with panic disorder and major depressive disorder (MDD) and no prior study has directly tested this hypothesis across multiple IPs. The current study therefore explored whether heightened reactivity to U-threat is a psychophysiological indicator of fear-based psychopathology across five groups: current 1) social anxiety disorder (SAD), 2) specific phobia (SP), 3) generalized anxiety disorder (GAD), 4) MDD, and 5) individuals with no history of psychopathology (controls). All 160 adults completed a well-validated threat-of-shock task designed to probe responses to predictable (P-) and U-threat. Startle eyeblink potentiation was recorded as an index of aversive arousal. Results indicated that individuals with SAD and SP evidenced greater startle potentiation to U-threat, but not P-threat, relative to individuals with GAD, MDD and controls (who did not differ). The current findings, along with the prior panic disorder and MDD literature, suggest that heightened reactivity to U-threat is a psychophysiological indicator of fear-based disorders and could represent a neurobiological organizing principle for internalizing psychopathology. The findings also suggest that individuals with fear disorders generally display a hypersensitivity to uncertain aversive events, which could contribute to their psychopathology. PMID:27868423
Categorizing threat : building and using a generic threat matrix.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede
2007-09-01
The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and ismore » not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.« less
Chambers, Jeanne C.; Maestas, Jeremy D.; Pyke, David A.; Boyd, Chad S.; Pellant, Mike; Wuenschel, Amarina
2017-01-01
Conservation of imperiled species often demands addressing a complex suite of threats that undermine species viability. Regulatory approaches, such as the US Endangered Species Act (1973), tend to focus on anthropogenic threats through adoption of policies and regulatory mechanisms. However, persistent ecosystem-based threats, such as invasive species and altered disturbance regimes, remain critical issues for most at-risk species considered to be conservation-reliant. We describe an approach for addressing persistent ecosystem threats to at-risk species based on ecological resilience and resistance concepts that is currently being used to conserve greater sage-grouse (Centrocercus urophasianus)and sagebrush ecosystems. The approach links biophysical indicators of ecosystem resilience and resistance with species-specific population and habitat requisites in a risk-based framework to identify priority areas for management and guide allocation of resources to manage persistent ecosystem-based threats. US federal land management and natural resource agencies have adopted this framework as a foundation for prioritizing sage-grouse conservation resources and determining effective restoration and management strategies. Because threats and strategies to address them cross-cut program areas, an integrated approach that includes wildland fire operations, postfire rehabilitation, fuels management, and habitat restoration is being used. We believe this approach is applicable to species conservation in other largely intact ecosystems with persistent, ecosystem-based threats.
Waters, Allison M; Kershaw, Rachel
2015-01-01
Anxious children show attention biases towards and away from threat stimuli. Moreover, threat avoidance compared to vigilance predicts a poorer outcome from exposure-based treatments, such as cognitive-behavioural therapy (CBT), yet the mechanisms underlying this differential response are unclear. Pavlovian fear conditioning is a widely accepted theory to explain the acquisition and extinction of fear, including exposure-based treatments, such as CBT. In typical fear conditioning experiments, anxious children have shown larger physiological responses to an aversive unconditional stimulus (i.e., US on CS+ trials) and to non-reinforced stimuli (CS-) during fear acquisition and to both CSs during fear extinction compared to non-anxious peers. This study examined whether threat avoidance compared to threat vigilance was related to differences in fear acquisition and extinction in anxious children. Thirty-four clinically-anxious children completed a visual probe task including angry-neutral face pairs to determine the direction of threat attention bias as well as a discriminant conditioning and extinction task in which a geometric shape CS+ was paired with an aversive tone US, while the CS- geometric shape was always presented alone during acquisition trials. Both CSs were presented alone during extinction trials. Fear acquisition and extinction were indexed by skin conductance responses (SCR) and subjective measures. Children were classified as threat vigilant (N = 18) and threat avoidant (n = 16) based on the direction of threat attention bias on the visual probe task. During acquisition, threat avoidant relative to threat vigilant anxious children displayed larger orienting SCRs to both CSs during the first block of trials and larger third interval SCRs to the US on CS+ trials as well as on CS- trials. During extinction, threat avoidant anxious children showed delayed extinction of SCRs to both the CS+ and CS- and reported higher subjective anxiety ratings after extinction compared to threat vigilant anxious children. Threat avoidant anxious children may be more reactive physiologically to novel cues and to stimuli that become associated with threat and this may interfere with extinction learning. These findings could help explain previous evidence that threat avoidant anxious children do not respond as well as threat vigilant anxious children to exposure-based CBT. Copyright © 2014 Elsevier Ltd. All rights reserved.
Cohen-Louck, Keren; Saka, Yael
2017-10-01
Israeli citizens are exposed to unpredictable and chronic terrorism threats that significantly jeopardize their personal sense of safety. The purpose of the present study is to present how Israeli discourse is structured with regard to emotional, cognitive, and behavioral responses to chronic terrorism threats and to understand the range of responses as well as map the risk and protective factors of this existential threat. Semistructured in-depth interviews were conducted with 40 Israeli adults (22 women and 18 men). Qualitative analysis revealed three patterns of responses to ongoing terrorism: emotional, cognitive, and behavioral. Emotional responses include fear, worry, sense of empathy, and detachment. Cognitive responses include situational assessment and pursuit of solutions, the use of traumatic imagining, beliefs in fate and luck, and optimism. Behavioral responses include looking for information, alertness, and habituation. The findings also revealed another response, which combines cognitive and behavioral responses. Some of the responses are innovative and unique to the threat of terrorism. Mapping the responses revealed mental health risk factors, as well as protective factors that can help structure personal and national resilience. These findings have implications on the treatment and prevention of personal and social pathologies, and how to effectively cope with terrorism threats. Copyright © 2016 John Wiley & Sons, Ltd.
Blagrove, Marcus S C; Caminade, Cyril; Waldmann, Elisabeth; Sutton, Elizabeth R; Wardeh, Maya; Baylis, Matthew
2017-06-01
Mosquito-borne viruses have been estimated to cause over 100 million cases of human disease annually. Many methodologies have been developed to help identify areas most at risk from transmission of these viruses. However, generally, these methodologies focus predominantly on the effects of climate on either the vectors or the pathogens they spread, and do not consider the dynamic interaction between the optimal conditions for both vector and virus. Here, we use a new approach that considers the complex interplay between the optimal temperature for virus transmission, and the optimal climate for the mosquito vectors. Using published geolocated data we identified temperature and rainfall ranges in which a number of mosquito vectors have been observed to co-occur with West Nile virus, dengue virus or chikungunya virus. We then investigated whether the optimal climate for co-occurrence of vector and virus varies between "warmer" and "cooler" adapted vectors for the same virus. We found that different mosquito vectors co-occur with the same virus at different temperatures, despite significant overlap in vector temperature ranges. Specifically, we found that co-occurrence correlates with the optimal climatic conditions for the respective vector; cooler-adapted mosquitoes tend to co-occur with the same virus in cooler conditions than their warmer-adapted counterparts. We conclude that mosquitoes appear to be most able to transmit virus in the mosquitoes' optimal climate range, and hypothesise that this may be due to proportionally over-extended vector longevity, and other increased fitness attributes, within this optimal range. These results suggest that the threat posed by vector-competent mosquito species indigenous to temperate regions may have been underestimated, whilst the threat arising from invasive tropical vectors moving to cooler temperate regions may be overestimated.
Efficient transportation for Vermont : optimal statewide transit networks.
DOT National Transportation Integrated Search
2011-01-01
"Public transit systems are receiving increased attention as viable solutions to problems with : transportation system robustness, energy-efficiency and equity. The over-reliance on a single : mode, the automobile, is a threat to system robustness. I...
Space station integrated wall design and penetration damage control
NASA Technical Reports Server (NTRS)
Coronado, A. R.; Gibbins, M. N.; Wright, M. A.; Stern, P. H.
1987-01-01
A methodology was developed to allow a designer to optimize the pressure wall, insulation, and meteoroid/debris shield system of a manned spacecraft for a given spacecraft configuration and threat environment. The threat environment consists of meteoroids and orbital debris, as specified for an arbitrary orbit and expected lifetime. An overall probability of no penetration is calculated, as well as contours of equal threat that take into account spacecraft geometry and orientation. Techniques, tools, and procedures for repairing an impacted and penetrated pressure wall were developed and tested. These techniques are applied from the spacecraft interior and account for the possibility of performing the repair in a vacuum. Hypervelocity impact testing was conducted to: (1) develop and refine appropriate penetration functions, and (2) determine the internal effects of a penetration on personnel and equipment.
Fracking in the UK press: threat dynamics in an unfolding debate.
Jaspal, Rusi; Nerlich, Brigitte
2014-04-01
Shale gas is a novel source of fossil fuel which is extracted by induced hydraulic fracturing, or "fracking". This article examines the socio-political dimension of fracking as manifested in the UK press at three key temporal points in the debate on the practice. Three newspaper corpora were analysed qualitatively using Thematic Analysis and Social Representations Theory. Three overarching themes are discussed: "April-May 2011: from Optimism to Scepticism"; "November 2011: (De-) Constructing and Re-Constructing Risk and Danger"; "April 2012: consolidating Social Representations of Fracking". In this article, we examine the emergence of and inter-relations between competing social representations, discuss the dynamics of threat positioning and show how threat can be re-construed in order to serve particular socio-political ends in the debate on fracking.
Two-material optimization of plate armour for blast mitigation using hybrid cellular automata
NASA Astrophysics Data System (ADS)
Goetz, J.; Tan, H.; Renaud, J.; Tovar, A.
2012-08-01
With the increased use of improvised explosive devices in regions at war, the threat to military and civilian life has risen. Cabin penetration and gross acceleration are the primary threats in an explosive event. Cabin penetration crushes occupants, damaging the lower body. Acceleration causes death at high magnitudes. This investigation develops a process of designing armour that simultaneously mitigates cabin penetration and acceleration. The hybrid cellular automaton (HCA) method of topology optimization has proven efficient and robust in problems involving large, plastic deformations such as crash impact. Here HCA is extended to the design of armour under blast loading. The ability to distribute two metallic phases, as opposed to one material and void, is also added. The blast wave energy transforms on impact into internal energy (IE) inside the solid medium. Maximum attenuation occurs with maximized IE. The resulting structures show HCA's potential for designing blast mitigating armour structures.
Gorka, Stephanie M; Lieberman, Lynne; Shankman, Stewart A; Phan, K Luan
2017-01-01
Heightened reactivity to uncertain threat (U-threat) is an important individual difference factor that may characterize fear-based internalizing psychopathologies (IPs) and distinguish them from distress/misery IPs. To date, however, the majority of existing research examining reactivity to U-threat has been within individuals with panic disorder and major depressive disorder (MDD) and no prior study has directly tested this hypothesis across multiple IPs. The current study therefore explored whether heightened reactivity to U-threat is a psychophysiological indicator of fear-based psychopathology across 5 groups: current (a) social anxiety disorder (SAD); (b) specific phobia (SP); (c) generalized anxiety disorder (GAD); (d) MDD; and (c) individuals with no history of psychopathology (controls). All 160 adults completed a well-validated threat-of-shock task designed to probe responses to predictable (P-) and U-threat. Startle eyeblink potentiation was recorded as an index of aversive arousal. Results indicated that individuals with SAD and SP evidenced greater startle potentiation to U-threat, but not P-threat, relative to individuals with GAD, MDD, and controls (who did not differ). The current findings, along with the prior panic disorder and MDD literature, suggest that heightened reactivity to U-threat is a psychophysiological indicator of fear-based disorders and could represent a neurobiological organizing principle for internalizing psychopathology. The findings also suggest that individuals with fear disorders generally display a hypersensitivity to uncertain aversive events, which could contribute to their psychopathology. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
Barber, Sarah J; Mather, Mara; Gatz, Margaret
2015-11-01
Stereotype threat can impair older adults' performance on clinical assessments for cognitive decline. We examined why this occurs. Based upon the regulatory focus account of stereotype threat, we predicted that the effects of stereotype threat should depend upon the assessments' reward structure. Stereotype threat should be associated with poor performance when the assessment emphasizes gaining correct answers, but not when it emphasizes avoiding mistakes. Healthy older adults completed a series of mental status examinations. Half of the participants completed these examinations under stereotype threat about their cognitive abilities. Monetary incentives were also manipulated. For half of the participants correct responding led to gains. For the remaining participants incorrect responding/forgetting led to losses. Consistent with the regulatory focus account, stereotype threat was associated with poor performance when the mental status examinations had a gains-based structure, but not when they had a losses-based structure. Older adults respond to stereotype threat by becoming vigilant to avoid the losses that will make them their worst. Researchers and clinicians can capitalize on this motivational change to combat stereotype threat's negative effects. By using a loss-avoidance frame, stereotype threat's negative effects can be attenuated or even eliminated. © The Author 2015. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Glider communications and controls for the sea sentry mission.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Feddema, John Todd; Dohner, Jeffrey Lynn
2005-03-01
This report describes a system level study on the use of a swarm of sea gliders to detect, confirm and kill littoral submarine threats. The report begins with a description of the problem and derives the probability of detecting a constant speed threat without networking. It was concluded that glider motion does little to improve this probability unless the speed of a glider is greater than the speed of the threat. Therefore, before detection, the optimal character for a swarm of gliders is simply to lie in wait for the detection of a threat. The report proceeds by describing themore » effect of noise on the localization of a threat once initial detection is achieved. This noise is estimated as a function of threat location relative to the glider and is temporally reduced through the use of an information or Kalman filtering. In the next section, the swarm probability of confirming and killing a threat is formulated. Results are compared to a collection of stationary sensors. These results show that once a glider has the ability to move faster than the threat, the performance of the swarm is equal to the performance of a stationary swarm of gliders with confirmation and kill ranges equal to detection range. Moreover, at glider speeds greater than the speed of the threat, swarm performance becomes a weak function of speed. At these speeds swarm performance is dominated by detection range. Therefore, to future enhance swarm performance or to reduce the number of gliders required for a given performance, detection range must be increased. Communications latency is also examined. It was found that relatively large communication delays did little to change swarm performance. Thus gliders may come to the surface and use SATCOMS to effectively communicate in this application.« less
Habitat management utilizing native wildflowers to foster pollinator abundance
USDA-ARS?s Scientific Manuscript database
Pollinators provide essential ecosystem services to agricultural crops, however their population has come under threat globally as a result of intensive agricultural practices and landscape simplification. Designing diverse heterogeneous agricultural landscapes to provide optimal resources serves as...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brigantic, Robert T.; Betzsold, Nick J.; Bakker, Craig KR
In this presentation we overview a methodology for dynamic security risk quantification and optimal resource allocation of security assets for high profile venues. This methodology is especially applicable to venues that require security screening operations such as mass transit (e.g., train or airport terminals), critical infrastructure protection (e.g., government buildings), and largescale public events (e.g., concerts or professional sports). The method starts by decomposing the three core components of risk -- threat, vulnerability, and consequence -- into their various subcomponents. For instance, vulnerability can be decomposed into availability, accessibility, organic security, and target hardness and each of these can bemore » evaluated against the potential threats of interest for the given venue. Once evaluated, these subcomponents are rolled back up to compute the specific value for the vulnerability core risk component. Likewise, the same is done for consequence and threat, and then risk is computed as the product of these three components. A key aspect of our methodology is dynamically quantifying risk. That is, we incorporate the ability to uniquely allow the subcomponents and core components, and in turn, risk, to be quantified as a continuous function of time throughout the day, week, month, or year as appropriate.« less
Avoidance Denial versus Optimistic Denial in Reaction to the Threat of Future Cardiovascular Disease
ERIC Educational Resources Information Center
Thompson, Suzanne C.; Ting, Sarah A.
2012-01-01
Two distinctly different denial-based threat orientations (avoidance denial and optimistic denial) were examined using a message about the future risk of cardiovascular disease (CVD) for young adults. Participants (N = 101) completed measures of denial-based dispositional threat orientations, current eating, comparative risk, and objective risk…
A Developmental Perspective on the Virginia Student Threat Assessment Guidelines
ERIC Educational Resources Information Center
Cornell, Dewey G.
2011-01-01
The Virginia Student Threat Assessment Guidelines were developed to help multidisciplinary school-based teams use a decision tree to evaluate student threats and take appropriate preventive action. A main goal of this approach is to allow school-based teams to recognize and respond to the developmental complexities of children and adolescents…
A bat algorithm with mutation for UCAV path planning.
Wang, Gaige; Guo, Lihong; Duan, Hong; Liu, Luo; Wang, Heqi
2012-01-01
Path planning for uninhabited combat air vehicle (UCAV) is a complicated high dimension optimization problem, which mainly centralizes on optimizing the flight route considering the different kinds of constrains under complicated battle field environments. Original bat algorithm (BA) is used to solve the UCAV path planning problem. Furthermore, a new bat algorithm with mutation (BAM) is proposed to solve the UCAV path planning problem, and a modification is applied to mutate between bats during the process of the new solutions updating. Then, the UCAV can find the safe path by connecting the chosen nodes of the coordinates while avoiding the threat areas and costing minimum fuel. This new approach can accelerate the global convergence speed while preserving the strong robustness of the basic BA. The realization procedure for original BA and this improved metaheuristic approach BAM is also presented. To prove the performance of this proposed metaheuristic method, BAM is compared with BA and other population-based optimization methods, such as ACO, BBO, DE, ES, GA, PBIL, PSO, and SGA. The experiment shows that the proposed approach is more effective and feasible in UCAV path planning than the other models.
USDA-ARS?s Scientific Manuscript database
Beneficial arthropods which provide important ecosystems services have come under threat as a result of intensive agricultural practices and landscape simplification. Engineering diverse heterogeneous agricultural landscapes to provide optimal resources for beneficial arthropods may recover and enha...
Radar cross-section reduction based on an iterative fast Fourier transform optimized metasurface
NASA Astrophysics Data System (ADS)
Song, Yi-Chuan; Ding, Jun; Guo, Chen-Jiang; Ren, Yu-Hui; Zhang, Jia-Kai
2016-07-01
A novel polarization insensitive metasurface with over 25 dB monostatic radar cross-section (RCS) reduction is introduced. The proposed metasurface is comprised of carefully arranged unit cells with spatially varied dimension, which enables approximate uniform diffusion of incoming electromagnetic (EM) energy and reduces the threat from bistatic radar system. An iterative fast Fourier transform (FFT) method for conventional antenna array pattern synthesis is innovatively applied to find the best unit cell geometry parameter arrangement. Finally, a metasurface sample is fabricated and tested to validate RCS reduction behavior predicted by full wave simulation software Ansys HFSSTM and marvelous agreement is observed.
Small threat and contraband detection with TNA-based systems.
Shaw, T J; Brown, D; D'Arcy, J; Liu, F; Shea, P; Sivakumar, M; Gozani, T
2005-01-01
The detection of small threats, such as explosives, drugs, and chemical weapons, concealed or encased in surrounding material, is a major concern in areas from security checkpoints to UneXploded Ordnance (UXO) clearance. Techniques such as X-ray and trace detection are often ineffectual in these applications. Thermal neutron analysis (TNA) provides an effective method for detecting concealed threats. This paper shows the effectiveness of Ancore's SPEDS, based on TNA, in detecting concealed liquid threats and differentiating live from inert mortar shells.
The voluntary-threat approach to control nonpoint source pollution under uncertainty.
Li, Youping
2013-11-15
This paper extends the voluntary-threat approach of Segerson and Wu (2006) to the case that the ambient level of nonpoint source pollution is stochastic. It is shown that when the random component is bounded from the above, fine-tuning the cutoff value of the tax payments avoids the actual imposition of the tax while the threat of such payments retains necessary incentive for the polluters to engage in abatements at the optimal level. If the random component is not bounded, the imposition of the tax cannot be completely avoided but the probability can be reduced by setting a higher cutoff value. It is also noted that the regulator has additional flexibility in randomizing the tax imposition but the randomization process has to be credible. Copyright © 2013 Elsevier Ltd. All rights reserved.
Cyber situational awareness and differential hardening
NASA Astrophysics Data System (ADS)
Dwivedi, Anurag; Tebben, Dan
2012-06-01
The advent of cyber threats has created a need for a new network planning, design, architecture, operations, control, situational awareness, management, and maintenance paradigms. Primary considerations include the ability to assess cyber attack resiliency of the network, and rapidly detect, isolate, and operate during deliberate simultaneous attacks against the network nodes and links. Legacy network planning relied on automatic protection of a network in the event of a single fault or a very few simultaneous faults in mesh networks, but in the future it must be augmented to include improved network resiliency and vulnerability awareness to cyber attacks. Ability to design a resilient network requires the development of methods to define, and quantify the network resiliency to attacks, and to be able to develop new optimization strategies for maintaining operations in the midst of these newly emerging cyber threats. Ways to quantify resiliency, and its use in visualizing cyber vulnerability awareness and in identifying node or link criticality, are presented in the current work, as well as a methodology of differential network hardening based on the criticality profile of cyber network components.
Salinity-oriented environmental flows for keystone species in the Modaomen Estuary, China
NASA Astrophysics Data System (ADS)
Zhang, Menglu; Cui, Baoshan; Zhang, Zhiming; Jiang, Xuelian
2017-12-01
Rapid development and urbanization in recent years have contributed to a reduction in freshwater discharge and intensified saltwater intrusion in the Pearl River Delta. This comprises a significant threat to potable water supplies and overall estuary ecosystem health. In this study, the environmental flows of the Modaomen Estuary, one of the estuaries of the Pearl River Delta in China, were determined based on the salinity demand of keystone species and the linear relationship between river discharge and estuarine salinity. The estimated minimum and optimal annual environmental flows in the Modaomen Estuary were 116.8 × 109 m3 and 273.8 × 109 m3, respectively, representing 59.3% and 139.0% of the natural runoff. Water quality assessments in recent years indicate that the environmental flows have not been satisfied most of the time, particularly the optimal environmental flow, despite implementation of various water regulations since 2005. Therefore, water regulations and wetland network recoveries based on rational environmental flows should be implemented to alleviate saltwater intrusion and for the creation of an ideal estuarine habitat.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gildersleeve, C.W.
An interdisciplinary analysis of the post-Cold War world to determine the optimal strategy to attain the national interests of the United States, and the requisite logistic structure to support that strategy. The optimal solution is found to be a strategy based on multinational defense centered on a permanent force of United Nations garrison port complexes. This multilateral force would be augmented by as small a national defense force as necessary to ensure national security. The theses endeavors to reconnect the cultural and philosophical past of the United States with its immediate future. National interests are identified through examination of Americanmore » Pragmatism and the philosophies of John Locke and Jean-Jacques Rousseau. To determine the current status of common defense, based upon the Foreign Military Sales system, and analysis of current data is accomplished. Future threats to the United States are examined with special emphasis on nuclear terrorism. The ability of Islamic nations in North Africa and the Middle East to produce significant quantities of uranium is demonstrated. The grave political as well as ongoing environmental consequences of this recent capability are discussed in detail.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Buckner, Mark A; Bobrek, Miljko; Farquhar, Ethan
Wireless Access Points (WAP) remain one of the top 10 network security threats. This research is part of an effort to develop a physical (PHY) layer aware Radio Frequency (RF) air monitoring system with multi-factor authentication to provide a first-line of defense for network security--stopping attackers before they can gain access to critical infrastructure networks through vulnerable WAPs. This paper presents early results on the identification of OFDM-based 802.11a WiFi devices using RF Distinct Native Attribute (RF-DNA) fingerprints produced by the Fractional Fourier Transform (FRFT). These fingerprints are input to a "Learning from Signals" (LFS) classifier which uses hybrid Differentialmore » Evolution/Conjugate Gradient (DECG) optimization to determine the optimal features for a low-rank model to be used for future predictions. Results are presented for devices under the most challenging conditions of intra-manufacturer classification, i.e., same-manufacturer, same-model, differing only in serial number. The results of Fractional Fourier Domain (FRFD) RF-DNA fingerprints demonstrate significant improvement over results based on Time Domain (TD), Spectral Domain (SD) and even Wavelet Domain (WD) fingerprints.« less
Clustering molecular dynamics trajectories for optimizing docking experiments.
De Paris, Renata; Quevedo, Christian V; Ruiz, Duncan D; Norberto de Souza, Osmar; Barros, Rodrigo C
2015-01-01
Molecular dynamics simulations of protein receptors have become an attractive tool for rational drug discovery. However, the high computational cost of employing molecular dynamics trajectories in virtual screening of large repositories threats the feasibility of this task. Computational intelligence techniques have been applied in this context, with the ultimate goal of reducing the overall computational cost so the task can become feasible. Particularly, clustering algorithms have been widely used as a means to reduce the dimensionality of molecular dynamics trajectories. In this paper, we develop a novel methodology for clustering entire trajectories using structural features from the substrate-binding cavity of the receptor in order to optimize docking experiments on a cloud-based environment. The resulting partition was selected based on three clustering validity criteria, and it was further validated by analyzing the interactions between 20 ligands and a fully flexible receptor (FFR) model containing a 20 ns molecular dynamics simulation trajectory. Our proposed methodology shows that taking into account features of the substrate-binding cavity as input for the k-means algorithm is a promising technique for accurately selecting ensembles of representative structures tailored to a specific ligand.
The Motivation-Cognition Interface in Learning and Decision-Making.
Maddox, W Todd; Markman, Arthur B
2010-04-01
In this article we discuss how incentive motivations and task demands affect performance. We present a three-factor framework that suggests that performance is determined from the interaction of global incentives, local incentives, and the psychological processes needed to achieve optimal task performance. We review work that examines the implications of the motivation-cognition interface in classification, choice and on phenomena such as stereotype threat and performance pressure. We show that under some conditions stereotype threat and pressure accentuate performance. We discuss the implications of this work for neuropsychological assessment, and outline a number of challenges for future research.
Mather, Mara; Gatz, Margaret
2015-01-01
Objectives. Stereotype threat can impair older adults’ performance on clinical assessments for cognitive decline. We examined why this occurs. Based upon the regulatory focus account of stereotype threat, we predicted that the effects of stereotype threat should depend upon the assessments’ reward structure. Stereotype threat should be associated with poor performance when the assessment emphasizes gaining correct answers, but not when it emphasizes avoiding mistakes. Method. Healthy older adults completed a series of mental status examinations. Half of the participants completed these examinations under stereotype threat about their cognitive abilities. Monetary incentives were also manipulated. For half of the participants correct responding led to gains. For the remaining participants incorrect responding/forgetting led to losses. Results. Consistent with the regulatory focus account, stereotype threat was associated with poor performance when the mental status examinations had a gains-based structure, but not when they had a losses-based structure. Discussion. Older adults respond to stereotype threat by becoming vigilant to avoid the losses that will make them their worst. Researchers and clinicians can capitalize on this motivational change to combat stereotype threat’s negative effects. By using a loss-avoidance frame, stereotype threat’s negative effects can be attenuated or even eliminated. PMID:25752896
Confucian Values as a Buffer Against Age-Based Stereotype Threat for Chinese Older Adults.
Tan, Shyuan Ching; Barber, Sarah J
2018-05-16
Research has shown that stereotype threat can impair older adults' memory in Western cultures. We tested whether this also occurs for older adults from the East Asian Chinese culture. We also tested whether an intervention that highlighted Confucian principles would protect Chinese older adults from stereotype threat's detrimental effects. Culturally-Chinese older adults residing in the United States completed a memory test either under age-based stereotype threat about cognitive decline or not. Prior to this, some participants were also reminded of Confucian traditions of filial piety and were assured these values had been transmitted to the younger generation. Stereotype threat impaired Chinese older adults' memory performance. However, our intervention was effective in eliminating this deficit. When the Chinese participants were reminded of the Confucian principle of filial piety they did not exhibit stereotype threat effects. Confirming that younger adults have an obligation to respect their elders can eliminate the social-evaluative pressure of stereotype threat for Chinese older adults. These findings are noteworthy since population aging is happening at an unprecedented pace in East Asia. Although our results suggest that stereotype threat can adversely affect older adults' cognitive performance in these societies, we also identify a culturally-based intervention to alleviate this impairment.
Routing a High Value Unit for Optimized Missile Defense in Coastal Waters
2008-03-01
model ( XRP ), whose solution yields an optimal transit path for the CSG through a notional sea space called the “area of transit” (AT). XRP discretizes... XRP calculates and then writes to a text file the maximum-reliability route through the AT by vertex location, configuration, and direction of travel...in order to keep this research unclassified, no real threat data, such as probabilities of kill, are used. The XRP solution algorithm is written in
From avoidance to approach: The influence of threat-of-shock on reward-based decision making.
Bublatzky, Florian; Alpers, Georg W; Pittig, Andre
2017-09-01
Potential threat can prime defensive responding and avoidance behavior, which may result in the loss of rewards. When aversive consequences do not occur, avoidance should, thus, be quickly overcome in healthy individuals. This study examined the impact of threat anticipation on reward-based decisions. Sixty-five participants completed a decision-making task in which they had to choose between high- and low-reward options. To model an approach-avoidance conflict, the high-reward option was contingent with a threat-of-shock cue; the low-reward option was contingent with a safety cue. In control trials, decisions were made without threat/safety instructions. Overall, behavioral data documented a typical preference for the profitable option. Importantly, under threat-of-shock, participants initially avoided the profitable option (i.e., safe, but less profitable choices). However, when they experienced that shocks did actually not occur, participants overcame initial avoidance in favor of larger gains. Furthermore, autonomic arousal (skin conductance and heart rate responses) was elevated during threat cues compared to safety and non-threatening control cues. Taken together, threat-of-shock was associated with behavioral consequences: initially, participants avoided threat-related options but made more profitable decisions as they experienced no aversive consequences. Although socially acquired threat contingencies are typically stable, incentives for approach can help to overcome threat-related avoidance. Copyright © 2017 Elsevier Ltd. All rights reserved.
Narcissism and other-derogation in the absence of ego threat.
Park, Sun W; Colvin, C Randall
2015-06-01
The relation between narcissism and other-derogation has been examined primarily in the context of ego threat. In three studies, we investigated whether narcissistic individuals derogate others in the absence of ego threat. In Study 1, 79 judges watched four videotaped dyadic interactions and rated the personality of the same four people. In Study 2, 66 judges rated the personality of a friend. In Study 3, 72 judges considered the average Northeastern University student and rated the personality of this hypothetical person. Across the three studies, targets' personality characteristics were described on the 100-item California Adult Q-Sort (CAQ; Block, 2008). Judges' ratings of targets were compared to a CAQ prototype of the optimally adjusted person to assess target-derogation. Judges' narcissism and other-derogation were positively related in Studies 1 and 2. Narcissism positively predicted and self-esteem negatively predicted target-derogation after controlling for each other in Study 3. Narcissistic individuals derogate others more than non-narcissistic individuals regardless of whether ego threat is present or absent. © 2014 Wiley Periodicals, Inc.
A Bayesian Belief Network of Threat Anticipation and Terrorist Motivations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Olama, Mohammed M; Allgood, Glenn O; Davenport, Kristen M
Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) asmore » well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.« less
Nurok, Michael; Lipsitz, Stuart; Satwicz, Paul; Kelly, Andrea; Frankel, Allan
2010-05-01
To create and test a reproducible method for measuring emotional climate, surgical team skills, and threats to patient outcome by conducting an observational study to assess the impact of a surgical team skills and communication improvement intervention on these measurements. Observational study. Operating rooms in a high-volume thoracic surgery center from September 5, 2007, through June 30, 2008. Thoracic surgery operating room teams. Two 90-minute team skills training sessions focused on findings from a standardized safety culture survey administered to all participants and highlighting positive and problematic aspects of team skills, communication, and leadership. The sessions created an interactive forum to educate team members on the importance of communication and to role-play optimal interactive and communication strategies. Calculated indices of emotional climate, team skills, and threat to patient outcome. The calculated communication and team skills score improved from the preintervention to postintervention periods, but the improvement extinguished during the 3 months after the intervention (P < .001). The calculated threat-to-outcome score improved following the team training intervention and remained statistically improved 3 months later (P < .001). Using a new method for measuring emotional climate, teamwork, and threats to patient outcome, we were able to determine that a teamwork training intervention can improve a calculated score of team skills and communication and decrease a calculated score of threats to patient outcome. However, the effect is only durable for threats to patient outcome.
NASA Astrophysics Data System (ADS)
Schultz, David S.; Ghosh, Shondip; Grimmer, Christopher S.; Mack, Hunter
2011-10-01
The viability of a concentrator technology is determined by five interrelated factors: economic benefit, cell performance under concentration, thermal management, optical performance and manufacturability. Considering these factors, the 5- 10x concentration range is ideal for silicon-based receivers because this level of concentration captures the bulk of available economic gains while mitigating technical risk. Significant gains in capital efficiency are forsaken below the 5x concentration level. Above the 10x level of concentration, marginal improvements to economic benefit are achieved, but threats to reliability emerge and tend to erode the available economic benefit. Furthermore, optic solutions that provide for concentration above 10x tend to force a departure from low-profile flat-plate designs that are most adoptable. For silicon based receivers, a 5-10x level of concentration within a traditional module form factor is optimal.
Keeping up with the caravan of life: Successful aging strategies for Iranian women
Javadi-Pashaki, Nazila; Mohammadi, Farahnaz; Jafaraghaee, Fateme; Mehrdad, Neda
2015-01-01
Background Because of improving life expectancy in the world in recent times, the focus has shifted to the issue of the quality and nature of life and how to assist successful aging (SA) rather than increasing physical survival and lifespan. SA is a multidimensional, relative, and context-dependent concept with different paths and outcomes. The purpose of this qualitative study was to explore older women's strategies for SA in a specific context. Methods Following a grounded theory design approach, we conducted semi-structured individual interviews with 21 women between the ages of 28 and 96 years. We analyzed the data from interviews, written narratives, and field notes using the grounded theory approach. Results We identified four categories: prevention of threats, internal self-control against threats, coping with threats, and optimizing the passage of time according to opportunity. These described the strategies for SA when encountering with age-related changes. Utilizing these strategies, the women accompanied the caravan of life in the context of threats and opportunities. Conclusions The findings suggest that SA is a continuous process in confronting changes related to age. The identified strategies can help to promote SA by familiarizing older women with the threats and opportunities of life and training them in how to use these strategies. PMID:26610117
Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L
2014-03-01
Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.
Orgiazzi, Alberto; Panagos, Panos; Yigini, Yusuf; Dunbar, Martha B; Gardi, Ciro; Montanarella, Luca; Ballabio, Cristiano
2016-03-01
Because of the increasing pressures exerted on soil, below-ground life is under threat. Knowledge-based rankings of potential threats to different components of soil biodiversity were developed in order to assess the spatial distribution of threats on a European scale. A list of 13 potential threats to soil biodiversity was proposed to experts with different backgrounds in order to assess the potential for three major components of soil biodiversity: soil microorganisms, fauna, and biological functions. This approach allowed us to obtain knowledge-based rankings of threats. These classifications formed the basis for the development of indices through an additive aggregation model that, along with ad-hoc proxies for each pressure, allowed us to preliminarily assess the spatial patterns of potential threats. Intensive exploitation was identified as the highest pressure. In contrast, the use of genetically modified organisms in agriculture was considered as the threat with least potential. The potential impact of climate change showed the highest uncertainty. Fourteen out of the 27 considered countries have more than 40% of their soils with moderate-high to high potential risk for all three components of soil biodiversity. Arable soils are the most exposed to pressures. Soils within the boreal biogeographic region showed the lowest risk potential. The majority of soils at risk are outside the boundaries of protected areas. First maps of risks to three components of soil biodiversity based on the current scientific knowledge were developed. Despite the intrinsic limits of knowledge-based assessments, a remarkable potential risk to soil biodiversity was observed. Guidelines to preliminarily identify and circumscribe soils potentially at risk are provided. This approach may be used in future research to assess threat at both local and global scale and identify areas of possible risk and, subsequently, design appropriate strategies for monitoring and protection of soil biota. Copyright © 2015 The Authors. Published by Elsevier B.V. All rights reserved.
Adolescent Homosexuality and Concerns Regarding Disclosure.
ERIC Educational Resources Information Center
Harrison, Therese W.
2003-01-01
With threats of being labeled abnormal or facing rejection, homosexual adolescents are pressured to hide their sexual identities. To provide optimal anticipatory guidance and support, professionals must understand the natural development of sexual attraction and the disclosure concerns and risks for developing homosexual adolescents (e.g., risk…
What Recent History Has Taught Us About Responding to Emerging Infectious Disease Threats.
Paules, Catharine I; Eisinger, Robert W; Marston, Hilary D; Fauci, Anthony S
2017-12-05
Presidential administrations face any number of unexpected crises during their tenure, and global pandemics are among the most challenging. As of January 2017, one of the authors had served under 5 presidents as the director of the National Institute of Allergy and Infectious Diseases at the National Institutes of Health. During each administration, the government faced unexpected pandemics, ranging from the HIV/AIDS pandemic, which began during the Reagan administration, to the recent Zika outbreak in the Americas, which started during the Obama administration. These experiences underscored the need to optimize preparation for and response to these threats whenever and wherever they emerge. This article recounts selected outbreaks occurring during this period and highlights lessons that were learned that can be applied to the infectious disease threats that will inevitably be faced in the current presidential administration and beyond.
Ayalon, Liat
2017-08-05
The present study adds to the current body of literature by simultaneously examining the public perception of young and old people as posing realistic threats (e.g., to the group's power, resources, and welfare) and symbolic threats (e.g., to one's world view, belief system and values). The fourth wave of the European Social Survey was administered to individuals from 29 countries. Analysis is based on 56,170 individuals, who had data on the four relevant indicators. The study relied on a latent profile analysis to develop a typology of perceived realistic and symbolic threats to society by younger and older adults. A three-profile solution indicated that the perception of older and younger adults as threats to society often co-occurs. Sociodemographic characteristics at the individual-level and the Gini coefficient (e.g., an inequality indicator) at the country-level had differential associations with the profiles identified. The study calls for a more balanced approach which evaluates attitudes toward both younger and older adults as potential sources of threat. Attention should be paid to individual- and national-level characteristics associated with age-based threats (e.g., the perception of a group, defined by its chronological age, as threatening). © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Carey, Rachel N; Sarma, Kiran M
2016-07-27
Health communications often present graphic, threat-based representations of the potential consequences of health-risk behaviours. These 'threat appeals' feature prominently in public health campaigns, but their use is controversial, with studies investigating their efficacy reporting inconsistent, and often negative, findings. This research examined the impact of a threat-based road safety advertisement on the driving behaviour of young male drivers. To address limitations of previous research, we first identified a road safety advertisement that objectively and subjectively elicited fear using physiological and subjective measures. Study 1 (n = 62) examined the effect of this advertisement, combined with a manipulation designed to increase perceived efficacy, on speed choice. Study 2 (n = 81) investigated whether a state emotion, anger, impacts on the effectiveness of the advertisement in changing four distinct driving behaviours. Both studies examined short-term effects only. Study 1 findings indicated that a high threat message, when combined with high perceived efficacy, can lead to a decrease in speed choice. Study 2 results suggested that increased levels of state anger may counteract the potential value of combining fear-arousing threats and efficacy-building messages. Findings suggest that threat-based road safety communications that target affective (fear) and cognitive (perceived efficacy) mechanisms can positively affect driving behaviours. State emotions, such as anger, may negatively impact on the effectiveness of the message. Taken together, these findings provide additional support for the use of efficacy-building messages in threat-based communications, but highlight the need for further research into the complex array of affective influences on driving.
Cybersecurity and Optimization in Smart “Autonomous” Buildings
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mylrea, Michael E.; Gourisetti, Sri Nikhil Gup
Significant resources have been invested in making buildings “smart” by digitizing, networking and automating key systems and operations. Smart autonomous buildings create new energy efficiency, economic and environmental opportunities. But as buildings become increasingly networked to the Internet, they can also become more vulnerable to various cyber threats. Automated and Internet-connected buildings systems, equipment, controls, and sensors can significantly increase cyber and physical vulnerabilities that threaten the confidentiality, integrity, and availability of critical systems in organizations. Securing smart autonomous buildings presents a national security and economic challenge to the nation. Ignoring this challenge threatens business continuity and the availability ofmore » critical infrastructures that are enabled by smart buildings. In this chapter, the authors address challenges and explore new opportunities in securing smart buildings that are enhanced by machine learning, cognitive sensing, artificial intelligence (AI) and smart-energy technologies. The chapter begins by identifying cyber-threats and challenges to smart autonomous buildings. Then it provides recommendations on how AI enabled solutions can help smart buildings and facilities better protect, detect and respond to cyber-physical threats and vulnerabilities. Next, the chapter will provide case studies that examine how combining AI with innovative smart-energy technologies can increase both cybersecurity and energy efficiency savings in buildings. The chapter will conclude by proposing recommendations for future cybersecurity and energy optimization research for examining AI enabled smart-energy technology.« less
Jeanne C. Chambers; Jeremy D. Maestas; David A. Pyke; Chad S. Boyd; Mike Pellant; Amarina Wuenschel
2017-01-01
Conservation of imperiled species often demands addressing a complex suite of threats that undermine species viability. Regulatory approaches, such as the US Endangered Species Act (1973), tend to focus on anthropogenic threats through adoption of policies and regulatory mechanisms. However, persistent ecosystem-based threats, such as invasive species and altered...
ERIC Educational Resources Information Center
Tine, Michele; Gotlieb, Rebecca
2013-01-01
This study compared the relative impact of gender-, race-, and income-based stereotype threat and examined if individuals with multiple stigmatized aspects of identity experience a larger stereotype threat effect on math performance and working memory function than people with one stigmatized aspect of identity. Seventy-one college students of the…
Satellite Data Aid Monitoring of Nation's Forests
NASA Technical Reports Server (NTRS)
2014-01-01
The USDA Forest Service’s Asheville, North Carolina-based Eastern Forest Environmental Threat Assessment Center and Prineville, Oregon-based Western Wildlands Environmental Threat Assessment Center partnered with Stennis Space Center and other agencies to create an early warning system to identify, characterize, and track disturbances from potential forest threats. The result was ForWarn, which is now being used by federal and state forest and natural resource managers.
NASA Astrophysics Data System (ADS)
Zhang, S. F.; Yin, J.; Liu, Y.; Sha, Z. H.; Ma, F. J.
2016-11-01
There always exists severe non-uniform wear of brake pad in large-megawatt wind turbine brake during the braking process, which has the brake pad worn out in advance and even threats the safety production of wind turbine. The root cause of this phenomenon is the non-uniform deformation caused by thermal-structural coupling effect between brake pad and disc while braking under the conditions of both high speed and heavy load. For this problem, mathematical model of thermal-structural coupling analysis is built. Based on the topology optimization method of Solid Isotropic Microstructures with Penalization, SIMP, structure topology optimization of brake pad is developed considering the deformation caused by thermal-structural coupling effect. The objective function is the minimum flexibility, and the structure topology optimization model of brake pad is established after indirect thermal- structural coupling analysis. Compared with the optimization result considering non-thermal- structural coupling, the conspicuous influence of thermal effect on brake pad wear and deformation is proven as well as the rationality of taking thermal-structural coupling effect as optimization condition. Reconstructed model is built according to the result, meanwhile analysis for verification is carried out with the same working condition. This study provides theoretical foundation for the design of high-speed and heavy-load brake pad. The new structure may provide design reference for improving the stress condition between brake pad and disc, enhancing the use ratio of friction material and increasing the working performance of large-megawatt wind turbine brake.
Eight habitats, 38 threats and 55 experts: Assessing ecological risk in a multi-use marine region
Jones, Alice R.; Deveney, Marty R.; Ward, Tim M.; Gillanders, Bronwyn M.
2017-01-01
Identifying the relative risk human activities pose to a habitat, and the ecosystem services they provide, can guide management prioritisation and resource allocation. Using a combination of expert elicitation to assess the probable effect of a threat and existing data to assess the level of threat exposure, we conducted a risk assessment for 38 human-mediated threats to eight marine habitats (totalling 304 threat-habitat combinations) in Spencer Gulf, Australia. We developed a score-based survey to collate expert opinion and assess the relative effect of each threat to each habitat, as well as a novel and independent measure of knowledge-based uncertainty. Fifty-five experts representing multiple sectors and institutions participated in the study, with 6 to 15 survey responses per habitat (n = 81 surveys). We identified key threats specific to each habitat; overall, climate change threats received the highest risk rankings, with nutrient discharge identified as a key local-scale stressor. Invasive species and most fishing-related threats, which are commonly identified as major threats to the marine environment, were ranked as low-tier threats to Spencer Gulf, emphasising the importance of regionally-relevant assessments. Further, we identified critical knowledge gaps and quantified uncertainty scores for each risk. Our approach will facilitate prioritisation of resource allocation in a region of increasing social, economic and environmental importance, and can be applied to marine regions where empirical data are lacking. PMID:28489912
2013-01-01
Background The interRAI Acute Care instrument is a multidimensional geriatric assessment system intended to determine a hospitalized older persons’ medical, psychosocial and functional capacity and needs. Its objective is to develop an overall plan for treatment and long-term follow-up based on a common set of standardized items that can be used in various care settings. A Belgian web-based software system (BelRAI-software) was developed to enable clinicians to interpret the output and to communicate the patients’ data across wards and care organizations. The purpose of the study is to evaluate the (dis)advantages of the implementation of the interRAI Acute Care instrument as a comprehensive geriatric assessment instrument in an acute hospital context. Methods In a cross-sectional multicenter study on four geriatric wards in three acute hospitals, trained clinical staff (nurses, occupational therapists, social workers, and geriatricians) assessed 410 inpatients in routine clinical practice. The BelRAI-system was evaluated by focus groups, observations, and questionnaires. The Strengths, Weaknesses, Opportunities and Threats were mapped (SWOT-analysis) and validated by the participants. Results The primary strengths of the BelRAI-system were a structured overview of the patients’ condition early after admission and the promotion of multidisciplinary assessment. Our study was a first attempt to transfer standardized data between home care organizations, nursing homes and hospitals and a way to centralize medical, allied health professionals and nursing data. With the BelRAI-software, privacy of data is guaranteed. Weaknesses are the time-consuming character of the process and the overlap with other assessment instruments or (electronic) registration forms. There is room for improving the user-friendliness and the efficiency of the software, which needs hospital-specific adaptations. Opportunities are a timely and systematic problem detection and continuity of care. An actual shortage of funding of personnel to coordinate the assessment process is the most important threat. Conclusion The BelRAI-software allows standardized transmural information transfer and the centralization of medical, allied health professionals and nursing data. It is strictly secured and follows strict privacy regulations, allowing hospitals to optimize (transmural) communication and interaction. However, weaknesses and threats exist and must be tackled in order to promote large scale implementation. PMID:24007312
Devriendt, Els; Wellens, Nathalie I H; Flamaing, Johan; Declercq, Anja; Moons, Philip; Boonen, Steven; Milisen, Koen
2013-09-05
The interRAI Acute Care instrument is a multidimensional geriatric assessment system intended to determine a hospitalized older persons' medical, psychosocial and functional capacity and needs. Its objective is to develop an overall plan for treatment and long-term follow-up based on a common set of standardized items that can be used in various care settings. A Belgian web-based software system (BelRAI-software) was developed to enable clinicians to interpret the output and to communicate the patients' data across wards and care organizations. The purpose of the study is to evaluate the (dis)advantages of the implementation of the interRAI Acute Care instrument as a comprehensive geriatric assessment instrument in an acute hospital context. In a cross-sectional multicenter study on four geriatric wards in three acute hospitals, trained clinical staff (nurses, occupational therapists, social workers, and geriatricians) assessed 410 inpatients in routine clinical practice. The BelRAI-system was evaluated by focus groups, observations, and questionnaires. The Strengths, Weaknesses, Opportunities and Threats were mapped (SWOT-analysis) and validated by the participants. The primary strengths of the BelRAI-system were a structured overview of the patients' condition early after admission and the promotion of multidisciplinary assessment. Our study was a first attempt to transfer standardized data between home care organizations, nursing homes and hospitals and a way to centralize medical, allied health professionals and nursing data. With the BelRAI-software, privacy of data is guaranteed. Weaknesses are the time-consuming character of the process and the overlap with other assessment instruments or (electronic) registration forms. There is room for improving the user-friendliness and the efficiency of the software, which needs hospital-specific adaptations. Opportunities are a timely and systematic problem detection and continuity of care. An actual shortage of funding of personnel to coordinate the assessment process is the most important threat. The BelRAI-software allows standardized transmural information transfer and the centralization of medical, allied health professionals and nursing data. It is strictly secured and follows strict privacy regulations, allowing hospitals to optimize (transmural) communication and interaction. However, weaknesses and threats exist and must be tackled in order to promote large scale implementation.
NASA Astrophysics Data System (ADS)
Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful
2017-09-01
Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.
The Perceived Threat of Affirmative Action Policy
1975-06-06
as- sumption was made that affirmative action threat was a phenomenon which was separate and distinct from general racial feelings. The...the respond- ents. However, affirmative action threat was found to be differentially related to general racial feelings at the .001 confidence...level. Thus, affirmative action threat feelings were not independent from general racial feelings. Based on the findings of this study, it was
77 FR 271 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-04
... Threat Reduction Agency, 1680 Texas Street SE., Kirtland Air Force Base, Albuquerque, NM 87117-5669... Threat Reduction Agency, 1680 Texas Street SE., Kirtland Air Force Base, Albuquerque, NM 87117-5669...
NASA Astrophysics Data System (ADS)
Oreskes, N.; Lewandowsky, S.
2016-12-01
Title: The place of drama in scienceAbstract: Many climate scientists have been reluctant to speak strongly about climate change for fear of being viewed as alarmist or dramatic. Equating drama with bias and lack of objectivity, some consider that there is "no place for drama in science." Many scientists strive to present their findings in an undramatic manner that will not provoke a strong response in the reader. Several studies have demonstrated that climate scientists have tended to under-estimate and under-state the threat of climate change—what has been labelled "Erring on the Side of Least Drama" (ESLD) (Brysse et al., 2012). ESLD is a bias in science, one that leads us to under-predict outcomes and under-state threats. Downplaying alarming results in order to avoid provoking emotion in others is not objective. Under-predicting the severity of climate change can also be interpreted as an optimistic bias: it suggests that things are not as bad as they might be. A related phenomenon is when climate scientists and researchers in allied disciplines have expressed considerable optimism about unproven `breakthrough' technologies, such as carbon dioxide removal from the atmosphere, and their capacity to yield the net negative emissions that will likely be required to keep global temperature increases within the window agreed at Paris." The changes unfolding in the climate system are already significant, and threaten to become truly dramatic. What is our responsibility in this situation? Scientists should move neither toward nor away from drama, optimism or pessimism, but rather toward full and objective articulation of the entire range of scientific findings. Scientists should encourage the public and policy makers to mitigate the climate crisis, and to this end some optimism may be a legitimate motivating tool, but only insofar as it is evidence-based. Unless we find a way to satisfy those twin requirements, our legacy may be that we failed adequately to warn society of what was about to unfold and what action was required.
NASA Astrophysics Data System (ADS)
Ju, Yaping; Zhang, Chuhua
2016-03-01
Blade fouling has been proved to be a great threat to compressor performance in operating stage. The current researches on fouling-induced performance degradations of centrifugal compressors are based mainly on simplified roughness models without taking into account the realistic factors such as spatial non-uniformity and randomness of the fouling-induced surface roughness. Moreover, little attention has been paid to the robust design optimization of centrifugal compressor impellers with considerations of blade fouling. In this paper, a multi-objective robust design optimization method is developed for centrifugal impellers under surface roughness uncertainties due to blade fouling. A three-dimensional surface roughness map is proposed to describe the nonuniformity and randomness of realistic fouling accumulations on blades. To lower computational cost in robust design optimization, the support vector regression (SVR) metamodel is combined with the Monte Carlo simulation (MCS) method to conduct the uncertainty analysis of fouled impeller performance. The analyzed results show that the critical fouled region associated with impeller performance degradations lies at the leading edge of blade tip. The SVR metamodel has been proved to be an efficient and accurate means in the detection of impeller performance variations caused by roughness uncertainties. After design optimization, the robust optimal design is found to be more efficient and less sensitive to fouling uncertainties while maintaining good impeller performance in the clean condition. This research proposes a systematic design optimization method for centrifugal compressors with considerations of blade fouling, providing a practical guidance to the design of advanced centrifugal compressors.
NASA Astrophysics Data System (ADS)
Qiu, Sihang; Chen, Bin; Wang, Rongxiao; Zhu, Zhengqiu; Wang, Yuan; Qiu, Xiaogang
2018-04-01
Hazardous gas leak accident has posed a potential threat to human beings. Predicting atmospheric dispersion and estimating its source become increasingly important in emergency management. Current dispersion prediction and source estimation models cannot satisfy the requirement of emergency management because they are not equipped with high efficiency and accuracy at the same time. In this paper, we develop a fast and accurate dispersion prediction and source estimation method based on artificial neural network (ANN), particle swarm optimization (PSO) and expectation maximization (EM). The novel method uses a large amount of pre-determined scenarios to train the ANN for dispersion prediction, so that the ANN can predict concentration distribution accurately and efficiently. PSO and EM are applied for estimating the source parameters, which can effectively accelerate the process of convergence. The method is verified by the Indianapolis field study with a SF6 release source. The results demonstrate the effectiveness of the method.
Lost in translation: neuropsychiatric drug development.
Becker, Robert E; Greig, Nigel H
2010-12-08
Recent studies have identified troubling method and practice lapses in neuropsychiatric drug developments. These problems have resulted in errors that are of sufficient magnitude to invalidate clinical trial data and interpretations. We identify two potential sources for these difficulties: investigators selectively choosing scientific practices for demonstrations of efficacy in human-testing phases of drug development and investigators failing to anticipate the needs of practitioners who must optimize treatment for the individual patient. When clinical investigators neglect to use clinical trials as opportunities to test hypotheses of disease mechanisms in humans, the neuropsychiatric knowledge base loses both credibility and scope. When clinical investigators do not anticipate the need to translate discoveries into applications, the practitioner cannot provide optimal care for the patient. We conclude from this evidence that clinical trials, and other aspects of neuropsychiatric drug development, must adopt more practices from basic science and show greater responsiveness to conditions of clinical practice. We feel that these changes are necessary to overcome current threats to the validity and utility of studies of neurological and psychiatric drugs.
Spacecraft Mission Design for the Mitigation of the 2017 PDC Hypothetical Asteroid Threat
NASA Technical Reports Server (NTRS)
Barbee, Brent W.; Sarli, Bruno V.; Lyzhoft, Josh; Chodas, Paul W.; Englander, Jacob A.
2017-01-01
This paper presents a detailed mission design analysis results for the 2017 Planetary Defense Conference (PDC) Hypothetical Asteroid Impact Scenario, documented at https:cneos.jpl.nasa.govpdcspdc17. The mission design includes campaigns for both reconnaissance (flyby or rendezvous) of the asteroid (to characterize it and the nature of the threat it poses to Earth) and mitigation of the asteroid, via kinetic impactor deflection, nuclear explosive device (NED) deflection, or NED disruption. Relevant scenario parameters are varied to assess the sensitivity of the design outcome, such as asteroid bulk density, asteroid diameter, momentum enhancement factor, spacecraft launch vehicle, and mitigation system type. Different trajectory types are evaluated in the mission design process from purely ballistic to those involving optimal midcourse maneuvers, planetary gravity assists, and/or low-thrust solar electric propulsion. The trajectory optimization is targeted around peak deflection points that were found through a novel linear numerical technique method. The optimization process includes constrain parameters, such as Earth departure date, launch declination, spacecraft, asteroid relative velocity and solar phase angle, spacecraft dry mass, minimum/maximum spacecraft distances from Sun and Earth, and Earth-spacecraft communications line of sight. Results show that one of the best options for the 2017 PDC deflection is solar electric propelled rendezvous mission with a single spacecraft using NED for the deflection.
Beadle, Elizabeth Jane; Ownsworth, Tamara; Fleming, Jennifer; Shum, David H K
2018-05-09
Although changes to self-identity or self-discrepancy are common after severe traumatic brain injury (TBI), the mechanisms underlying these changes are poorly understood. This study aimed to examine the influence of personality characteristics and cognitive appraisals on self-discrepancy. Participants were 51 adults (74% male) with severe TBI (M age = 36.22 years; SD = 12.65) who were on average 34 months (SD = 40.29) post-injury. They completed self-report measures of personality style (optimism and defensiveness), cognitive appraisals (threat appraisals, rumination and reflection and perceived coping resources), and self-discrepancy (Head Injury Semantic Differential Scale - III). Correlation analyses identified that higher levels of optimism, defensiveness and perceived coping resources were significantly associated with more positive self-discrepancy (r = .29-.47, p < .05), whereas higher threat appraisals and rumination were significantly related to more negative self-discrepancy (r = -.50-.57, p < .001). After controlling for personality characteristics, cognitive appraisals significantly accounted for self-discrepancy (R 2 change = .15). Moreover, rumination significantly mediated the relationship between optimism and self-discrepancy. In summary, cognitive appraisals were found to be related to self-discrepancy, independent of personality characteristics. Rumination in particular may be an important target of psychological intervention for individuals experiencing negative self-discrepancy.
A Novel Fiber Optic Based Surveillance System for Prevention of Pipeline Integrity Threats.
Tejedor, Javier; Macias-Guarasa, Javier; Martins, Hugo F; Piote, Daniel; Pastor-Graells, Juan; Martin-Lopez, Sonia; Corredera, Pedro; Gonzalez-Herraez, Miguel
2017-02-12
This paper presents a novel surveillance system aimed at the detection and classification of threats in the vicinity of a long gas pipeline. The sensing system is based on phase-sensitive optical time domain reflectometry ( ϕ -OTDR) technology for signal acquisition and pattern recognition strategies for threat identification. The proposal incorporates contextual information at the feature level and applies a system combination strategy for pattern classification. The contextual information at the feature level is based on the tandem approach (using feature representations produced by discriminatively-trained multi-layer perceptrons) by employing feature vectors that spread different temporal contexts. The system combination strategy is based on a posterior combination of likelihoods computed from different pattern classification processes. The system operates in two different modes: (1) machine + activity identification, which recognizes the activity being carried out by a certain machine, and (2) threat detection, aimed at detecting threats no matter what the real activity being conducted is. In comparison with a previous system based on the same rigorous experimental setup, the results show that the system combination from the contextual feature information improves the results for each individual class in both operational modes, as well as the overall classification accuracy, with statistically-significant improvements.
CrossTalk. The Journal of Defense Software Engineering. Volume 25, Number 6
2012-12-01
Cyber Security Threat Definition Communicable Noncommunicable Based on Risky Behavior Coordinated Trojan horse programs Threats hidden in a...for Cyber Security Threats Cyber Security Threat Communicable Noncommunicable Risky Behaviors Coordinated Type of Intervention (at the System...types of data are breached. Further, educational materials on risky behaviors (e.g., for home Internet users) as well as recommended guide- lines for
Identifying key conservation threats to Alpine birds through expert knowledge
Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco
2016-01-01
Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659
A Bat Algorithm with Mutation for UCAV Path Planning
Wang, Gaige; Guo, Lihong; Duan, Hong; Liu, Luo; Wang, Heqi
2012-01-01
Path planning for uninhabited combat air vehicle (UCAV) is a complicated high dimension optimization problem, which mainly centralizes on optimizing the flight route considering the different kinds of constrains under complicated battle field environments. Original bat algorithm (BA) is used to solve the UCAV path planning problem. Furthermore, a new bat algorithm with mutation (BAM) is proposed to solve the UCAV path planning problem, and a modification is applied to mutate between bats during the process of the new solutions updating. Then, the UCAV can find the safe path by connecting the chosen nodes of the coordinates while avoiding the threat areas and costing minimum fuel. This new approach can accelerate the global convergence speed while preserving the strong robustness of the basic BA. The realization procedure for original BA and this improved metaheuristic approach BAM is also presented. To prove the performance of this proposed metaheuristic method, BAM is compared with BA and other population-based optimization methods, such as ACO, BBO, DE, ES, GA, PBIL, PSO, and SGA. The experiment shows that the proposed approach is more effective and feasible in UCAV path planning than the other models. PMID:23365518
Cai, Tie; Ting, Hu; Jin-Lan, Zhang
2016-01-01
Coffee is one of the most common and most valuable beverages. According to International Coffee Organization (ICO) reports, the adulteration of coffee for financial reasons is regarded as the most serious threat to the sustainable development of the coffee market. In this work, a novel strategy for adulteration identification in ground coffee was developed based on UPLC-HRMS oligosaccharide profiling. Along with integrated statistical analysis, 17 oligosaccharide composition were identified as markers for the identification of soybeans and rice in ground coffee. This strategy, validated by manual mixtures, optimized both the reliability and authority of adulteration identification. Rice and soybean adulterants present in ground coffee in amounts as low as 5% were identified and evaluated. Some commercial ground coffees were also successfully tested using this strategy. Copyright © 2015 Elsevier Ltd. All rights reserved.
Pattern-Based Design of Insider Threat Programs
2014-12-01
also applied these models to develop best practices and technical controls for mitigating insider threat. In some cases of in- sider threat...departing insiders might take valuable IP with them. One set of practices and controls designed to reduce the risk of insider IP theft is based on case data...describing this set of practices and controls helps to balance the costs of monitoring employee behavior for suspicious actions against the risk of
Thermal bioaerosol cloud tracking with Bayesian classification
NASA Astrophysics Data System (ADS)
Smith, Christian W.; Dupuis, Julia R.; Schundler, Elizabeth C.; Marinelli, William J.
2017-05-01
The development of a wide area, bioaerosol early warning capability employing existing uncooled thermal imaging systems used for persistent perimeter surveillance is discussed. The capability exploits thermal imagers with other available data streams including meteorological data and employs a recursive Bayesian classifier to detect, track, and classify observed thermal objects with attributes consistent with a bioaerosol plume. Target detection is achieved based on similarity to a phenomenological model which predicts the scene-dependent thermal signature of bioaerosol plumes. Change detection in thermal sensor data is combined with local meteorological data to locate targets with the appropriate thermal characteristics. Target motion is tracked utilizing a Kalman filter and nearly constant velocity motion model for cloud state estimation. Track management is performed using a logic-based upkeep system, and data association is accomplished using a combinatorial optimization technique. Bioaerosol threat classification is determined using a recursive Bayesian classifier to quantify the threat probability of each tracked object. The classifier can accept additional inputs from visible imagers, acoustic sensors, and point biological sensors to improve classification confidence. This capability was successfully demonstrated for bioaerosol simulant releases during field testing at Dugway Proving Grounds. Standoff detection at a range of 700m was achieved for as little as 500g of anthrax simulant. Developmental test results will be reviewed for a range of simulant releases, and future development and transition plans for the bioaerosol early warning platform will be discussed.
Explosives (and other threats) detection using pulsed neutron interrogation and optimized detectors
NASA Astrophysics Data System (ADS)
Strellis, Dan A.; Elsalim, Mashal; Gozani, Tsahi
2011-06-01
We have previously reported results from a human-portable system using neutron interrogation to detect contraband and explosives. We summarized our methodology for distinguishing threat materials such as narcotics, C4, and mustard gas in the myriad of backgrounds present in the maritime environment. We are expanding our mission for the Domestic Nuclear Detection Office (DNDO) to detect Special Nuclear Material (SNM) through the detection of multiple fission signatures without compromising the conventional threat detection performance. This paper covers our initial investigations into using neutrons from compact pulsed neutron generators via the d(D,n)3He or d(T,n)α reactions with energies of ~2.5 and 14 MeV, respectively, for explosives (and other threats) detection along with a variety of gamma-ray detectors. Fast neutrons and thermal neutrons (after successive collisions) can stimulate the emission of various threat detection signatures. For explosives detection, element-specific gamma-ray signatures via the (n,n'γ) inelastic scattering reaction and the (n,'γ) thermal capture reaction are detected. For SNM, delayed gamma-rays following fission can be measured with the same detector. Our initial trade-off investigations of several gamma-ray detectors types (NaI, CsI, LaBr3, HPGe) for measuring gamma-ray signatures in a pulsed neutron environment for potential application in a human-portable active interrogation system are covered in this paper.
Psychological Correlates of Civilian Preparedness for Conflicts.
Bodas, Moran; Siman-Tov, Maya; Kreitler, Shulamith; Peleg, Kobi
2017-08-01
Preparedness for emergencies and disasters is imperative for public resilience. Previous studies have revealed low levels of civilian preparedness for conflicts. Classic behavioral models prove inapt in describing preparedness patterns in victimized populations chronically exposed to this threat. In an effort to expand this perspective, we hypothesized that other psychological constructs are correlated with preparedness. A cross-sectional, Internet-based study was performed in Israel in early 2016. A sociodemographically diverse sample included 385 participants, Jews and Arabs. The tools included a preparedness index, sense of preparedness questionnaire, Trait Anxiety Inventory, Life Orientation Test, Behavioral Inhibition & Activation System scales, and ego defenses. The results suggested that optimistic and rational individuals reported significantly higher levels of preparedness, whereas those who scored highly on the trait anxiety scale and those with a tendency to use denial coping mechanisms reported significantly lower levels of preparedness. The findings suggest that additional constructs, other than classic threat perception components, might play a key role in governing preparedness behavior. In particular, psychological manipulation of dispositional optimism or optimistic thinking might be effective in motivating preparedness behavior. Future research should explore such innovative ways to promoting preparedness. (Disaster Med Public Health Preparedness. 2017;11:451-459).
NASA Astrophysics Data System (ADS)
Alfonso, Krystal; Elsalim, Mashal; King, Michael; Strellis, Dan; Gozani, Tsahi
2013-04-01
MCNPX simulations have been used to guide the development of a portable inspection system for narcotics, explosives, and special nuclear material (SNM) detection. The system seeks to address these threats to national security by utilizing a high-yield, compact neutron source to actively interrogate the threats and produce characteristic signatures that can then be detected by radiation detectors. The portability of the system enables rapid deployment and proximity to threats concealed in small spaces. Both dD and dT electronic neutron generators (ENG) were used to interrogate ammonium nitrate fuel oil (ANFO) and cocaine hydrochloride, and the detector response of NaI, CsI, and LaBr3 were compared. The effect of tungsten shielding on the neutron flux in the gamma ray detectors was investigated, while carbon, beryllium, and polyethylene ENG moderator materials were optimized by determining the reaction rate density in the threats. In order to benchmark the modeling results, experimental measurements are compared with MCNPX simulations. In addition, the efficiency and die-away time of a portable differential die-away analysis (DDAA) detector using 3He proportional counters for SNM detection has been determined.
Carey, Rachel N.; McDermott, Daragh T.; Sarma, Kiran M.
2013-01-01
The existing empirical research exploring the impact of threat appeals on driver behavior has reported inconsistent findings. In an effort to provide an up-to-date synthesis of the experimental findings, meta-analytic techniques were employed to examine the impact of threat-based messages on fear arousal and on lab-based indices of driving behavior. Experimental studies (k = 13, N = 3044), conducted between 1990 and 2011, were included in the analyses. The aims of the current analysis were (a) to examine whether or not the experimental manipulations had a significant impact on evoked fear, (b) to examine the impact of threat appeals on three distinct indices of driving, and (c) to identify moderators and mediators of the relationship between fear and driving outcomes. Large effects emerged for the level of fear evoked, with experimental groups reporting increased fear arousal in comparison to control groups (r = .64, n = 619, p<.01). The effect of threat appeals on driving outcomes, however, was not significant (r = .03, p = .17). This analysis of the experimental literature indicates that threat appeals can lead to increased fear arousal, but do not appear to have the desired impact on driving behavior. We discuss these findings in the context of threat-based road safety campaigns and future directions for experimental research in this area. PMID:23690955
Carey, Rachel N; McDermott, Daragh T; Sarma, Kiran M
2013-01-01
The existing empirical research exploring the impact of threat appeals on driver behavior has reported inconsistent findings. In an effort to provide an up-to-date synthesis of the experimental findings, meta-analytic techniques were employed to examine the impact of threat-based messages on fear arousal and on lab-based indices of driving behavior. Experimental studies (k = 13, N = 3044), conducted between 1990 and 2011, were included in the analyses. The aims of the current analysis were (a) to examine whether or not the experimental manipulations had a significant impact on evoked fear, (b) to examine the impact of threat appeals on three distinct indices of driving, and (c) to identify moderators and mediators of the relationship between fear and driving outcomes. Large effects emerged for the level of fear evoked, with experimental groups reporting increased fear arousal in comparison to control groups (r = .64, n = 619, p<.01). The effect of threat appeals on driving outcomes, however, was not significant (r = .03, p = .17). This analysis of the experimental literature indicates that threat appeals can lead to increased fear arousal, but do not appear to have the desired impact on driving behavior. We discuss these findings in the context of threat-based road safety campaigns and future directions for experimental research in this area.
Clustering Molecular Dynamics Trajectories for Optimizing Docking Experiments
De Paris, Renata; Quevedo, Christian V.; Ruiz, Duncan D.; Norberto de Souza, Osmar; Barros, Rodrigo C.
2015-01-01
Molecular dynamics simulations of protein receptors have become an attractive tool for rational drug discovery. However, the high computational cost of employing molecular dynamics trajectories in virtual screening of large repositories threats the feasibility of this task. Computational intelligence techniques have been applied in this context, with the ultimate goal of reducing the overall computational cost so the task can become feasible. Particularly, clustering algorithms have been widely used as a means to reduce the dimensionality of molecular dynamics trajectories. In this paper, we develop a novel methodology for clustering entire trajectories using structural features from the substrate-binding cavity of the receptor in order to optimize docking experiments on a cloud-based environment. The resulting partition was selected based on three clustering validity criteria, and it was further validated by analyzing the interactions between 20 ligands and a fully flexible receptor (FFR) model containing a 20 ns molecular dynamics simulation trajectory. Our proposed methodology shows that taking into account features of the substrate-binding cavity as input for the k-means algorithm is a promising technique for accurately selecting ensembles of representative structures tailored to a specific ligand. PMID:25873944
NASA Astrophysics Data System (ADS)
Winson, A.; Kinvig, H.; Gottsmann, J.; Partington, E.; Geyer, A.
2008-10-01
We present an analysis of volcanic threat of Nisyros island (Greece) based on a catalogue of questions compiled for the USGS National Volcano Early Warning System (NVEWS). We find that the score puts Nisyros in the league of volcanoes posing a very high threat. US volcanoes with a comparable threat level include Mt. St. Helens, Augustine and the Long Valley caldera.
2014-02-01
object that may present a threat to his or h er satellites must still provide direction that responds to that threat This article discusses a dilemma...space-based threats .ŕ The Air Force achieves space superiority by conducting operations that support the war fighter (space force enhancement); by...the space era, threats and issues have arisen to chal- lenge US operations in these areas. Indeed, as declared in the National Security Space Strategy
Goldin, Philippe R.; Manber, Tali; Hakimi, Shabnam; Canli, Turhan; Gross, James J.
2014-01-01
Context Social anxiety disorder is thought to involve emotional hyper-reactivity, cognitive distortions, and ineffective emotion regulation. While the neural bases of emotional reactivity to social stimuli have been described, the neural bases of emotional reactivity and cognitive regulation during social and physical threat, and their relationship to social anxiety symptom severity, have yet to be investigated. Objective This study investigated behavioral and neural correlates of emotional reactivity and cognitive regulation in patients and controls during processing of social and physical threat stimuli. Design Participants were trained to implement cognitive-linguistic regulation of emotional reactivity induced by social (harsh facial expressions) and physical (violent scenes) threat while undergoing functional magnetic resonance imaging and providing behavioral ratings of negative emotion experience. Setting Academic psychology department. Participants 15 adults with social anxiety disorder and 17 demographically-matched healthy controls. Main Outcome Measures Blood oxygen level dependent signal and negative emotion ratings. Results Behaviorally, patients reported greater negative emotion than controls during social and physical threat, but showed equivalent reduction in negative emotion following cognitive regulation. Neurally, viewing social threat resulted in greater emotion-related neural responses in patients than controls, with social anxiety symptom severity related to activity in a network of emotion and attention processing regions in patients only. Viewing physical threat produced no between-group differences. Regulation during social threat resulted in greater cognitive and attention regulation-related brain activation in controls compared to patients. Regulation during physical threat produced greater cognitive control-related response (i.e., right DLPFC) in patients compared to controls. Conclusions Compared to controls, patients demonstrated exaggerated negative emotion reactivity and reduced cognitive regulation related neural activation, specifically for social threat stimuli. These findings help to elucidate potential neural mechanisms of emotion regulation that might serve as biomarkers for interventions for social anxiety disorder. PMID:19188539
Nowhere to Hide: The Growing Threat to Air Bases
2013-06-01
May–June 2013 Air & Space Power Journal | 30 Feature Nowhere to Hide The Growing Threat to Air Bases Col Shannon W. Caudill, USAF Maj Benjamin R...May–June 2013 Air & Space Power Journal | 33 Caudill & Jacobson Nowhere to Hide Feature The Growing Precision of Indirect Fire IDF has become the...personnel.22 More troubling still is the growing threat from within the ranks of American personnel. On 11 May 2009, five American military mem- bers
1988-08-01
be possible for management at all levels to review the S&T Program in order to optimize the investment in two ways--(1) over time and (2) by priority...easier at the higher management levels. a. Optimizing Over Time One concern in investing in new technology is to balance the near-term and far-term... managed and integrated into systems that meet the perceived threat on a timely basis. To this end, the Core Group formed working groups to find
Jiang, Lixiang; Luo, Jing; Dong, Wenjie; Wang, Chengmin; Jin, Wen; Xia, Yuetong; Wang, Haijing; Ding, Hua; Jiang, Long; He, Hongxuan
2015-07-01
H5N1 avian influenza has caused serious economic losses as well as posed significant threats to public health, agriculture and wildlife. It is important to develop a rapid, sensitive and specific detection platform suitable for disease surveillance and control. In this study, a highly sensitive, specific and rapid biosensor based on polydiacetylene was developed for detecting H5 influenza virus. The polydiacetylene based biosensor was produced from an optimized ratio of 10,12-pentacosadiynoic acid and 1,2-dimyristoyl-sn-glycero-3-phosphocholine, with the anti-H5 influenza antibody embedded onto the vesicle surface. The optimized polydiacetylene vesicle could detect H5 influenza virus sensitively with a detection limit of 0.53 copies/μL, showing a dramatic blue-to-red color change that can be observed directly by the naked eye and recorded by a UV-vis spectrometer. The sensitivity, specificity and accuracy of the biosensor were also evaluated. The sensor could specifically differentiate H5 influenza virus from H3 influenza virus, Newcastle disease virus and porcine reproductive and respiratory syndrome virus. Detection using tracheal swabs was in accord with virus isolation results, and comparable to the RT-PCR method. These results offer the possibility and potential of simple polydiacetylene based bio-analytical method for influenza surveillance. Copyright © 2015 Elsevier B.V. All rights reserved.
Reactions to a health threat: dispositional threat orientations and message characteristics.
Thompson, Suzanne C; Schlehofer, Michèle M; Gonzalez, Amelia; Denison, Elizabeth
2011-05-01
This study explored the interactive effects of dispositional threat orientation, type of message, and having children on reactions to a message about exposure to bisphenol A (BPA) in plastics. The study used a 2 (message: Fear Arousal or Plain)×2 (parenting status: child or no child)×2 (threat orientation: high or low) mixed factorial design. Adults (N= 200) recruited via the Internet completed measures of threat orientations, reported whether they were a parent, and read either a low or high fear-arousal message about the risks of BPA exposure. They then completed measures of reactions to the message (perceived susceptibility to BPA effects, negative emotions, and behavioural intentions to engage in protection). Depending on threat orientations, the fear arousal version of the message and parenthood had strikingly different effects, ranging from no effect (for those high in a control-based approach) to prompting change (for those low in a control-based approach) to counterproductive (for those high in an optimistic denial approach). These findings suggest that considering individual differences and their interactions with situational factors could improve both the predictive ability of threat protection theories and the delivery of messages intended to change behaviour. ©2010 The British Psychological Society.
The Cybercitizen Dimension: A Quantitative Study Using a Threat Avoidance Perspective
ERIC Educational Resources Information Center
Manzano, Debbie L.
2012-01-01
The importance of information security is understated and theory-based empirical research that explains computer users voluntary IT threat avoidance behavior is lacking. Most existing information security research on individual behaviors has been focused in organizational settings where the threat avoidance behavior is mandatory and dictated by…
ERIC Educational Resources Information Center
Hansen, John W.
2005-01-01
The author discusses three threats to the American way of life: the first threat is related to human and technological growth; the second is a new division of labor; and the third threat is security and safety. The author suggests two solutions to address these challenges: (1) better technological planning and decisions based on technological…
Optimal concentrations in nectar feeding
Kim, Wonjung; Gilet, Tristan; Bush, John W. M.
2011-01-01
Nectar drinkers must feed quickly and efficiently due to the threat of predation. While the sweetest nectar offers the greatest energetic rewards, the sharp increase of viscosity with sugar concentration makes it the most difficult to transport. We here demonstrate that the sugar concentration that optimizes energy transport depends exclusively on the drinking technique employed. We identify three nectar drinking techniques: active suction, capillary suction, and viscous dipping. For each, we deduce the dependence of the volume intake rate on the nectar viscosity and thus infer an optimal sugar concentration consistent with laboratory measurements. Our results provide the first rationale for why suction feeders typically pollinate flowers with lower sugar concentration nectar than their counterparts that use viscous dipping. PMID:21949358
2009-03-01
encountered. From individuals to large industries , people deal with such problems in order to maximize the benefit and gain. Third, the effect of the...Format”. http://www.cenapad.unicamp.br/ parque /manuais/OSL/oslweb/features/featur11.htm 17 December 2008 Chhajed, Dilip, Richard L. Francis, and
Coping with Disaster: The Case of Israeli Adolescents under Threat of Missile Attack.
ERIC Educational Resources Information Center
Zeidner, Moshe
1993-01-01
Studied the relationships of coping resources, optimism, perceived control, and coping strategies to anxiety, physical symptoms, and cognitive functioning for 69 male and 40 female Jewish Israeli adolescents in real crisis during the Persian Gulf War. Discusses the implications of the reported mixture of active and palliative coping strategies.…
Health Information Technology Risks, Errors, External Threats, and Human Complacency.
Felkey, Bill G; Fox, Brent I
2015-06-01
It may seem that our position is one of unwavering support for all things health information technology (HIT). However, we like to believe that we are cautious and deliberate in our evaluation of HIT. This month, we explore some of the common overt and covert challenges to optimal use of HIT.
ERIC Educational Resources Information Center
Miller, Claude H.; Ivanov, Bobi; Sims, Jeanetta; Compton, Josh; Harrison, Kylie J.; Parker, Kimberly A.; Parker, James L.; Averbeck, Joshua M.
2013-01-01
The efficacy of inoculation theory has been confirmed by decades of empirical research, yet optimizing its effectiveness remains a vibrant line of investigation. The present research turns to psychological reactance theory for a means of enhancing the core mechanisms of inoculation--threat and refutational preemption. Findings from a multisite…
ERIC Educational Resources Information Center
Kerssen-Griep, Jeff; Trees, April R.; Hess, Jon A.
2008-01-01
This study investigated how the face threat mitigation students received from their teachers during feedback influenced their judgments about mentored relationships with their teachers and the supportiveness of the classroom learning environment. Public speaking students (N=345) at three universities completed an online survey about the speech…
Restoring habitat corridors in fragmented landscapes using optimization and percolation models
Justin C. Williams; Stephanie A. Snyder
2005-01-01
Landscape fragmentation and habitat loss are significant threats to the conservation of biological diversity. Creating and restoring corridors between isolated habitat patches can help mitigate or reverse the impacts of fragmentation. It is important that restoration and protection efforts be undertaken in the most efficient and effective way possible because...
NASA Technical Reports Server (NTRS)
Wie, Bong; Barbee, Brent W.
2015-01-01
This paper presents the results of a NASA Innovative Advanced Concept (NIAC) Phase 2 study entitled "An Innovative Solution to NASA's Near-Earth Object (NEO) Impact Threat Mitigation Grand Challenge and Flight Validation Mission Architecture Development." This NIAC Phase 2 study was conducted at the Asteroid Deflection Research Center (ADRC) of Iowa State University in 2012-2014. The study objective was to develop an innovative yet practically implementable mitigation strategy for the most probable impact threat of an asteroid or comet with short warning time (< 5 years). The mitigation strategy described in this paper is intended to optimally reduce the severity and catastrophic damage of the NEO impact event, especially when we don't have sufficient warning times for non-disruptive deflection of a hazardous NEO. This paper provides an executive summary of the NIAC Phase 2 study results. Detailed technical descriptions of the study results are provided in a separate final technical report, which can be downloaded from the ADRC website (www.adrc.iastate.edu).
Estimation and detection information trade-off for x-ray system optimization
NASA Astrophysics Data System (ADS)
Cushing, Johnathan B.; Clarkson, Eric W.; Mandava, Sagar; Bilgin, Ali
2016-05-01
X-ray Computed Tomography (CT) systems perform complex imaging tasks to detect and estimate system parameters, such as a baggage imaging system performing threat detection and generating reconstructions. This leads to a desire to optimize both the detection and estimation performance of a system, but most metrics only focus on one of these aspects. When making design choices there is a need for a concise metric which considers both detection and estimation information parameters, and then provides the user with the collection of possible optimal outcomes. In this paper a graphical analysis of Estimation and Detection Information Trade-off (EDIT) will be explored. EDIT produces curves which allow for a decision to be made for system optimization based on design constraints and costs associated with estimation and detection. EDIT analyzes the system in the estimation information and detection information space where the user is free to pick their own method of calculating these measures. The user of EDIT can choose any desired figure of merit for detection information and estimation information then the EDIT curves will provide the collection of optimal outcomes. The paper will first look at two methods of creating EDIT curves. These curves can be calculated using a wide variety of systems and finding the optimal system by maximizing a figure of merit. EDIT could also be found as an upper bound of the information from a collection of system. These two methods allow for the user to choose a method of calculation which best fits the constraints of their actual system.
2002-09-01
Support 0605160D Counterproliferation Support (H) 0901502A Service Support to DTSA 0901502F Service Support to DTSA 0901502N Service Support to DTSA ...Base Operations Support 0901502A Service Support to DTSA (1F2C) Int’l Engagement & Threat Reduction 0901502F Service Support to DTSA (1F2C...Int’l Engagement & Threat Reduction 0901502N Service Support to DTSA (1F2C) Int’l Engagement & Threat Reduction 0901503A Service Support to OSD
Van Loo, Katie J; Rydell, Robert J
2013-03-01
This research examined whether feeling powerful can eliminate the deleterious effect of stereotype threat (i.e., concerns about confirming a negative self-relevant stereotype) on women's math performance. In Experiments 1 and 2, priming women with high power buffered them from reduced math performance in response to stereotype threat instructions, whereas women in the low and control power conditions showed poorer math performance in response to threat. Experiment 3 found that working memory capacity is one mechanism through which power moderates the effect of threat on women's math performance. In the low and control power conditions, women showed reduced working memory capacity in response to stereotype threat, accounting for threat's effect on performance. In contrast, women in the high power condition did not show reductions in working memory capacity or math performance in response to threat. This work demonstrates that perceived power moderates stereotype threat-based performance effects and explains why this occurs.
The Practice of Campus-Based Threat Assessment: An Overview
ERIC Educational Resources Information Center
Pollard, Jeffrey W.; Nolan, Jeffrey J.; Deisinger, Eugene R. D.
2012-01-01
This article provides an overview of threat assessment and management as implemented on campuses of higher education. Standards of practice and state calls for implementation are cited. An overview of some of the basic principles for threat assessment and management implementation is accompanied by examples of how they are utilized. Pitfalls…
Spacecraft Mission Design for the Mitigation of the 2017 PDC Hypothetical Asteroid Threat
NASA Technical Reports Server (NTRS)
Barbee, Brent W.; Sarli, Bruno V.; Lyzhoft, Joshua; Chodas, Paul W.; Englander, Jacob A.
2017-01-01
This paper presents a detailed mission design analysis results for the 2017 Planetary Defense Conference (PDC) Hypothetical Asteroid Impact Scenario, documented at https://cneos.jpl.nasa.gov/ pd/cs/pdc17/. The mission design includes campaigns for both reconnaissance (flyby or rendezvous) of the asteroid (to characterize it and the nature of the threat it poses to Earth) and mitigation of the asteroid, via kinetic impactor deflection, nuclear explosive device (NED) deflection, or NED disruption. Relevant scenario parameters are varied to assess the sensitivity of the design outcome, such as asteroid bulk density, asteroid diameter, momentum enhancement factor, spacecraft launch vehicle, and mitigation system type. Different trajectory types are evaluated in the mission design process from purely ballistic to those involving optimal midcourse maneuvers, planetary gravity assists, and/or lowthrust solar electric propulsion. The trajectory optimization is targeted around peak deflection points that were found through a novel linear numerical technique method. The optimization process includes constrain parameters, such as Earth departure date, launch declination, spacecraft/asteroid relative velocity and solar phase angle, spacecraft dry mass, minimum/maximum spacecraft distances from Sun and Earth, and Earth/spacecraft communications line of sight. Results show that one of the best options for the 2017 PDC deflection is solar electric propelled rendezvous mission with a single spacecraft using NED for the deflection
Suppressing epidemics with a limited amount of immunization units.
Schneider, Christian M; Mihaljev, Tamara; Havlin, Shlomo; Herrmann, Hans J
2011-12-01
The way diseases spread through schools, epidemics through countries, and viruses through the internet is crucial in determining their risk. Although each of these threats has its own characteristics, its underlying network determines the spreading. To restrain the spreading, a widely used approach is the fragmentation of these networks through immunization, so that epidemics cannot spread. Here we develop an immunization approach based on optimizing the susceptible size, which outperforms the best known strategy based on immunizing the highest-betweenness links or nodes. We find that the network's vulnerability can be significantly reduced, demonstrating this on three different real networks: the global flight network, a school friendship network, and the internet. In all cases, we find that not only is the average infection probability significantly suppressed, but also for the most relevant case of a small and limited number of immunization units the infection probability can be reduced by up to 55%.
Detection of Carbendazim Residues with a Colorimetric Sensor Based on Gold Nanoparticles
NASA Astrophysics Data System (ADS)
Ma, Y.; Jiang, H.; Shen, C.; Hou, Ch.; Huo, D.; Wu, H.; Yang, M.
2017-07-01
Carbendazim is among the most popular benzimidazole bactericides that are widely used to boost food production, and its residue poses a great threat to human health and the environment. In this paper, we presented a colorimetric sensor based on gold nanoparticles (Au-NPs) for the detection of carbendazim residues. The Au-NPs were stabilized by citric acid synthesized by chloroauric acid and sodium citrate with a diameter of about 13 nm. Upon reaction with carbendazim, the sensor gave a clear color change that could be distinguished with the naked eye. Thus we elaborated a new method for rapid determination of this benzimidazole bactericide. After optimization of the detection conditions, the sensor showed a very good linear relationship with the carbendazim concentrations varying from 10 to 600 ppb with a detection limit down to 3.4 ppb (S/N = 3). These preliminary results demonstrate that the presented sensor is promising for fast carbendazim analysis.
Galuska, Lee A
2014-02-01
Nurses must assume a transformational leadership role in increasing the quality, safety, access, and value in the health care system. To lead effectively in this transformation process, nurses must be prepared for leadership roles. A strong leadership knowledge based acquired through education provides the springboard for nursing leadership competency development. This metasynthesis of 27 studies provided a broad understanding of the contribution and effectiveness of education for leadership competency from the perspective of nurses who have experienced it. Four overarching themes emerged: evidence-based relevant content, optimized learning strategies, benefits to the learner and others, and tensions and threats to the application of learning. This study affirms the value of a strong educational foundation for nursing leadership. With the support of a firm, yet flexible, educational platform, nurses will be positioned to more effectively lead and partner in health care transformation.
Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.
Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A
2013-01-01
The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg
Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework
Carels, Robert A.; Domoff, Sarah E.; Burmeister, Jacob M.; Koball, Afton M.; Hinman, Nova G.; Davis, Alan K.; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A.
2013-01-01
Objective The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m2. Results Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Conclusion Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. PMID:23736227
NASA Astrophysics Data System (ADS)
Cui, Jia; Hong, Bei; Jiang, Xuepeng; Chen, Qinghua
2017-05-01
With the purpose of reinforcing correlation analysis of risk assessment threat factors, a dynamic assessment method of safety risks based on particle filtering is proposed, which takes threat analysis as the core. Based on the risk assessment standards, the method selects threat indicates, applies a particle filtering algorithm to calculate influencing weight of threat indications, and confirms information system risk levels by combining with state estimation theory. In order to improve the calculating efficiency of the particle filtering algorithm, the k-means cluster algorithm is introduced to the particle filtering algorithm. By clustering all particles, the author regards centroid as the representative to operate, so as to reduce calculated amount. The empirical experience indicates that the method can embody the relation of mutual dependence and influence in risk elements reasonably. Under the circumstance of limited information, it provides the scientific basis on fabricating a risk management control strategy.
Attention training to pleasant stimuli in anxiety.
Sass, Sarah M; Evans, Travis C; Xiong, Kue; Mirghassemi, Felicia; Tran, Huy
2017-01-01
Attentional bias for threatening stimuli in anxiety is a common finding in the literature. The present study addressed whether attention training toward pleasant stimuli can reduce anxiety symptoms and induce a processing bias in favor of pleasant information in nonpatients who were selected to score similarly to individuals with generalized anxiety or panic disorder on a measure of worry or physiological arousal, respectively. Participants were randomly assigned to attention training to pleasant (ATP) stimuli or to a placebo control (PC) condition. All participants completed baseline and post-test dot-probe measures of attentional bias while event-related brain potentials were recorded. As expected, worry symptoms decreased in the ATP and not PC condition. ATP was also associated with early evidence (P100 amplitude) of greater attentional prioritization of probes replacing neutral stimuli within threat-neutral word pairs from pre-to-post intervention and later RT evidence of facilitated processing of probes replacing pleasant stimuli within pleasant-threat word pairs at post compared to PC. PC was associated with later evidence (P300 latency) of less efficient evaluation of probes following pleasant stimuli within pleasant-threat word pairs from pre-to-post and later RT evidence of facilitated processing of probes following threat stimuli within pleasant-threat word pairs at post compared to ATP. Results highlight early and later mechanisms of attention processing changes and underscore the potential of pleasant stimuli in optimizing attention-training interventions for anxiety. Published by Elsevier B.V.
The new social marketing challenge to promote radon testing.
DiPofi, J A; LaTour, M S; Henthorne, T L
2001-01-01
As part of a project funded by the Environmental Protection Agency, exploratory qualitative analysis was conducted to gain insight into perceptions of the threat of radon in the Karst geological region (i.e., Northern Alabama, Central Tennessee, Central Kentucky). Based on health practitioner input, it was clear that the tenets of Protection Motivation Theory (PMT) and the probing afforded by focus group research would provide greatly needed theory-based insight into the public reactions (or lack thereof) to the threat posed by radon. Qualitative research findings of this project are discussed as well as preliminary recommendations are provided to advance the protection motivation theory research agenda for promoting awareness of the threat of radon and to influence appropriate response to that threat.
Threat driven modeling framework using petri nets for e-learning system.
Khamparia, Aditya; Pandey, Babita
2016-01-01
Vulnerabilities at various levels are main cause of security risks in e-learning system. This paper presents a modified threat driven modeling framework, to identify the threats after risk assessment which requires mitigation and how to mitigate those threats. To model those threat mitigations aspects oriented stochastic petri nets are used. This paper included security metrics based on vulnerabilities present in e-learning system. The Common Vulnerability Scoring System designed to provide a normalized method for rating vulnerabilities which will be used as basis in metric definitions and calculations. A case study has been also proposed which shows the need and feasibility of using aspect oriented stochastic petri net models for threat modeling which improves reliability, consistency and robustness of the e-learning system.
Reactivity to uncertain threat as a familial vulnerability factor for alcohol use disorder.
Gorka, S M; Hee, D; Lieberman, L; Mittal, V A; Phan, K L; Shankman, S A
2016-12-01
When sober, problematic drinkers display exaggerated reactivity to threats that are uncertain (U-threat). Since this aversive affective state can be alleviated via acute alcohol intoxication, it has been posited that individuals who exhibit heightened reactivity to U-threat at baseline are motivated to use alcohol as a means of avoidance-based coping, setting the stage for excessive drinking. To date, however, no study has attempted to characterize the dispositional nature of exaggerated reactivity to U-threat and test whether it is a vulnerability factor or exclusively a disease marker of problematic alcohol use. The current investigation utilized a family study design to address these gaps by examining whether (1) reactivity to U-threat is associated with risk for problematic alcohol use, defined by family history of alcohol use disorder (AUD) and (2) reactivity to U-threat is correlated amongst adult biological siblings. A total of 157 families, and 458 individuals, participated in the study and two biological siblings completed a threat-of-shock task designed to probe reactivity to U-threat and predictable threat (P-threat). Startle potentiation was collected as an index of aversive responding. Within biological siblings, startle potentiation to U-threat [intraclass correlation (ICC) = 0.35] and P-threat (ICC = 0.63) was significantly correlated. In addition, independent of an individuals' own AUD status, startle potentiation to U-threat, but not P-threat, was positively associated with risk for AUD (i.e. AUD family history). This suggests that heightened reactivity to U-threat may be a familial vulnerability factor for problematic drinking and a novel prevention target for AUD.
Habitat preferences and conservation threats to Black-necked Cranes wintering in Bhutan.
Namgay, Rinchen; Wangchuk, Sangay
2016-01-01
Black-necked Crane (Grus nigricollis) is a vulnerable Red list species whose populations are declining. However, little is known about Black-necked Cranes' habitat requirements or the causes of their population decline. We identified Black-necked Cranes' winter roost and foraging preferences of Black-necked Cranes in Bhutan during the winter of 2013-2014. Black-necked Cranes' roosts were recorded using Garmin GPSmap 60CSx, while foraging preferences and threats to the birds were identified based on a survey of household heads (n = 107) residing within a 3 km radius of roost sites. We grouped the threats identified by the communities into four major categories, viz. biological, social, political and natural threats based on the relevance. Of the four major threats, communities residing within the roosting and foraging habitat of the Black-necked Crane reported biological threat as major. Biological threats as reported by communities include loss of habitat, food shortage and competition from other animals. We recommend the present roosting areas be designated as part of the conservation areas for Black-necked Crane wintering in Bumthang district. In addition to preserving these areas, government should also encourage farming in foraging habitats of Black-necked Crane, because they mainly feed on barley, wheat, paddy, potatoes and buckwheat, besides roots, tubers and insects in the wetlands.
NASA Astrophysics Data System (ADS)
Tost, Jordi; Ehmel, Fabian; Heidmann, Frank; Olen, Stephanie M.; Bookhagen, Bodo
2018-05-01
The assessment of natural hazards and risk has traditionally been built upon the estimation of threat maps, which are used to depict potential danger posed by a particular hazard throughout a given area. But when a hazard event strikes, infrastructure is a significant factor that can determine if the situation becomes a disaster. The vulnerability of the population in a region does not only depend on the area's local threat, but also on the geographical accessibility of the area. This makes threat maps by themselves insufficient for supporting real-time decision-making, especially for those tasks that involve the use of the road network, such as management of relief operations, aid distribution, or planning of evacuation routes, among others. To overcome this problem, this paper proposes a multidisciplinary approach divided in two parts. First, data fusion of satellite-based threat data and open infrastructure data from OpenStreetMap, introducing a threat-based routing service. Second, the visualization of this data through cartographic generalization and schematization. This emphasizes critical areas along roads in a simple way and allows users to visually evaluate the impact natural hazards may have on infrastructure. We develop and illustrate this methodology with a case study of landslide threat for an area in Colombia.
Leitman, David I; Wolf, Daniel H; Loughead, James; Valdez, Jeffrey N; Kohler, Christian G; Brensinger, Colleen; Elliott, Mark A; Turetsky, Bruce I; Gur, Raquel E; Gur, Ruben C
2011-01-01
Schizophrenia patients display impaired performance and brain activity during facial affect recognition. These impairments may reflect stimulus-driven perceptual decrements and evaluative processing abnormalities. We differentiated these two processes by contrasting responses to identical stimuli presented under different contexts. Seventeen healthy controls and 16 schizophrenia patients performed an fMRI facial affect detection task. Subjects identified an affective target presented amongst foils of differing emotions. We hypothesized that targeting affiliative emotions (happiness, sadness) would create a task demand context distinct from that generated when targeting threat emotions (anger, fear). We compared affiliative foil stimuli within a congruent affiliative context with identical stimuli presented in an incongruent threat context. Threat foils were analysed in the same manner. Controls activated right orbitofrontal cortex (OFC)/ventrolateral prefrontal cortex (VLPFC) more to affiliative foils in threat contexts than to identical stimuli within affiliative contexts. Patients displayed reduced OFC/VLPFC activation to all foils, and no activation modulation by context. This lack of context modulation coincided with a 2-fold decrement in foil detection efficiency. Task demands produce contextual effects during facial affective processing in regions activated during affect evaluation. In schizophrenia, reduced modulation of OFC/VLPFC by context coupled with reduced behavioural efficiency suggests impaired ventral prefrontal control mechanisms that optimize affective appraisal.
Genetic characterization of stem rust resistance in a global spring wheat germplasm collection
USDA-ARS?s Scientific Manuscript database
Stem rust is considered one of the most damaging diseases of wheat. The recent emergence of the stem rust Ug99 race group poses a serious threat to world wheat production. Utilization of genetic resistance in cultivar development is the optimal way to control stem rust. Here we report association ma...
USDA-ARS?s Scientific Manuscript database
Influenza A virus (IAV) in swine constitutes a major economic burden for producers as well as a potential threat to public health. Whole inactivated virus vaccines (WIV) are the predominant countermeasure employed to control IAV in swine herds in the United States despite the superior protection, an...
Linking terrestrial and marine conservation planning and threats analysis.
Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth
2008-02-01
The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.
Adolescents and the threat of nuclear war: the evolution of a perspective.
Beardslee, W. R.; Mack, J. E.
1983-01-01
The authors briefly review recent work in the area of the impact of the threat of nuclear war on children and adolescents. They explore some of the difficulties inherent in understanding the possible effects of the threat of nuclear war on children based on their research experience in the area. PMID:6636837
Technosocial Modeling of IED Threat Scenarios and Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.
2009-03-23
This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiationmore » of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.« less
Detection of dim targets in multiple environments
NASA Astrophysics Data System (ADS)
Mirsky, Grace M.; Woods, Matthew; Grasso, Robert J.
2013-10-01
The proliferation of a wide variety of weapons including Anti-Aircraft Artillery (AAA), rockets, and small arms presents a substantial threat to both military and civilian aircraft. To address this ever-present threat, Northrop Grumman has assessed unguided threat phenomenology to understand the underlying physical principles for detection. These principles, based upon threat transit through the atmosphere, exploit a simple phenomenon universal to all objects moving through an atmosphere comprised of gaseous media to detect and track the threat in the presence of background and clutter. Threat detection has rapidly become a crucial component of aircraft survivability systems that provide situational awareness to the crew. It is particularly important to platforms which may spend a majority of their time at low altitudes and within the effective range of a large variety of weapons. Detection of these threats presents a unique challenge as this class of threat typically has a dim signature coupled with a short duration. Correct identification of each of the threat components (muzzle flash and projectile) is important to determine trajectory and intent while minimizing false alarms and maintaining a high detection probability in all environments.
Lee, Adrian J; Jacobson, Sheldon H
2012-02-01
A critical component of aviation security consists of screening passengers and baggage to protect airports and aircraft from terrorist threats. Advancements in screening device technology have increased the ability to detect these threats; however, specifying the operational configurations of these devices in response to changes in the threat environment can become difficult. This article proposes to use Fisher information as a statistical measure for detecting changes in the threat environment. The perceived risk of passengers, according to prescreening information and behavior analysis, is analyzed as the passengers sequentially enter the security checkpoint. The alarm responses from the devices used to detect threats are also analyzed to monitor significant changes in the frequency of threat items uncovered. The key results are that this information-based measure can be used within the Homeland Security Advisory System to indicate changes in threat conditions in real time, and provide the flexibility of security screening detection devices to responsively and automatically adapt operational configurations to these changing threat conditions. © 2012 Society for Risk Analysis. All rights reserved.
Vector-borne disease intelligence: strategies to deal with disease burden and threats.
Braks, Marieta; Medlock, Jolyon M; Hubalek, Zdenek; Hjertqvist, Marika; Perrin, Yvon; Lancelot, Renaud; Duchyene, Els; Hendrickx, Guy; Stroo, Arjan; Heyman, Paul; Sprong, Hein
2014-01-01
Owing to the complex nature of vector-borne diseases (VBDs), whereby monitoring of human case patients does not suffice, public health authorities experience challenges in surveillance and control of VBDs. Knowledge on the presence and distribution of vectors and the pathogens that they transmit is vital to the risk assessment process to permit effective early warning, surveillance, and control of VBDs. Upon accepting this reality, public health authorities face an ever-increasing range of possible surveillance targets and an associated prioritization process. Here, we propose a comprehensive approach that integrates three surveillance strategies: population-based surveillance, disease-based surveillance, and context-based surveillance for EU member states to tailor the best surveillance strategy for control of VBDs in their geographic region. By classifying the surveillance structure into five different contexts, we hope to provide guidance in optimizing surveillance efforts. Contextual surveillance strategies for VBDs entail combining organization and data collection approaches that result in disease intelligence rather than a preset static structure.
Vector-Borne Disease Intelligence: Strategies to Deal with Disease Burden and Threats
Braks, Marieta; Medlock, Jolyon M.; Hubalek, Zdenek; Hjertqvist, Marika; Perrin, Yvon; Lancelot, Renaud; Duchyene, Els; Hendrickx, Guy; Stroo, Arjan; Heyman, Paul; Sprong, Hein
2014-01-01
Owing to the complex nature of vector-borne diseases (VBDs), whereby monitoring of human case patients does not suffice, public health authorities experience challenges in surveillance and control of VBDs. Knowledge on the presence and distribution of vectors and the pathogens that they transmit is vital to the risk assessment process to permit effective early warning, surveillance, and control of VBDs. Upon accepting this reality, public health authorities face an ever-increasing range of possible surveillance targets and an associated prioritization process. Here, we propose a comprehensive approach that integrates three surveillance strategies: population-based surveillance, disease-based surveillance, and context-based surveillance for EU member states to tailor the best surveillance strategy for control of VBDs in their geographic region. By classifying the surveillance structure into five different contexts, we hope to provide guidance in optimizing surveillance efforts. Contextual surveillance strategies for VBDs entail combining organization and data collection approaches that result in disease intelligence rather than a preset static structure. PMID:25566522
AVQS: attack route-based vulnerability quantification scheme for smart grid.
Ko, Jongbin; Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik
2014-01-01
A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification.
Computer aiding for low-altitude helicopter flight
NASA Technical Reports Server (NTRS)
Swenson, Harry N.
1991-01-01
A computer-aiding concept for low-altitude helicopter flight was developed and evaluated in a real-time piloted simulation. The concept included an optimal control trajectory-generated algorithm based on dynamic programming, and a head-up display (HUD) presentation of a pathway-in-the-sky, a phantom aircraft, and flight-path vector/predictor symbol. The trajectory-generation algorithm uses knowledge of the global mission requirements, a digital terrain map, aircraft performance capabilities, and advanced navigation information to determine a trajectory between mission waypoints that minimizes threat exposure by seeking valleys. The pilot evaluation was conducted at NASA Ames Research Center's Sim Lab facility in both the fixed-base Interchangeable Cab (ICAB) simulator and the moving-base Vertical Motion Simulator (VMS) by pilots representing NASA, the U.S. Army, and the U.S. Air Force. The pilots manually tracked the trajectory generated by the algorithm utilizing the HUD symbology. They were able to satisfactorily perform the tracking tasks while maintaining a high degree of awareness of the outside world.
Jost, John T; Napier, Jaime L; Thorisdottir, Hulda; Gosling, Samuel D; Palfai, Tibor P; Ostafin, Brian
2007-07-01
Three studies are conducted to assess the uncertainty- threat model of political conservatism, which posits that psychological needs to manage uncertainty and threat are associated with political orientation. Results from structural equation models provide consistent support for the hypothesis that uncertainty avoidance (e.g., need for order, intolerance of ambiguity, and lack of openness to experience) and threat management (e.g., death anxiety, system threat, and perceptions of a dangerous world) each contributes independently to conservatism (vs. liberalism). No support is obtained for alternative models, which predict that uncertainty and threat management are associated with ideological extremism or extreme forms of conservatism only. Study 3 also reveals that resistance to change fully mediates the association between uncertainty avoidance and conservatism, whereas opposition to equality partially mediates the association between threat and conservatism. Implications for understanding the epistemic and existential bases of political orientation are discussed.
School-Based Decision Making: A Principal-Agent Perspective.
ERIC Educational Resources Information Center
Ferris, James M.
1992-01-01
A principal-agent framework is used to examine potential gains in educational performance and potential threats to public accountability that school-based decision-making proposals pose. Analysis underscores the need to tailor the design of decentralized decision making to the sources of poor educational performance and threats to school…
Threat evaluation for impact assessment in situation analysis systems
NASA Astrophysics Data System (ADS)
Roy, Jean; Paradis, Stephane; Allouche, Mohamad
2002-07-01
Situation analysis is defined as a process, the examination of a situation, its elements, and their relations, to provide and maintain a product, i.e., a state of situation awareness, for the decision maker. Data fusion is a key enabler to meeting the demanding requirements of military situation analysis support systems. According to the data fusion model maintained by the Joint Directors of Laboratories' Data Fusion Group, impact assessment estimates the effects on situations of planned or estimated/predicted actions by the participants, including interactions between action plans of multiple players. In this framework, the appraisal of actual or potential threats is a necessary capability for impact assessment. This paper reviews and discusses in details the fundamental concepts of threat analysis. In particular, threat analysis generally attempts to compute some threat value, for the individual tracks, that estimates the degree of severity with which engagement events will potentially occur. Presenting relevant tracks to the decision maker in some threat list, sorted from the most threatening to the least, is clearly in-line with the cognitive demands associated with threat evaluation. A key parameter in many threat value evaluation techniques is the Closest Point of Approach (CPA). Along this line of thought, threatening tracks are often prioritized based upon which ones will reach their CPA first. Hence, the Time-to-CPA (TCPA), i.e., the time it will take for a track to reach its CPA, is also a key factor. Unfortunately, a typical assumption for the computation of the CPA/TCPA parameters is that the track velocity will remain constant. When a track is maneuvering, the CPA/TCPA values will change accordingly. These changes will in turn impact the threat value computations and, ultimately, the resulting threat list. This is clearly undesirable from a command decision-making perspective. In this regard, the paper briefly discusses threat value stabilization approaches based on neural networks and other mathematical techniques.
Laurin, Raphael
2013-01-01
The aim of this investigation was to replicate the stereotype threat and lift effects in a motor task in a neutral sex-typed activity, using somatic and cognitive anxiety as key mediators of these phenomena. It was hypothesized that an ingroup/outgroup social categorization based on gender would have distinctive effects for female and male participants. A total of 161 French physical education students were randomly assigned to three threat conditions--no threat, female threat, and male threat--thus leading to a 3 x 2 (threat by gender) design. The analyses revealed a stereotype lift effect on the performances for both male and female participants, as well as a stereotype threat effect only for female participants. They also indicated that somatic anxiety had a mediating effect on the performance of female participants targeted by a negative stereotype, but that it had a facilitating effect on their performance. The stereotype threat and lift effects on motor tasks were replicated in a neutral sex-typed activity and somatic anxiety seems to have a facilitating mediating effect of the relationships between the gender-conditions (control or female threat) interaction and free-throw performance. The model used to distinguish somatic and cognitive anxiety appeared to be a relevant means of explaining the stereotype threat and lift mechanisms.
NASA Astrophysics Data System (ADS)
Haneda, Kiyofumi; Kajima, Toshio; Koyama, Tadashi; Muranaka, Hiroyuki; Dojo, Hirofumi; Aratani, Yasuhiko
2002-05-01
The target of our study is to analyze the level of necessary security requirements, to search for suitable security measures and to optimize security distribution to every portion of the medical practice. Quantitative expression must be introduced to our study, if possible, to enable simplified follow-up security procedures and easy evaluation of security outcomes or results. Using fault tree analysis (FTA), system analysis showed that system elements subdivided into groups by details result in a much more accurate analysis. Such subdivided composition factors greatly depend on behavior of staff, interactive terminal devices, kinds of services provided, and network routes. Security measures were then implemented based on the analysis results. In conclusion, we identified the methods needed to determine the required level of security and proposed security measures for each medical information system, and the basic events and combinations of events that comprise the threat composition factors. Methods for identifying suitable security measures were found and implemented. Risk factors for each basic event, a number of elements for each composition factor, and potential security measures were found. Methods to optimize the security measures for each medical information system were proposed, developing the most efficient distribution of risk factors for basic events.
Oliver, Andre'; Andemeskel, Ghilamichael; King, Carlise R; Wallace, Lyndsey; McDougal, Serie; Monteiro, Kenneth P; Ben-Zeev, Avi
2017-12-01
We provide evidence that stereotype threat, a phenomenon that causes stigmatized individuals to experience group-based evaluative concerns (Steele in Am Psychol 52:613-629, 1997; Whistling Vivaldi and other clues to how stereotypes affect us, W.W. Norton, New York, 2010), impacts affective aspects of Black identity as a function of majority versus minority ecological contexts. Black/African-American students, enrolled in either Africana Studies (Black ecological majority) or Psychology (Black ecological minority), completed private and public regard subscales from the Multidimensional Inventory of Black Identity (Sellers et al. in Pers Soc Psychol Rev 2:18-39, 1998) at baseline (Time 1) and after being randomly assigned to a stereotype threat or no-threat/control condition (Time 2). In threat, participants were introduced to a 'puzzle' task as diagnostic of intellectual abilities, whereas in no-threat the same task was introduced as culture fair, such that people from different racial/ethnic groups had performed similarly on this task in the past. In Psychology, students under threat exhibited a simultaneous decrease and increase in private and public regard, respectively, a pattern shown in the literature to be associated with discrimination-based distress and lesser well-being in Black ecological minority environments. In contrast, Africana Studies students' racial identity under threat remained intact. We discuss the protective effects of Africana Studies on racial identity and implications for educational reform.
Oliver, Andre’; Andemeskel, Ghilamichael; King, Carlise R.; Wallace, Lyndsey; McDougal, Serie; Monteiro, Kenneth P.
2018-01-01
We provide evidence that stereotype threat, a phenomenon that causes stigmatized individuals to experience group-based evaluative concerns (Steele in Am Psychol 52:613–629, 1997; Whistling Vivaldi and other clues to how stereotypes affect us, W.W. Norton, New York, 2010), impacts affective aspects of Black identity as a function of majority versus minority ecological contexts. Black/African-American students, enrolled in either Africana Studies (Black ecological majority) or Psychology (Black ecological minority), completed private and public regard subscales from the Multidimensional Inventory of Black Identity (Sellers et al. in Pers Soc Psychol Rev 2:18–39, 1998) at baseline (Time 1) and after being randomly assigned to a stereotype threat or no-threat/control condition (Time 2). In threat, participants were introduced to a ‘puzzle’ task as diagnostic of intellectual abilities, whereas in no-threat the same task was introduced as culture fair, such that people from different racial/ethnic groups had performed similarly on this task in the past. In Psychology, students under threat exhibited a simultaneous decrease and increase in private and public regard, respectively, a pattern shown in the literature to be associated with discrimination-based distress and lesser well-being in Black ecological minority environments. In contrast, Africana Studies students’ racial identity under threat remained intact. We discuss the protective effects of Africana Studies on racial identity and implications for educational reform. PMID:29657583
Oliveira, Rui F.; Faustino, Ana I.
2017-01-01
ABSTRACT Group living animals can use the behavior of others as cues for the presence of threat in the environment and adjust their behavior accordingly. Therefore, different social phenomena that modulate the response to threat, such as social buffering, social transmission (contagion), and facilitation of alarm responses can be seen as different manifestations of social information use in threat detection. Thus, social phenomena that are functionally antagonistic, such as social buffering and social transmission of fear, may rely on shared neurobehavioral mechanisms related to the use of social information in decision-making about the presence of threat in the environment. Here, we propose a unifying conceptual framework for the study of social information use in threat perception based on signal detection theory.
Attributional biases about the origins of attitudes: externality, emotionality, and rationality.
Kenworthy, Jared B; Miller, Norman
2002-05-01
Pilot work and 3 studies investigated the ways people explain the origins of attitudes. Study I examined the use of 3 dimensions (externality, rationality, emotionality) to explain the origin of people's own, in-group, and out-group attitudes. Attributions for own attitudes were the least externally and emotionally based and the most rationally based. By comparison with the out-group, less externality, less emotionality, and more rationality also were attributed to in-group attitudes. Studies 2 and 3 examined the effects of intergroup threat on attributions for in- and out-group attitude positions. Under high threat, more externality and emotionality but less rationality were attributed to out-group attitudes than under low threat. Intergroup differentiation mediated the difference between out-group attributions under high and low threat.
Zhang, Wei; Swinton, Scott M
2012-04-15
By suppressing pest populations, natural enemies provide an important ecosystem service that maintains the stability of agricultural ecosystems systems and potentially mitigates producers' pest control costs. Integrating natural control services into decisions about pesticide-based control has the potential to significantly improve the economic efficiency of pesticide use, with socially desirable outcomes. Two gaps have hindered the incorporation of natural enemies into pest management decision rules: (1) insufficient knowledge of pest and predator population dynamics and (2) lack of a decision framework for the economic tradeoffs among pest control options. Using a new intra-seasonal, dynamic bioeconomic optimization model, this study assesses how predation by natural enemies contributes to profit-maximizing pest management strategies. The model is applied to the management of the invasive soybean aphid, the most significant serious insect threat to soybean production in North America. The resulting lower bound estimate of the value of natural pest control ecosystem services was estimated at $84 million for the states of Illinois, Indiana, Iowa, Michigan and Minnesota in 2005. Copyright © 2011 Elsevier Ltd. All rights reserved.
The link between judgments of comparative risk and own risk: further evidence.
Gold, Ron S
2007-03-01
Individuals typically believe that they are less likely than the average person to experience negative events, a phenomenon termed "unrealistic optimism". The direct method of assessing unrealistic optimism employs a question of the form, "Compared with the average person, what is the chance that X will occur to you?". However, it has been proposed that responses to such a question (direct-estimates) are based essentially just on estimates that X will occur to the self (self-estimates). If this is so, any factors that affect one of these estimates should also affect the other. This prediction was tested in two experiments. In each, direct- and self-estimates for an unfamiliar health threat - homocysteine-related heart problems - were recorded. It was found that both types of estimate were affected in the same way by varying the stated probability of having unsafe levels of homocysteine (Study 1, N=149) and varying the stated probability that unsafe levels of homocysteine will lead to heart problems (Study 2, N=111). The results are consistent with the proposal that direct-estimates are constructed just from self-estimates.
Biological Control beneath the Feet: A Review of Crop Protection against Insect Root Herbivores.
Kergunteuil, Alan; Bakhtiari, Moe; Formenti, Ludovico; Xiao, Zhenggao; Defossez, Emmanuel; Rasmann, Sergio
2016-11-29
Sustainable agriculture is certainly one of the most important challenges at present, considering both human population demography and evidence showing that crop productivity based on chemical control is plateauing. While the environmental and health threats of conventional agriculture are increasing, ecological research is offering promising solutions for crop protection against herbivore pests. While most research has focused on aboveground systems, several major crop pests are uniquely feeding on roots. We here aim at documenting the current and potential use of several biological control agents, including micro-organisms (viruses, bacteria, fungi, and nematodes) and invertebrates included among the macrofauna of soils (arthropods and annelids) that are used against root herbivores. In addition, we discuss the synergistic action of different bio-control agents when co-inoculated in soil and how the induction and priming of plant chemical defense could be synergized with the use of the bio-control agents described above to optimize root pest control. Finally, we highlight the gaps in the research for optimizing a more sustainable management of root pests.
Biological Control beneath the Feet: A Review of Crop Protection against Insect Root Herbivores
Kergunteuil, Alan; Bakhtiari, Moe; Formenti, Ludovico; Xiao, Zhenggao; Defossez, Emmanuel; Rasmann, Sergio
2016-01-01
Sustainable agriculture is certainly one of the most important challenges at present, considering both human population demography and evidence showing that crop productivity based on chemical control is plateauing. While the environmental and health threats of conventional agriculture are increasing, ecological research is offering promising solutions for crop protection against herbivore pests. While most research has focused on aboveground systems, several major crop pests are uniquely feeding on roots. We here aim at documenting the current and potential use of several biological control agents, including micro-organisms (viruses, bacteria, fungi, and nematodes) and invertebrates included among the macrofauna of soils (arthropods and annelids) that are used against root herbivores. In addition, we discuss the synergistic action of different bio-control agents when co-inoculated in soil and how the induction and priming of plant chemical defense could be synergized with the use of the bio-control agents described above to optimize root pest control. Finally, we highlight the gaps in the research for optimizing a more sustainable management of root pests. PMID:27916820
Face processing in adolescents with positive and negative threat bias.
Sylvester, C M; Petersen, S E; Luby, J L; Barch, D M
2017-04-01
Individuals with anxiety disorders exhibit a 'vigilance-avoidance' pattern of attention to threatening stimuli when threatening and neutral stimuli are presented simultaneously, a phenomenon referred to as 'threat bias'. Modifying threat bias through cognitive retraining during adolescence reduces symptoms of anxiety, and so elucidating neural mechanisms of threat bias during adolescence is of high importance. We explored neural mechanisms by testing whether threat bias in adolescents is associated with generalized or threat-specific differences in the neural processing of faces. Subjects were categorized into those with (n = 25) and without (n = 27) threat avoidance based on a dot-probe task at average age 12.9 years. Threat avoidance in this cohort has previously been shown to index threat bias. Brain response to individually presented angry and neutral faces was assessed in a separate session using functional magnetic resonance imaging. Adolescents with threat avoidance exhibited lower activity for both angry and neutral faces relative to controls in several regions in the occipital, parietal, and temporal lobes involved in early visual and facial processing. Results generalized to happy, sad, and fearful faces. Adolescents with a prior history of depression and/or an anxiety disorder had lower activity for all faces in these same regions. A subset of results replicated in an independent dataset. Threat bias is associated with generalized, rather than threat-specific, differences in the neural processing of faces in adolescents. Findings may aid in the development of novel treatments for anxiety disorders that use attention training to modify threat bias.
Holgado-Tello, Fco P; Chacón-Moscoso, Salvador; Sanduvete-Chaves, Susana; Pérez-Gil, José A
2016-01-01
The Campbellian tradition provides a conceptual framework to assess threats to validity. On the other hand, different models of causal analysis have been developed to control estimation biases in different research designs. However, the link between design features, measurement issues, and concrete impact estimation analyses is weak. In order to provide an empirical solution to this problem, we use Structural Equation Modeling (SEM) as a first approximation to operationalize the analytical implications of threats to validity in quasi-experimental designs. Based on the analogies established between the Classical Test Theory (CTT) and causal analysis, we describe an empirical study based on SEM in which range restriction and statistical power have been simulated in two different models: (1) A multistate model in the control condition (pre-test); and (2) A single-trait-multistate model in the control condition (post-test), adding a new mediator latent exogenous (independent) variable that represents a threat to validity. Results show, empirically, how the differences between both the models could be partially or totally attributed to these threats. Therefore, SEM provides a useful tool to analyze the influence of potential threats to validity.
Holgado-Tello, Fco. P.; Chacón-Moscoso, Salvador; Sanduvete-Chaves, Susana; Pérez-Gil, José A.
2016-01-01
The Campbellian tradition provides a conceptual framework to assess threats to validity. On the other hand, different models of causal analysis have been developed to control estimation biases in different research designs. However, the link between design features, measurement issues, and concrete impact estimation analyses is weak. In order to provide an empirical solution to this problem, we use Structural Equation Modeling (SEM) as a first approximation to operationalize the analytical implications of threats to validity in quasi-experimental designs. Based on the analogies established between the Classical Test Theory (CTT) and causal analysis, we describe an empirical study based on SEM in which range restriction and statistical power have been simulated in two different models: (1) A multistate model in the control condition (pre-test); and (2) A single-trait-multistate model in the control condition (post-test), adding a new mediator latent exogenous (independent) variable that represents a threat to validity. Results show, empirically, how the differences between both the models could be partially or totally attributed to these threats. Therefore, SEM provides a useful tool to analyze the influence of potential threats to validity. PMID:27378991
Improving short antimicrobial peptides despite elusive rules for activity.
Mikut, Ralf; Ruden, Serge; Reischl, Markus; Breitling, Frank; Volkmer, Rudolf; Hilpert, Kai
2016-05-01
Antimicrobial peptides (AMPs) can effectively kill a broad range of life threatening multidrug-resistant bacteria, a serious threat to public health worldwide. However, despite great hopes novel drugs based on AMPs are still rare. To accelerate drug development we studied different approaches to improve the antibacterial activity of short antimicrobial peptides. Short antimicrobial peptides seem to be ideal drug candidates since they can be synthesized quickly and easily, modified and optimized. In addition, manufacturing a short peptide drug will be more cost efficient than long and structured ones. In contrast to longer and structured peptides short AMPs seem hard to design and predict. Here, we designed, synthesized and screened five different peptide libraries, each consisting of 600 9-mer peptides, against Pseudomonas aeruginosa. Each library is presenting a different approach to investigate effectiveness of an optimization strategy. The data for the 3000 peptides were analyzed using models based on fuzzy logic bioinformatics and plausible descriptors. The rate of active or superior active peptides was improved from 31.0% in a semi-random library from a previous study to 97.8% in the best new designed library. This article is part of a Special Issue entitled: Antimicrobial peptides edited by Karl Lohner and Kai Hilpert. Copyright © 2015 Elsevier B.V. All rights reserved.
Counter-terrorism threat prediction architecture
NASA Astrophysics Data System (ADS)
Lehman, Lynn A.; Krause, Lee S.
2004-09-01
This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model adaptation (learning). The increasingly complex demands facing analysts evaluating activity threatening to the security of the United States make the family of agent-based data collection (fusion) a promising area. This paper will discuss a system to support the collection and evaluation of potential threat activity as well as an approach fro presentation of the information.
Zhang, Yuan; Yu, Hongbo; Yin, Yunlu; Zhou, Xiaolin
2016-08-31
Although economic theories suggest that punishment threat is crucial for maintaining social norms, counterexamples are noted in which punishment threat hinders norm compliance. Such discrepancy may arise from the intention behind the threat: unintentionally introduced punishment threat facilitates, whereas intentionally introduced punishment threat hinders, norm compliance. Here, we combined a dictator game and fMRI to investigate how intention modulates the effect of punishment threat on norm compliance and the neural substrates of this modulation. We also investigated whether this modulation can be influenced by brain stimulation. Human participants divided an amount of money between themselves and a partner. The partner (intentionally) or a computer program (unintentionally) decided to retain or waive the right to punish the participant upon selfish distribution. Compared with the unintentional condition, participants allocated more when the partner intentionally waived the power of punishment, but less when the partner retained such power. The right lateral orbitofrontal cortex (rLOFC) showed higher activation when the partner waived compared with when the computer waived or when the partner retained the power. The functional connectivity between the rLOFC and the brain network associated with intention/mentalizing processing was predictive of the allocation difference induced by intention. Moreover, inhibition or activation of the rLOFC by brain stimulation decreased or increased, respectively, the participants' reliance on the partner's intention during monetary allocation. These findings demonstrate that the perceived intention of punishment threat plays a crucial role in norm compliance and that the LOFC is casually involved in the implementation of intention-based cooperative decisions. Does punishment threat facilitate or hinder norm enforcement? So far, cognitive neuroscience research offers equivocal evidence. By directly manipulating the intention behind punishment threat, we demonstrate that intention modulates the effectiveness of punishment threat. Moreover, we show that inhibition or activation of the right lateral orbitofrontal cortex (rLOFC) decreased or increased the effect of punishment threat in the intentional context, but not in the unintentional context, suggesting the casual involvement of the rLOFC in intention-based cooperative decisions. Copyright © 2016 the authors 0270-6474/16/369217-10$15.00/0.
THREAT ANTICIPATION AND DECEPTIVE REASONING USING BAYESIAN BELIEF NETWORKS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Allgood, Glenn O; Olama, Mohammed M; Lake, Joe E
Recent events highlight the need for tools to anticipate threats posed by terrorists. Assessing these threats requires combining information from disparate data sources such as analytic models, simulations, historical data, sensor networks, and user judgments. These disparate data can be combined in a coherent, analytically defensible, and understandable manner using a Bayesian belief network (BBN). In this paper, we develop a BBN threat anticipatory model based on a deceptive reasoning algorithm using a network engineering process that treats the probability distributions of the BBN nodes within the broader context of the system development process.
Bond, Katherine C.; Macfarlane, Sarah B.; Burke, Charlanne; Ungchusak, Kumnuan; Wibulpolprasert, Suwit
2013-01-01
We examine the emergence, development, and value of regional infectious disease surveillance networks that neighboring countries worldwide are organizing to control cross-border outbreaks at their source. The regional perspective represented in the paper is intended to serve as an instructive framework for others who decide to launch such networks as new technologies and emerging threats bring countries even closer together. Distinct from more formal networks in geographic regions designated by the World Health Organization (WHO), these networks usually involve groupings of fewer countries chosen by national governments to optimize surveillance efforts. Sometimes referred to as sub-regional, these “self-organizing” networks complement national and local government recognition with informal relationships across borders among epidemiologists, scientists, ministry officials, health workers, border officers, and community members. Their development over time reflects both incremental learning and growing connections among network actors; and changing disease patterns, with infectious disease threats shifting over time from local to regional to global levels. Not only has this regional disease surveillance network model expanded across the globe, it has also expanded from a mostly practitioner-based network model to one that covers training, capacity-building, and multidisciplinary research. Today, several of these networks are linked through Connecting Organizations for Regional Disease Surveillance (CORDS). We explore how regional disease surveillance networks add value to global disease detection and response by complementing other systems and efforts, by harnessing their power to achieve other goals such as health and human security, and by helping countries adapt to complex challenges via multi-sectoral solutions. We note that governmental commitment and trust among participating individuals are critical to the success of regional infectious disease surveillance networks. PMID:23362414
Common IED exploitation target set ontology
NASA Astrophysics Data System (ADS)
Russomanno, David J.; Qualls, Joseph; Wowczuk, Zenovy; Franken, Paul; Robinson, William
2010-04-01
The Common IED Exploitation Target Set (CIEDETS) ontology provides a comprehensive semantic data model for capturing knowledge about sensors, platforms, missions, environments, and other aspects of systems under test. The ontology also includes representative IEDs; modeled as explosives, camouflage, concealment objects, and other background objects, which comprise an overall threat scene. The ontology is represented using the Web Ontology Language and the SPARQL Protocol and RDF Query Language, which ensures portability of the acquired knowledge base across applications. The resulting knowledge base is a component of the CIEDETS application, which is intended to support the end user sensor test and evaluation community. CIEDETS associates a system under test to a subset of cataloged threats based on the probability that the system will detect the threat. The associations between systems under test, threats, and the detection probabilities are established based on a hybrid reasoning strategy, which applies a combination of heuristics and simplified modeling techniques. Besides supporting the CIEDETS application, which is focused on efficient and consistent system testing, the ontology can be leveraged in a myriad of other applications, including serving as a knowledge source for mission planning tools.
Microwave-based medical diagnosis using particle swarm optimization algorithm
NASA Astrophysics Data System (ADS)
Modiri, Arezoo
This dissertation proposes and investigates a novel architecture intended for microwave-based medical diagnosis (MBMD). Furthermore, this investigation proposes novel modifications of particle swarm optimization algorithm for achieving enhanced convergence performance. MBMD has been investigated through a variety of innovative techniques in the literature since the 1990's and has shown significant promise in early detection of some specific health threats. In comparison to the X-ray- and gamma-ray-based diagnostic tools, MBMD does not expose patients to ionizing radiation; and due to the maturity of microwave technology, it lends itself to miniaturization of the supporting systems. This modality has been shown to be effective in detecting breast malignancy, and hence, this study focuses on the same modality. A novel radiator device and detection technique is proposed and investigated in this dissertation. As expected, hardware design and implementation are of paramount importance in such a study, and a good deal of research, analysis, and evaluation has been done in this regard which will be reported in ensuing chapters of this dissertation. It is noteworthy that an important element of any detection system is the algorithm used for extracting signatures. Herein, the strong intrinsic potential of the swarm-intelligence-based algorithms in solving complicated electromagnetic problems is brought to bear. This task is accomplished through addressing both mathematical and electromagnetic problems. These problems are called benchmark problems throughout this dissertation, since they have known answers. After evaluating the performance of the algorithm for the chosen benchmark problems, the algorithm is applied to MBMD tumor detection problem. The chosen benchmark problems have already been tackled by solution techniques other than particle swarm optimization (PSO) algorithm, the results of which can be found in the literature. However, due to the relatively high level of complexity and randomness inherent to the selection of electromagnetic benchmark problems, a trend to resort to oversimplification in order to arrive at reasonable solutions has been taken in literature when utilizing analytical techniques. Here, an attempt has been made to avoid oversimplification when using the proposed swarm-based optimization algorithms.
A model for the optimization of the detection and eradication of isolated gypsy moth colonies
Tiffany L. Bogich; Andrew Liebhold; Katriona Shea
2007-01-01
Biological invasions of pest species pose a threat to the stability of ecosystems, both natural and managed (Liebhold et al. 1995, Shogren and Tschirhart 2005). Considerable effort is expended by national and local governments on excluding alien species via detection and eradication of invading populations, but these efforts are not necessarily designed in the most...
Agents Overcoming Resource Independent Scaling Threats (AORIST)
2004-10-01
20 Table 8: Tilted Consumer Preferences Experiment (m=8, N=61, G=2, C=60, Mean over 13 experiments...probabilities. Non-uniform consumer preferences create a new potential for sub-optimal system performance and thus require an additional adaptive...distribu- tion of the capacities across the sup- plier population must match the non- uniform consumer preferences . The second plot in Table 8
van den Bos, Kees; Lind, E. A.; Bommelé, Jeroen; VandeVondele, Sebastian D. J.
2015-01-01
This paper argues that being in the Asch situation, where there is a felt need to conform to others’ faulty behaviors, poses a social threat to people. Furthermore, participating in a psychology experiment in which you will have to interact with other participants might trigger sense-making processes. The paper proposes that these assumed threats or sense-making processes are likely to activate the behavioral inhibition system, making people respond in more inhibited ways than they normally would be inclined to do. As a result, people’s tendency to affiliate behaviorally with persons who are similar to them can be inhibited. The implication is that lowering behavioral inhibition (by experimentally reminding people about having acted without behavioral inhibitions) should lead to more public conformity in the Asch situation and stronger behavioral affiliation with ingroup members than not being reminded about behavioral disinhibition. Findings of four experiments support this line of reasoning. These findings are discussed in terms of behavioral inhibition and behavioral affiliation. Alternative accounts of the data that focus on social belongingness threats and optimal distinctiveness are also considered. PMID:26175695
Protection of SAAO observing site against light and dust pollution
NASA Astrophysics Data System (ADS)
Sefako, Ramotholo; Väisänen, Petri
2016-10-01
The South African Astronomical Observatory (SAAO) observing station near Sutherland, Northern Cape in South Africa, is one of the darkest sites in the world for optical and IR astronomy. The SAAO hosts and operates several facilities, including the Southern African Large Telescope (SALT) and a number of international robotic telescopes. To ensure that the conditions remain optimal for astronomy, legislation called the Astronomy Geographic Advantage (AGA) Act, of 2007, was enacted. The Act empowers the Department of Science and Technology (DST) to regulate issues that pose a threat to optical and/or radio astronomy in areas declared Astronomy Advantage Areas in South Africa. For optical astronomy, the main challenges are those posed by light and dust pollution as result of wind energy developments, and petroleum gas and oil exploration/exploitation in the area. We give an update of possible threats to the quality of the night skies at SAAO, and the challenges relating to the AGA Act implementation and enforcement. We discuss measures that are put in place to protect the Observatory, including a study to quantify the threat by a planned wind energy facility.
Global Distribution of Two Fungal Pathogens Threatening Endangered Sea Turtles
Sarmiento-Ramírez, Jullie M.; Abella-Pérez, Elena; Phillott, Andrea D.; Sim, Jolene; van West, Pieter; Martín, María P.; Marco, Adolfo; Diéguez-Uribeondo, Javier
2014-01-01
Nascent fungal infections are currently considered as one of the main threats for biodiversity and ecosystem health, and have driven several animal species into critical risk of extinction. Sea turtles are one of the most endangered groups of animals and only seven species have survived to date. Here, we described two pathogenic species, i.e., Fusarium falciforme and Fusarium keratoplasticum, that are globally distributed in major turtle nesting areas for six sea turtle species and that are implicated in low hatch success. These two fungi possess key biological features that are similar to emerging pathogens leading to host extinction, e.g., high virulence, and a broad host range style of life. Their optimal growth temperature overlap with the optimal incubation temperature for eggs, and they are able to kill up to 90% of the embryos. Environmental forcing, e.g., tidal inundation and clay/silt content of nests, were correlated to disease development. Thus, these Fusarium species constitute a major threat to sea turtle nests, especially to those experiencing environmental stressors. These findings have serious implications for the survival of endangered sea turtle populations and the success of conservation programs worldwide. PMID:24465748
Spatially-Correlated Risk in Nature Reserve Site Selection
Albers, Heidi J.; Busby, Gwenlyn M.; Hamaide, Bertrand; Ando, Amy W.; Polasky, Stephen
2016-01-01
Establishing nature reserves protects species from land cover conversion and the resulting loss of habitat. Even within a reserve, however, many factors such as fires and defoliating insects still threaten habitat and the survival of species. To address the risk to species survival after reserve establishment, reserve networks can be created that allow some redundancy of species coverage to maximize the expected number of species that survive in the presence of threats. In some regions, however, the threats to species within a reserve may be spatially correlated. As examples, fires, diseases, and pest infestations can spread from a starting point and threaten neighboring parcels’ habitats, in addition to damage caused at the initial location. This paper develops a reserve site selection optimization framework that compares the optimal reserve networks in cases where risks do and do not reflect spatial correlation. By exploring the impact of spatially-correlated risk on reserve networks on a stylized landscape and on an Oregon landscape, this analysis demonstrates an appropriate and feasible method for incorporating such post-reserve establishment risks in the reserve site selection literature as an additional tool to be further developed for future conservation planning. PMID:26789127
Global distribution of two fungal pathogens threatening endangered sea turtles.
Sarmiento-Ramírez, Jullie M; Abella-Pérez, Elena; Phillott, Andrea D; Sim, Jolene; van West, Pieter; Martín, María P; Marco, Adolfo; Diéguez-Uribeondo, Javier
2014-01-01
Nascent fungal infections are currently considered as one of the main threats for biodiversity and ecosystem health, and have driven several animal species into critical risk of extinction. Sea turtles are one of the most endangered groups of animals and only seven species have survived to date. Here, we described two pathogenic species, i.e., Fusarium falciforme and Fusarium keratoplasticum, that are globally distributed in major turtle nesting areas for six sea turtle species and that are implicated in low hatch success. These two fungi possess key biological features that are similar to emerging pathogens leading to host extinction, e.g., high virulence, and a broad host range style of life. Their optimal growth temperature overlap with the optimal incubation temperature for eggs, and they are able to kill up to 90% of the embryos. Environmental forcing, e.g., tidal inundation and clay/silt content of nests, were correlated to disease development. Thus, these Fusarium species constitute a major threat to sea turtle nests, especially to those experiencing environmental stressors. These findings have serious implications for the survival of endangered sea turtle populations and the success of conservation programs worldwide.
Overview of Threats and Failure Models for Safety-Relevant Computer-Based Systems
NASA Technical Reports Server (NTRS)
Torres-Pomales, Wilfredo
2015-01-01
This document presents a high-level overview of the threats to safety-relevant computer-based systems, including (1) a description of the introduction and activation of physical and logical faults; (2) the propagation of their effects; and (3) function-level and component-level error and failure mode models. These models can be used in the definition of fault hypotheses (i.e., assumptions) for threat-risk mitigation strategies. This document is a contribution to a guide currently under development that is intended to provide a general technical foundation for designers and evaluators of safety-relevant systems.
Metabolic engineering of antibiotic factories: new tools for antibiotic production in actinomycetes.
Weber, Tilmann; Charusanti, Pep; Musiol-Kroll, Ewa Maria; Jiang, Xinglin; Tong, Yaojun; Kim, Hyun Uk; Lee, Sang Yup
2015-01-01
Actinomycetes are excellent sources for novel bioactive compounds, which serve as potential drug candidates for antibiotics development. While industrial efforts to find and develop novel antimicrobials have been severely reduced during the past two decades, the increasing threat of multidrug-resistant pathogens and the development of new technologies to find and produce such compounds have again attracted interest in this field. Based on improvements in whole-genome sequencing, novel methods have been developed to identify the secondary metabolite biosynthetic gene clusters by genome mining, to clone them, and to express them in heterologous hosts in much higher throughput than before. These technologies now enable metabolic engineering approaches to optimize production yields and to directly manipulate the pathways to generate modified products. Copyright © 2014 Elsevier Ltd. All rights reserved.
Methodology of automated ionosphere front velocity estimation for ground-based augmentation of GNSS
NASA Astrophysics Data System (ADS)
Bang, Eugene; Lee, Jiyun
2013-11-01
ionospheric anomalies occurring during severe ionospheric storms can pose integrity threats to Global Navigation Satellite System (GNSS) Ground-Based Augmentation Systems (GBAS). Ionospheric anomaly threat models for each region of operation need to be developed to analyze the potential impact of these anomalies on GBAS users and develop mitigation strategies. Along with the magnitude of ionospheric gradients, the speed of the ionosphere "fronts" in which these gradients are embedded is an important parameter for simulation-based GBAS integrity analysis. This paper presents a methodology for automated ionosphere front velocity estimation which will be used to analyze a vast amount of ionospheric data, build ionospheric anomaly threat models for different regions, and monitor ionospheric anomalies continuously going forward. This procedure automatically selects stations that show a similar trend of ionospheric delays, computes the orientation of detected fronts using a three-station-based trigonometric method, and estimates speeds for the front using a two-station-based method. It also includes fine-tuning methods to improve the estimation to be robust against faulty measurements and modeling errors. It demonstrates the performance of the algorithm by comparing the results of automated speed estimation to those manually computed previously. All speed estimates from the automated algorithm fall within error bars of ± 30% of the manually computed speeds. In addition, this algorithm is used to populate the current threat space with newly generated threat points. A larger number of velocity estimates helps us to better understand the behavior of ionospheric gradients under geomagnetic storm conditions.
The dark side of the sublime: Distinguishing a threat-based variant of awe.
Gordon, Amie M; Stellar, Jennifer E; Anderson, Craig L; McNeil, Galen D; Loew, Daniel; Keltner, Dacher
2017-08-01
Theoretical conceptualizations of awe suggest this emotion can be more positive or negative depending on specific appraisal processes. However, the emergent scientific study of awe rarely emphasizes its negative side, classifying it instead as a positive emotion. In the present research we tested whether there is a more negative variant of awe that arises in response to vast, complex stimuli that are threatening (e.g., tornadoes, terrorist attack, wrathful god). We discovered people do experience this type of awe with regularity (Studies 1 & 4) and that it differs from other variants of awe in terms of its underlying appraisals, subjective experience, physiological correlates, and consequences for well-being. Specifically, threat-based awe experiences were appraised as lower in self-control and certainty and higher in situational control than other awe experiences, and were characterized by greater feelings of fear (Studies 2a & 2b). Threat-based awe was associated with physiological indicators of increased sympathetic autonomic arousal, whereas positive awe was associated with indicators of increased parasympathetic arousal (Study 3). Positive awe experiences in daily life (Study 4) and in the lab (Study 5) led to greater momentary well-being (compared with no awe experience), whereas threat-based awe experiences did not. This effect was partially mediated by increased feelings of powerlessness during threat-based awe experiences. Together, these findings highlight a darker side of awe. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
Pereira, Cicero Roberto; Álvaro, José Luis; Vala, Jorge
2018-05-01
This article analyzes the ego-defensive role played by legitimation, by examining the hypothesis that threat-based justifications attenuate the negative effect on an individual's self-esteem caused by his or her becoming aware of his or her own discriminatory behavior. Across three studies (including a pilot experiment), participants who were led to believe that they had acted in a discriminatory way experienced a decrease in their self-esteem. In Study 1 ( N = 116), this effect was nullified when discrimination was justified by either symbolic or realistic threat perceptions. Study 2 ( N = 250) replicated this pattern of results and went further by showing that discrimination affects self-esteem only in more egalitarian individuals, whereas for those less egalitarian, it affects their social image. According to the ego-defensive role of legitimation, a meta-analytical integration of the results confirmed that the influence of discrimination in depressing self-esteem is moderated by threat-based justifications.
NASA Astrophysics Data System (ADS)
Conway-Klaassen, Janice Marjorie
"Stereotype threat is being at risk of confirming, as a self-characteristic, a negative stereotype about one's group" (C. M. Steele & Aronson, 1995, p. 797). A stereotype threat effect then is described as the detrimental impact on a person's performance or achievement measurements when they are placed in a stereotype threat environment. For women, the negative stereotype that exists in our culture states that women are typically not as capable as men in mathematics or science subjects. This study specifically explored the potential impact of stereotype threat on women who have chosen a science-based college major. They were tested in the domain of chemistry, which is related to mathematics and often involves high level of mathematics skills. I attempted to generate a stereotype threat in the participants through describing a chemistry challenge exam as either one that had consistently shown a gender bias against women and to create a nullification effect by describing the exam as one that had shown no gender bias in the past. In the third experimental condition acting as a control, participants received only generic instructions related to taking the test itself. The second part of this study investigated whether stereotype threat effects could impact women's achievement goal orientations. In previous studies performance avoidance goal orientations have been associated with individuals placed in a stereotype threat environment. The findings on the stereotype threat effect were not significant for the chemistry challenge test achievement scores. This may be due to several factors. One factor may be the design of the chemistry challenge test and the instructions for the test. The other factor may be the women in this study. As individuals who have chosen a science based major, they may have developed coping skills and strategies that reduced the impact of a stereotype threat. It is also possible that the testing environment itself generated an implicit stereotype type threat effect which reduced the differences among the experimental conditions. However, there were significant findings related to the participants' achievement goal orientations. Individuals in the stereotype threat condition displayed higher levels of performance avoidance, overall performance, and overall avoidance goal orientations consistent with the existing literature. Post-hoc open-ended questionnaires revealed that most participants believed that men and women were equally capable in mathematics and sciences but that they also had an awareness of the negative stereotype against women in mathematics and sciences among the public. This study supports the demonstration of stereotype threat effects on women who are enrolled in science based college majors. Although I was not able to create a stereotype threat effect on their chemistry challenge test scores, I was able to demonstrate an effect on their achievement goal orientations, which has implications for instructional design and standardized testing.
Laser Remediation of Threats Posed by Small Orbital Debris
NASA Technical Reports Server (NTRS)
Fork, Richard L.; Rogers, Jan R.; Hovater, Mary A.
2012-01-01
The continually increasing amount of orbital debris in near Earth space poses an increasing challenge to space situational awareness. Recent collisions of spacecraft caused abrupt increases in the density of both large and small debris in near Earth space. An especially challenging class of threats is that due to the increasing density of small (1 mm to 10 cm dimension) orbital debris. This small debris poses a serious threat since: (1) The high velocity enables even millimeter dimension debris to cause serious damage to vulnerable areas of space assets, e.g., detector windows; (2) The small size and large number of debris elements prevent adequate detection and cataloguing. We have identified solutions to this threat in the form of novel laser systems and novel ways of using these laser systems. While implementation of the solutions we identify is challenging we find approaches offering threat mitigation within time frames and at costs of practical interest. We base our analysis on the unique combination of coherent light specifically structured in both space and time and applied in novel ways entirely within the vacuum of space to deorbiting small debris. We compare and contrast laser based small debris removal strategies using ground based laser systems with strategies using space based laser systems. We find laser systems located and used entirely within space offer essential and decisive advantages over groundbased laser systems.
NASA Astrophysics Data System (ADS)
Selkoe, K. A.; Halpern, B. S.; Ebert, C. M.; Franklin, E. C.; Selig, E. R.; Casey, K. S.; Bruno, J.; Toonen, R. J.
2009-09-01
Effective and comprehensive regional-scale marine conservation requires fine-grained data on the spatial patterns of threats and their overlap. To address this need for the Papahānaumokuākea Marine National Monument (Monument) in Hawaii, USA, spatial data on 14 recent anthropogenic threats specific to this region were gathered or created, including alien species, bottom fishing, lobster trap fishing, ship-based pollution, ship strike risks, marine debris, research diving, research equipment installation, research wildlife sacrifice, and several anthropogenic climate change threats i.e., increase in ultraviolet (UV) radiation, seawater acidification, the number of warm ocean temperature anomalies relevant to disease outbreaks and coral bleaching, and sea level rise. These data were combined with habitat maps and expert judgment on the vulnerability of different habitat types in the Monument to estimate spatial patterns of current cumulative impact at 1 ha (0.01 km2) resolution. Cumulative impact was greatest for shallow reef areas and peaked at Maro Reef, where 13 of the 14 threats overlapped in places. Ocean temperature variation associated with disease outbreaks was found to have the highest predicted impact overall, followed closely by other climate-related threats, none of which have easily tractable management solutions at the regional scale. High impact threats most tractable to regional management relate to ship traffic. Sensitivity analyses show that the results are robust to both data availability and quality. Managers can use these maps to (1) inform management and surveillance priorities based on the ranking of threats and their distributions, (2) guide permitting decisions based on cumulative impacts, and (3) choose areas to monitor for climate change effects. Furthermore, this regional analysis can serve as a case study for managers elsewhere interested in assessing and mapping region-specific cumulative human impacts.
NASA Astrophysics Data System (ADS)
Reichman, Daniël.; Collins, Leslie M.; Malof, Jordan M.
2018-04-01
This work focuses on the development of automatic buried threat detection (BTD) algorithms using ground penetrating radar (GPR) data. Buried threats tend to exhibit unique characteristics in GPR imagery, such as high energy hyperbolic shapes, which can be leveraged for detection. Many recent BTD algorithms are supervised, and therefore they require training with exemplars of GPR data collected over non-threat locations and threat locations, respectively. Frequently, data from non-threat GPR examples will exhibit high energy hyperbolic patterns, similar to those observed from a buried threat. Is it still useful therefore, to include such examples during algorithm training, and encourage an algorithm to label such data as a non-threat? Similarly, some true buried threat examples exhibit very little distinctive threat-like patterns. We investigate whether it is beneficial to treat such GPR data examples as mislabeled, and either (i) relabel them, or (ii) remove them from training. We study this problem using two algorithms to automatically identify mislabeled examples, if they are present, and examine the impact of removing or relabeling them for training. We conduct these experiments on a large collection of GPR data with several state-of-the-art GPR-based BTD algorithms.
ERIC Educational Resources Information Center
Hepburn, John R.; Harvey, Angela N.
2007-01-01
Drug courts routinely rely on the threat of legal sanction to motivate drug-using criminal offenders to enter and complete community-based treatment programs. In light of the high failure rates among drug court participants, what is the effect of the threat of legal sanction on program retention and completion? A quasiexperimental research design…
ERIC Educational Resources Information Center
Aronson, Joshua; Cohen, Geoffrey; McColskey, Wendy
2009-01-01
Stereotype threat arises from a fear among members of a group of reinforcing negative stereotypes about the intellectual ability of the group. This report identifies three randomized controlled trial studies that use classroom-based strategies to reduce stereotype threat and improve the academic performance of Black students, narrowing their…
ERIC Educational Resources Information Center
Aronson, Joshua; Cohen, Geoffrey; McColskey, Wendy
2009-01-01
Stereotype threat arises from a fear among members of a group of reinforcing negative stereotypes about the intellectual ability of the group. This report identifies three randomized controlled trial studies that use classroom-based strategies to reduce stereotype threat and improve the academic performance of Black students, narrowing their…
Determining the Requisite Components of Visual Threat Detection to Improve Operational Performance
2014-04-01
cognitive processes, and may be enhanced by focusing training development on the principle components such as causal reasoning. The second report will...discuss the development and evaluation of a research-based training exemplar. Visual threat detection pervades many military contexts, but is also... developing computer-controlled exercises to study the primary components of visual threat detection. Similarly, civilian law enforcement officers were
Using Machine Learning in Adversarial Environments.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Warren Leon Davis
Intrusion/anomaly detection systems are among the first lines of cyber defense. Commonly, they either use signatures or machine learning (ML) to identify threats, but fail to account for sophisticated attackers trying to circumvent them. We propose to embed machine learning within a game theoretic framework that performs adversarial modeling, develops methods for optimizing operational response based on ML, and integrates the resulting optimization codebase into the existing ML infrastructure developed by the Hybrid LDRD. Our approach addresses three key shortcomings of ML in adversarial settings: 1) resulting classifiers are typically deterministic and, therefore, easy to reverse engineer; 2) ML approachesmore » only address the prediction problem, but do not prescribe how one should operationalize predictions, nor account for operational costs and constraints; and 3) ML approaches do not model attackers’ response and can be circumvented by sophisticated adversaries. The principal novelty of our approach is to construct an optimization framework that blends ML, operational considerations, and a model predicting attackers reaction, with the goal of computing optimal moving target defense. One important challenge is to construct a realistic model of an adversary that is tractable, yet realistic. We aim to advance the science of attacker modeling by considering game-theoretic methods, and by engaging experimental subjects with red teaming experience in trying to actively circumvent an intrusion detection system, and learning a predictive model of such circumvention activities. In addition, we will generate metrics to test that a particular model of an adversary is consistent with available data.« less
Kahn, Kimberly Barsamian; Lee, J Katherine; Renauer, Brian; Henning, Kris R; Stewart, Greg
2017-01-01
This study examines the role of perceived phenotypic racial stereotypicality and race-based social identity threat on racial minorities' trust and cooperation with police. We hypothesize that in police interactions, racial minorities' phenotypic racial stereotypicality may increase race-based social identity threat, which will lead to distrust and decreased participation with police. Racial minorities (Blacks, Latinos, Native Americans, and multi-racials) and Whites from a representative random sample of city residents were surveyed about policing attitudes. A serial multiple mediation model confirmed that racial minorities' self-rated phenotypic racial stereotypicality indirectly affected future cooperation through social identity threat and trust. Due to the lack of negative group stereotypes in policing, the model did not hold for Whites. This study provides evidence that phenotypic stereotypicality influences racial minorities' psychological experiences interacting with police.
Improving rotorcraft survivability to RPG attack using inverse methods
NASA Astrophysics Data System (ADS)
Anderson, D.; Thomson, D. G.
2009-09-01
This paper presents the results of a preliminary investigation of optimal threat evasion strategies for improving the survivability of rotorcraft under attack by rocket propelled grenades (RPGs). The basis of this approach is the application of inverse simulation techniques pioneered for simulation of aggressive helicopter manoeuvres to the RPG engagement problem. In this research, improvements in survivability are achieved by computing effective evasive manoeuvres. The first step in this process uses the missile approach warning system camera (MAWS) on the aircraft to provide angular information of the threat. Estimates of the RPG trajectory and impact point are then estimated. For the current flight state an appropriate evasion response is selected then realised via inverse simulation of the platform dynamics. Results are presented for several representative engagements showing the efficacy of the approach.
Innovative 3D Textile Structures for Soft Body Armor Protection: The EPIDARM Project
NASA Astrophysics Data System (ADS)
Maillet, Jérôme; Lefebvre, Marie; Boussu, François; Pirlot, Marc
There is a real need for battlefield soldiers to be protected from ballistic and CBRNE threats and also to be in permanent contact and localization with the logistic support of the commander. Ballistic, CBRNE and tactical jackets are currently three different components, developed separately and worn on top of each other. One of the EPIDARM project's targets is to propose a personal protection demonstration for the optimal system configuration in order to reduce the cost and weight while improving protection. The systems approach used for the EPIDARM program considers the protective system inside its environment (threat, the wearer - generic soldier, task and climates). The latest emergent technologies in ballistic and CBRN protection, ergonomic effectiveness and financial cost are considered and help to select final solutions.
Forecasting Lightning Threat using Cloud-Resolving Model Simulations
NASA Technical Reports Server (NTRS)
McCaul, Eugene W., Jr.; Goodman, Steven J.; LaCasse, Katherine M.; Cecil, Daniel J.
2008-01-01
Two new approaches are proposed and developed for making time and space dependent, quantitative short-term forecasts of lightning threat, and a blend of these approaches is devised that capitalizes on the strengths of each. The new methods are distinctive in that they are based entirely on the ice-phase hydrometeor fields generated by regional cloud-resolving numerical simulations, such as those produced by the WRF model. These methods are justified by established observational evidence linking aspects of the precipitating ice hydrometeor fields to total flash rates. The methods are straightforward and easy to implement, and offer an effective near-term alternative to the incorporation of complex and costly cloud electrification schemes into numerical models. One method is based on upward fluxes of precipitating ice hydrometeors in the mixed phase region at the-15 C level, while the second method is based on the vertically integrated amounts of ice hydrometeors in each model grid column. Each method can be calibrated by comparing domain-wide statistics of the peak values of simulated flash rate proxy fields against domain-wide peak total lightning flash rate density data from observations. Tests show that the first method is able to capture much of the temporal variability of the lightning threat, while the second method does a better job of depicting the areal coverage of the threat. Our blended solution is designed to retain most of the temporal sensitivity of the first method, while adding the improved spatial coverage of the second. Exploratory tests for selected North Alabama cases show that, because WRF can distinguish the general character of most convective events, our methods show promise as a means of generating quantitatively realistic fields of lightning threat. However, because the models tend to have more difficulty in predicting the instantaneous placement of storms, forecasts of the detailed location of the lightning threat based on single simulations can be in error. Although these model shortcomings presently limit the precision of lightning threat forecasts from individual runs of current generation models,the techniques proposed herein should continue to be applicable as newer and more accurate physically-based model versions, physical parameterizations, initialization techniques and ensembles of forecasts become available.
Cornell, Dewey; Maeng, Jennifer L; Burnette, Anna Grace; Jia, Yuane; Huang, Francis; Konold, Timothy; Datta, Pooja; Malone, Marisa; Meyer, Patrick
2018-06-01
Threat assessment has been widely endorsed as a school safety practice, but there is little research on its implementation. In 2013, Virginia became the first state to mandate student threat assessment in its public schools. The purpose of this study was to examine the statewide implementation of threat assessment and to identify how threat assessment teams distinguish serious from nonserious threats. The sample consisted of 1,865 threat assessment cases reported by 785 elementary, middle, and high schools. Students ranged from pre-K to Grade 12, including 74.4% male, 34.6% receiving special education services, 51.2% White, 30.2% Black, 6.8% Hispanic, and 2.7% Asian. Survey data were collected from school-based teams to measure student demographics, threat characteristics, and assessment results. Logistic regression indicated that threat assessment teams were more likely to identify a threat as serious if it was made by a student above the elementary grades (odds ratio 0.57; 95% lower and upper bound 0.42-0.78), a student receiving special education services (1.27; 1.00-1.60), involved battery (1.61; 1.20-2.15), homicide (1.40; 1.07-1.82), or weapon possession (4.41; 2.80-6.96), or targeted an administrator (3.55; 1.73-7.30). Student race and gender were not significantly associated with a serious threat determination. The odds ratio that a student would attempt to carry out a threat classified as serious was 12.48 (5.15-30.22). These results provide new information on the nature and prevalence of threats in schools using threat assessment that can guide further work to develop this emerging school safety practice. (PsycINFO Database Record (c) 2018 APA, all rights reserved).
Threat Based Risk Assessment for Enterprise Networks
2016-02-15
served as the program chair of the Research in Attacks, Intrusions , and Defenses workshop; the Neural Information Processing Systems (NIPS) annual...Threat- Based Risk Assessment for Enterprise Networks Richard P. Lippmann and James F. Riordan Protecting enterprise networks requires...include aids for the hearing impaired, speech recognition, pattern classification, neural networks , and cybersecurity. He has taught three courses
Hyoung, Kim Je; Hajam, Irshad Ahmed; Lee, John Hwa
2017-06-13
H7N3 and H7N7 are highly pathogenic avian influenza (HPAI) viruses and have posed a great threat not only for the poultry industry but for the human health as well. H7N9, a low pathogenic avian influenza (LPAI) virus, is also highly pathogenic to humans, and there is a great concern that these H7 subtypes would acquire the ability to spread efficiently between humans, thereby becoming a pandemic threat. A vaccine candidate covering all the three subtypes must, therefore, be an integral part of any pandemic preparedness plan. To address this need, we constructed a consensus hemagglutinin (HA) sequence of H7N3, H7N7, and H7N9 based on the data available in the NCBI in early 2012-2015. This artificial sequence was then optimized for protein expression before being transformed into an attenuated auxotrophic mutant of Salmonella Typhimurium, JOL1863 strain. Immunizing chickens with JOL1863, delivered intramuscularly, nasally or orally, elicited efficient humoral and cell mediated immune responses, independently of the route of vaccination. Our results also showed that JOL1863 deliver efficient maturation signals to chicken monocyte derived dendritic cells (MoDCs) which were characterized by upregulation of costimulatory molecules and higher cytokine induction. Moreover, immunization with JOL1863 in chickens conferred a significant protection against the heterologous LPAI H7N1 virus challenge as indicated by reduced viral sheddings in the cloacal swabs. We conclude that this vaccine, based on a consensus HA, could induce broader spectrum of protection against divergent H7 influenza viruses and thus warrants further study.
Paulus, Martin P.; Simmons, Alan N.; Fitzpatrick, Summer N.; Potterat, Eric G.; Van Orden, Karl F.; Bauman, James; Swain, Judith L.
2010-01-01
Background Little is known about the neural basis of elite performers and their optimal performance in extreme environments. The purpose of this study was to examine brain processing differences between elite warfighters and comparison subjects in brain structures that are important for emotion processing and interoception. Methodology/Principal Findings Navy Sea, Air, and Land Forces (SEALs) while off duty (n = 11) were compared with n = 23 healthy male volunteers while performing a simple emotion face-processing task during functional magnetic resonance imaging. Irrespective of the target emotion, elite warfighters relative to comparison subjects showed relatively greater right-sided insula, but attenuated left-sided insula, activation. Navy SEALs showed selectively greater activation to angry target faces relative to fearful or happy target faces bilaterally in the insula. This was not accounted for by contrasting positive versus negative emotions. Finally, these individuals also showed slower response latencies to fearful and happy target faces than did comparison subjects. Conclusions/Significance These findings support the hypothesis that elite warfighters deploy greater processing resources toward potential threat-related facial expressions and reduced processing resources to non-threat-related facial expressions. Moreover, rather than expending more effort in general, elite warfighters show more focused neural and performance tuning. In other words, greater neural processing resources are directed toward threat stimuli and processing resources are conserved when facing a nonthreat stimulus situation. PMID:20418943
Prevent, Counter, and Respond - A Strategic Plan to Reduce Global Nuclear Threats (FY 2016-FY2020)
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2015-03-01
NNSA’s second core mission is reducing global nuclear dangers by preventing the acquisition of nuclear weapons or weapons-usable materials, countering efforts to acquire such weapons or materials, and responding to nuclear or radiological incidents. In 2015, NNSA reorganized its nonproliferation activities based on core competencies and realigned its counterterrorism and counterproliferation functions to more efficiently address both current and emerging threats and challenges. The reorganization accompanied the March 2015 release of the first ever Prevent, Counter, and Respond – A Strategic Plan to Reduce Global Nuclear Threats. This report, which NNSA will update annually, highlights key nuclear threat trends andmore » describes NNSA’s integrated threat reduction strategy.« less
Does self-threat promote social connection? The role of self-esteem and contingencies of self-worth.
Park, Lora E; Maner, Jon K
2009-01-01
Six studies examined the social motivations of people with high self-esteem (HSE) and low self-esteem (LSE) following a threat to a domain of contingent self-worth. Whether people desired social contact following self-threat depended on an interaction between an individual's trait self-esteem and contingencies of self-worth. HSE participants who strongly based self-worth on appearance sought to connect with close others following a threat to their physical attractiveness. LSE participants who staked self-worth on appearance wanted to avoid social contact and, instead, preferred a less interpersonally risky way of coping with self-threat (wanting to enhance their physical attractiveness). Implications for theories of self-esteem, motivation, and interpersonal processes are discussed.
Security threats categories in healthcare information systems.
Samy, Ganthan Narayana; Ahmad, Rabiah; Ismail, Zuraini
2010-09-01
This article attempts to investigate the various types of threats that exist in healthcare information systems (HIS). A study has been carried out in one of the government-supported hospitals in Malaysia.The hospital has been equipped with a Total Hospital Information System (THIS). The data collected were from three different departments, namely the Information Technology Department (ITD), the Medical Record Department (MRD), and the X-Ray Department, using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The results show that the most critical threat for the THIS is power failure followed by acts of human error or failure and other technological factors. This research holds significant value in terms of providing a complete taxonomy of threat categories in HIS and also an important component in the risk analysis stage.
Joo, Yeon Kyoung; Lee-Won, Roselyn J
2016-10-01
For members of a group negatively stereotyped in a domain, making mistakes can aggravate the influence of stereotype threat because negative stereotypes often blame target individuals and attribute the outcome to their lack of ability. Virtual agents offering real-time error feedback may influence performance under stereotype threat by shaping the performers' attributional perception of errors they commit. We explored this possibility with female drivers, considering the prevalence of the "women-are-bad-drivers" stereotype. Specifically, we investigated how in-vehicle voice agents offering error feedback based on responsibility attribution (internal vs. external) and outcome attribution (ability vs. effort) influence female drivers' performance under stereotype threat. In addressing this question, we conducted an experiment in a virtual driving simulation environment that provided moment-to-moment error feedback messages. Participants performed a challenging driving task and made mistakes preprogrammed to occur. Results showed that the agent's error feedback with outcome attribution moderated the stereotype threat effect on driving performance. Participants under stereotype threat had a smaller number of collisions when the errors were attributed to effort than to ability. In addition, outcome attribution feedback moderated the effect of responsibility attribution on driving performance. Implications of these findings are discussed.
L-3 Com AVISYS civil aviation self-protection system
NASA Astrophysics Data System (ADS)
Carey, Jim
2006-05-01
In early 2004, L-3 Com AVISYS Corporation (hereinafter referred to as L-3 AVISYS or AVISYS) completed a contract for the integration and deployment of an advanced Infrared Countermeasures self-protection suite for a Head of State Airbus A340 aircraft. This initial L-3 AVISYS IRCM Suite was named WIPPS (Widebody Integrated Platform Protection System). The A340 WIPPS installation provisions were FAA certified with the initial deployment of the modified aircraft. WIPPS is unique in that it utilizes a dual integrated missile warning subsystem to produce a robust, multi-spectral, ultra-low false alarm rate threat warning capability. WIPPS utilizes the Thales MWS-20 Pulsed Doppler Radar Active MWS and the EADS AN/AAR-60 Ultraviolet Passive MWS. These MWS subsystems are integrated through an L-3 AVISYS Electronic Warfare Control Set (EWCS). The EWCS also integrates the WIPPS MWS threat warning information with the A340 flight computer data to optimize ALE-47 Countermeasure Dispensing System IR decoy dispensing commands, program selection and timing. WIPPS utilizes standard and advanced IR Decoys produced by ARMTEC Defense and Alloy Surfaces. WIPPS demonstrated that when IR decoy dispensing is controlled by threat range and time-to-go information provided by an Active MWS, unsurpassed self protection levels are achievable. Recognizing the need for high volume civil aviation protection, L-3 AVISYS configured a variant of WIPPS optimized for commercial airline reliability requirements, safety requirements, supportability and most importantly, affordability. L-3 AVISYS refers to this IRCM suite as CAPS (Commercial Airliner Protection System). CAPS has been configured for applications to all civil aircraft ranging from the small Regional Jets to the largest Wide-bodies. This presentation and paper will provide an overview of the initial WIPPS IRCM Suite and the important factors that were considered in defining the CAPS configuration.
Impediments to the success of management actions for species recovery.
Ng, Chooi Fei; Possingham, Hugh P; McAlpine, Clive A; de Villiers, Deidré L; Preece, Harriet J; Rhodes, Jonathan R
2014-01-01
Finding cost-effective management strategies to recover species declining due to multiple threats is challenging, especially when there are limited resources. Recent studies offer insights into how costs and threats can influence the best choice of management actions. However, when implementing management actions in the real-world, a range of impediments to management success often exist that can be driven by social, technological and land-use factors. These impediments may limit the extent to which we can achieve recovery objectives and influence the optimal choice of management actions. Nonetheless, the implications of these impediments are not well understood, especially for recovery planning involving multiple actions. We used decision theory to assess the impact of these types of impediments for allocating resources among recovery actions to mitigate multiple threats. We applied this to a declining koala (Phascolarctos cinereus) population threatened by habitat loss, vehicle collisions, dog attacks and disease. We found that the unwillingness of dog owners to restrain their dogs at night (a social impediment), the effectiveness of wildlife crossings to reduce vehicle collisions (a technological impediment) and the unavailability of areas for restoration (a land-use impediment) significantly reduced the effectiveness of our actions. In the presence of these impediments, achieving successful recovery may be unlikely. Further, these impediments influenced the optimal choice of recovery actions, but the extent to which this was true depended on the target koala population growth rate. Given that species recovery is an important strategy for preserving biodiversity, it is critical that we consider how impediments to the success of recovery actions modify our choice of actions. In some cases, it may also be worth considering whether investing in reducing or removing impediments may be a cost-effective course of action.
Charles Flower; Jeremie Fant; Sean Hoban; Kathleen Knight; Laura Steger; Elijah Aubihl; Miquel Gonzalez-Meler; Stephen Forry; Andrea Hille; Alejandro Royo
2018-01-01
Forest resources face numerous threats that require costly management. Hence, there is an increasing need for data-informed strategies to guide conservation practices. The introduction of the emerald ash borer to North America has caused rapid declines in ash populations (Fraxinus spp. L.). Natural resource managers are faced with a choice of...
Radiation -- A Cosmic Hazard to Human Habitation in Space
NASA Technical Reports Server (NTRS)
Lewis, Ruthan; Pellish, Jonathan
2017-01-01
Radiation exposure is one of the greatest environmental threats to the performance and success of human and robotic space missions. Radiation permeates all space and aeronautical systems, challenges optimal and reliable performance, and tests survival and survivability. We will discuss the broad scope of research, technological, and operational considerations to forecast and mitigate the effects of the radiation environment for deep space and planetary exploration.
Fore, Jeffrey D; Sowa, Scott P; Galat, David L; Annis, Gust M; Diamond, David D; Rewa, Charles
2014-03-01
Managers can improve conservation of lotic systems over large geographies if they have tools to assess total watershed conditions for individual stream segments and can identify segments where conservation practices are most likely to be successful (i.e., primary management capacity). The goal of this research was to develop a suite of threat indices to help agriculture resource management agencies select and prioritize watersheds across Missouri River basin in which to implement agriculture conservation practices. We quantified watershed percentages or densities of 17 threat metrics that represent major sources of ecological stress to stream communities into five threat indices: agriculture, urban, point-source pollution, infrastructure, and all non-agriculture threats. We identified stream segments where agriculture management agencies had primary management capacity. Agriculture watershed condition differed by ecoregion and considerable local variation was observed among stream segments in ecoregions of high agriculture threats. Stream segments with high non-agriculture threats were most concentrated near urban areas, but showed high local variability. 60 % of stream segments in the basin were classified as under U.S. Department of Agriculture's Natural Resources Conservation Service (NRCS) primary management capacity and most segments were in regions of high agricultural threats. NRCS primary management capacity was locally variable which highlights the importance of assessing total watershed condition for multiple threats. Our threat indices can be used by agriculture resource management agencies to prioritize conservation actions and investments based on: (a) relative severity of all threats, (b) relative severity of agricultural threats, and (c) and degree of primary management capacity.
Stereotype Threat and College Academic Performance: A Latent Variables Approach*
Owens, Jayanti; Massey, Douglas S.
2013-01-01
Stereotype threat theory has gained experimental and survey-based support in helping explain the academic underperformance of minority students at selective colleges and universities. Stereotype threat theory states that minority students underperform because of pressures created by negative stereotypes about their racial group. Past survey-based studies, however, are characterized by methodological inefficiencies and potential biases: key theoretical constructs have only been measured using summed indicators and predicted relationships modeled using ordinary least squares. Using the National Longitudinal Survey of Freshman, this study overcomes previous methodological shortcomings by developing a latent construct model of stereotype threat. Theoretical constructs and equations are estimated simultaneously from multiple indicators, yielding a more reliable, valid, and parsimonious test of key propositions. Findings additionally support the view that social stigma can indeed have strong negative effects on the academic performance of pejoratively stereotyped racial-minority group members, not only in laboratory settings, but also in the real world. PMID:23950616
Towards a framework for assessment and management of cumulative human impacts on marine food webs.
Giakoumi, Sylvaine; Halpern, Benjamin S; Michel, Loïc N; Gobert, Sylvie; Sini, Maria; Boudouresque, Charles-François; Gambi, Maria-Cristina; Katsanevakis, Stelios; Lejeune, Pierre; Montefalcone, Monica; Pergent, Gerard; Pergent-Martini, Christine; Sanchez-Jerez, Pablo; Velimirov, Branko; Vizzini, Salvatrice; Abadie, Arnaud; Coll, Marta; Guidetti, Paolo; Micheli, Fiorenza; Possingham, Hugh P
2015-08-01
Effective ecosystem-based management requires understanding ecosystem responses to multiple human threats, rather than focusing on single threats. To understand ecosystem responses to anthropogenic threats holistically, it is necessary to know how threats affect different components within ecosystems and ultimately alter ecosystem functioning. We used a case study of a Mediterranean seagrass (Posidonia oceanica) food web and expert knowledge elicitation in an application of the initial steps of a framework for assessment of cumulative human impacts on food webs. We produced a conceptual seagrass food web model, determined the main trophic relationships, identified the main threats to the food web components, and assessed the components' vulnerability to those threats. Some threats had high (e.g., coastal infrastructure) or low impacts (e.g., agricultural runoff) on all food web components, whereas others (e.g., introduced carnivores) had very different impacts on each component. Partitioning the ecosystem into its components enabled us to identify threats previously overlooked and to reevaluate the importance of threats commonly perceived as major. By incorporating this understanding of system vulnerability with data on changes in the state of each threat (e.g., decreasing domestic pollution and increasing fishing) into a food web model, managers may be better able to estimate and predict cumulative human impacts on ecosystems and to prioritize conservation actions. © 2015 Society for Conservation Biology.
The main concern of burn survivors in Iran
Zamanzadeh, Vahid; Valizadeh, Lila; Lotfi, Mojgan; Salehi, Feridoon; Khalili, Assef
2016-01-01
Background: The present work was conducted to study the burn patients’ experiences to get an insight into their main concerns when they suffer the tragic event, recover from it, and adjust back in the society, so that better rehabilitation programs can be planned corresponding to their needs as well as to the needs of the society and the existing situations. Materials and Methods: In this qualitative study, 17 burn survivors were enrolled. Unstructured interviews were used for data collection. All the interviews were recorded, transcribed, and analyzed using qualitative content analysis method. Results: Based on the existing elements of the explicit textual meanings, two categories of threat and disturbance were formed. The category of threat was extracted from the following five subcategories: (a) Threat to physical life; (b) threat to the process of living; (c) psychological threat; (d) spiritual threat; and (e) social threat. The category of disturbance was extracted from the following three subcategories: (a) Sensory disturbance: Suffering pain; (b) self-concept disturbance; and (c) behavioral disturbance. Conclusions: Burn survivors experience severe pain, enduring and suffering in their daily activities after burn. Passing through these difficult trajectories is perceived as a threat and disturbance in self-integrity. PMID:27563326
Leuschner, Vincenz; Bondü, Rebecca; Allroggen, Marc; Scheithauer, Herbert
2016-01-01
Threats and announcements of homicidal violence at schools may have massive consequences like evacuations, police searches, criminal investigations, or loss of the sense of security by students, teachers, and parents. However, there is a lack of systematic studies about that phenomenon. The present article would like to contribute to closing the research gap. It presents results about the frequency and structure of threats and announcements of homicidal violence in schools in Berlin. The study is based on an official dataset from school administration reports of violent acts in Berlin schools which has been studied within the Berlin Leaking-Projekt. The sample consists of 427 threats and announcements of homicidal violence between 1996 and 2007. The study is an exceptional analysis of the phenomenon: it presents crosscutting results about frequency and characteristics of threats and the threatening students as well as results of a longitudinal analysis about the development of threats and announcements. Results show a rate of 0,3 threats and announcements per 1 000 student and year. During the observation time span a steady increase of threats and announcements – year by year, influenced by imitation effects after school shootings – has been observed.
Vibrational spectroscopy standoff detection of threat chemicals
NASA Astrophysics Data System (ADS)
Ortiz-Rivera, William; Pacheco-Londoño, Leonardo C.; Castro-Suarez, John R.; Felix-Rivera, Hilsamar; Hernandez-Rivera, Samuel P.
2011-06-01
Spectroscopy based standoff detection systems: Raman and FTIR have been tested for detection of threat chemicals, including highly energetic materials, homemade explosives, explosives formulations and high explosives mixtures. Other threat chemicals studied included toxic industrial compounds (TIC) and chemical agent simulants. Microorganisms and biological threat agent simulants have also been detected at standoff distances. Open Path FTIR has been used to detect vapors and chemicals deposited on metal surfaces at μg/cm2 levels at distances as far as 30 m in active mode and 60 m in passive mode. In the case of Raman telescope, standoff distances for acetonitrile and ammonium nitrate were 140 m.
NASA Technical Reports Server (NTRS)
Swenson, Harry N.; Zelenka, Richard E.; Hardy, Gordon H.; Dearing, Munro G.
1992-01-01
A computer aiding concept for low-altitude helicopter flight was developed and evaluated in a real-time piloted simulation. The concept included an optimal control trajectory-generation algorithm based upon dynamic programming and a helmet-mounted display (HMD) presentation of a pathway-in-the-sky, a phantom aircraft, and flight-path vector/predictor guidance symbology. The trajectory-generation algorithm uses knowledge of the global mission requirements, a digital terrain map, aircraft performance capabilities, and advanced navigation information to determine a trajectory between mission way points that seeks valleys to minimize threat exposure. The pilot evaluation was conducted at NASA ARC moving base Vertical Motion Simulator (VMS) by pilots representing NASA, the U.S. Army, the Air Force, and the helicopter industry. The pilots manually tracked the trajectory generated by the algorithm utilizing the HMD symbology. The pilots were able to satisfactorily perform the tracking tasks while maintaining a high degree of awareness of the outside world.
Mild, Jesica G; Fernandez, Lucia R; Gayet, Odile; Iovanna, Juan; Dusetti, Nelson; Edreira, Martin M
2018-05-01
Chagas disease, a parasitic disease caused by Trypanosoma cruzi, is a major public health burden in poor rural populations of Central and South America and a serious emerging threat outside the endemic region, since the number of infections in non-endemic countries continues to rise. In order to develop more efficient anti-trypanosomal treatments to replace the outdated therapies, new molecular targets need to be explored and new drugs discovered. Trypanosoma cruzi has distinctive structural and functional characteristics with respect to the human host. These exclusive features could emerge as interesting drug targets. In this work, essential and differential protein-protein interactions for the parasite, including the ribosomal P proteins and proteins involved in mRNA processing, were evaluated in a bioluminescence resonance energy transfer-based assay as a starting point for drug screening. Suitable conditions to consider using this simple and robust methodology to screening compounds and natural extracts able to inhibit protein-protein interactions were set in living cells and lysates.
[GENOTYPING OF THE BURKHOLDERIA MALLEI STRAINS BASED ON DIFFERENT REGION ANALYSIS].
Bondareva, O S; Savchenko, S S; Tkachenko, G A; Ledeneva, M L; Lemasova, L V; Antonov, V A
2016-01-01
Development of the genotyping methods of glanders agent is urgent due to its high pathogenicity, lack of effective preventive measures and threat of the use of Burkholderia mallei as a biological weapon. In this work we proposed a scheme for the typing of the B. mallei strains based on different region analysis (DFR). The choice of variable loci differentially presented in various strains of glanders agents was performed by analyzing annotated whole-genome sequences of the B. mallei strains. Primers and fluorescence probes were designed for 9 selected loci. The amplification conditions for different regions were optimized in two variants: with electrophoretic detection and hybridization-fluorescence detection in the strip format. The possibility of applying the DFR analysis to genetic characterization of strains was assessed in 14 B. mallei strains. The genetic profiles of the studied B. mallei strains revealed that the developed DFR-typing scheme was characterized by high discrimination power (Hunter-Gaston index value was 0.92), reproducibility, rapidity, easy interpretation, and applicability for epidemiological surveillance of glanders.
Stereo matching algorithm based on double components model
NASA Astrophysics Data System (ADS)
Zhou, Xiao; Ou, Kejun; Zhao, Jianxin; Mou, Xingang
2018-03-01
The tiny wires are the great threat to the safety of the UAV flight. Because they have only several pixels isolated far from the background, while most of the existing stereo matching methods require a certain area of the support region to improve the robustness, or assume the depth dependence of the neighboring pixels to meet requirement of global or semi global optimization method. So there will be some false alarms even failures when images contains tiny wires. A new stereo matching algorithm is approved in the paper based on double components model. According to different texture types the input image is decomposed into two independent component images. One contains only sparse wire texture image and another contains all remaining parts. Different matching schemes are adopted for each component image pairs. Experiment proved that the algorithm can effectively calculate the depth image of complex scene of patrol UAV, which can detect tiny wires besides the large size objects. Compared with the current mainstream method it has obvious advantages.
ERIC Educational Resources Information Center
Guisasola, Jenaro; Robinson, Mike; Zuza, Kristina
2007-01-01
In this study, Spanish and US secondary science teacher data is used to address the relationship between what science teachers teach and the science and technology based environmental problems/threats faced by the world. The results of a two part questionnaire indicated that teachers of both countries are worried about the problem of pollution of…
On Learning: Metrics Based Systems for Countering Asymmetric Threats
2006-05-25
of self- education . While this alone cannot guarantee organizational learning , no organization can learn without a spirit of individual learning ...held views on globalization and the impact of Information Age technology . The emerging environment conceptually links to the learning model as part...On Learning : Metrics Based Systems for Countering Asymmetric Threats A Monograph by MAJ Rafael Lopez U.S. Army School of Advanced Military
ERIC Educational Resources Information Center
Wan, Chin-Sheng; Chiou, Wen-Bin
2010-01-01
The negative impact of online gaming on adolescents has received much attention. The question of how to reduce their pathological use of online gaming is a critical issue. Based on the concept of external justification in dissonance theory, this experimental study aimed to examine whether severity of threat and justification of effort would impact…
Jones, Ana-Marie
Over the last several decades, billions of dollars have been spent in the USA to increase its disaster readiness and response capacity. Virtually every poll and survey shows that the US public remains woefully underprepared. At the 2012 'Awareness to Action' workshop convened by the Federal Emergency Management Agency (FEMA) and the American Red Cross to examine the future of the long-standing 'Have a Kit. Make a Plan. Be Informed' preparedness campaign, FEMA Administrator Craig Fugate acknowledged that traditional efforts have not 'moved the preparedness needle'. The most frequently cited causes for lack of preparedness in the general public are consumer apathy, lack of time, lack of money and the lack of knowledge on how best to prepare. This paper explores the reliance on fear- and threat-based messages (also referred to as 'fear appeals' to promote preparedness as a significant cause for this lack of preparation. It will look at the growing body of fear research, how fear and threat appeals are pervasive in emergency management, as well as its costs, unintended consequences and the other choices that can be made. The author asserts that by eliminating fear and threat-based messages, new messengers can share readiness as an accessible, empowering and valued pursuit for all communities - entirely distinct from the disasters and threats that people face.
Jones, Ana-Marie
2013-01-01
Over the last several decades, billions of dollars have been spent in the USA to increase disaster readiness and response capacity. Virtually every poll and survey shows that the US public remains woefully underprepared. At the 2012 'Awareness to Action' workshop convened by the Federal Emergency Management Agency (FEMA) and the American Red Cross to examine the future of the long-standing 'Have a Kit. Make a Plan. Be Informed' preparedness campaign, FEMA Administrator Craig Fugate acknowledged that traditional efforts have not 'moved the preparedness needle'. The most frequently cited causes for lack of preparedness in the general public are consumer apathy, lack of time, lack of money and the lack of knowledge on how best to prepare. This paper explores the reliance on fear and threat-based messages (also referred to as 'fear appeals') to promote preparedness as a significant cause for this lack of preparation. It will look at the growing body of fear research, how fear and threat appeals are pervasive in emergency management, as well as their costs, unintended consequences and the other choices that can be made. The author asserts that by eliminating fear and threat-based messages, new messengers can share readiness as an accessible, empowering and valued pursuit for all communities - entirely distinct from the disasters and threats that are faced.
The impact of joint responses of devices in an airport security system.
Nie, Xiaofeng; Batta, Rajan; Drury, Colin G; Lin, Li
2009-02-01
In this article, we consider a model for an airport security system in which the declaration of a threat is based on the joint responses of inspection devices. This is in contrast to the typical system in which each check station independently declares a passenger as having a threat or not having a threat. In our framework the declaration of threat/no-threat is based upon the passenger scores at the check stations he/she goes through. To do this we use concepts from classification theory in the field of multivariate statistics analysis and focus on the main objective of minimizing the expected cost of misclassification. The corresponding correct classification and misclassification probabilities can be obtained by using a simulation-based method. After computing the overall false alarm and false clear probabilities, we compare our joint response system with two other independently operated systems. A model that groups passengers in a manner that minimizes the false alarm probability while maintaining the false clear probability within specifications set by a security authority is considered. We also analyze the staffing needs at each check station for such an inspection scheme. An illustrative example is provided along with sensitivity analysis on key model parameters. A discussion is provided on some implementation issues, on the various assumptions made in the analysis, and on potential drawbacks of the approach.
Final Technical Report. Project Boeing SGS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bell, Thomas E.
Boeing and its partner, PJM Interconnection, teamed to bring advanced “defense-grade” technologies for cyber security to the US regional power grid through demonstration in PJM’s energy management environment. Under this cooperative project with the Department of Energy, Boeing and PJM have developed and demonstrated a host of technologies specifically tailored to the needs of PJM and the electric sector as a whole. The team has demonstrated to the energy industry a combination of processes, techniques and technologies that have been successfully implemented in the commercial, defense, and intelligence communities to identify, mitigate and continuously monitor the cyber security of criticalmore » systems. Guided by the results of a Cyber Security Risk-Based Assessment completed in Phase I, the Boeing-PJM team has completed multiple iterations through the Phase II Development and Phase III Deployment phases. Multiple cyber security solutions have been completed across a variety of controls including: Application Security, Enhanced Malware Detection, Security Incident and Event Management (SIEM) Optimization, Continuous Vulnerability Monitoring, SCADA Monitoring/Intrusion Detection, Operational Resiliency, Cyber Range simulations and hands on cyber security personnel training. All of the developed and demonstrated solutions are suitable for replication across the electric sector and/or the energy sector as a whole. Benefits identified include; Improved malware and intrusion detection capability on critical SCADA networks including behavioral-based alerts resulting in improved zero-day threat protection; Improved Security Incident and Event Management system resulting in better threat visibility, thus increasing the likelihood of detecting a serious event; Improved malware detection and zero-day threat response capability; Improved ability to systematically evaluate and secure in house and vendor sourced software applications; Improved ability to continuously monitor and maintain secure configuration of network devices resulting in reduced vulnerabilities for potential exploitation; Improved overall cyber security situational awareness through the integration of multiple discrete security technologies into a single cyber security reporting console; Improved ability to maintain the resiliency of critical systems in the face of a targeted cyber attack of other significant event; Improved ability to model complex networks for penetration testing and advanced training of cyber security personnel« less
Carlson, Joshua M; Beacher, Felix; Reinke, Karen S; Habib, Reza; Harmon-Jones, Eddie; Mujica-Parodi, Lilianne R; Hajcak, Greg
2012-01-16
An important aspect of the fear response is the allocation of spatial attention toward threatening stimuli. This response is so powerful that modulations in spatial attention can occur automatically without conscious awareness. Functional neuroimaging research suggests that the amygdala and anterior cingulate cortex (ACC) form a network involved in the rapid orienting of attention to threat. A hyper-responsive attention bias to threat is a common component of anxiety disorders. Yet, little is known of how individual differences in underlying brain morphometry relate to variability in attention bias to threat. Here, we performed two experiments using dot-probe tasks that measured individuals' attention bias to backward masked fearful faces. We collected whole-brain structural magnetic resonance images and used voxel-based morphometry to measure brain morphometry. We tested the hypothesis that reduced gray matter within the amygdala and ACC would be associated with reduced attention bias to threat. In Experiment 1, we found that backward masked fearful faces captured spatial attention and that elevated attention bias to masked threat was associated with greater ACC gray matter volumes. In Experiment 2, this association was replicated in a separate sample. Thus, we provide initial and replicating evidence that ACC gray matter volume is correlated with biased attention to threat. Importantly, we demonstrate that variability in affective attention bias within the healthy population is associated with ACC morphometry. This result opens the door for future research into the underlying brain morphometry associated with attention bias in clinically anxious populations. Copyright © 2011 Elsevier Inc. All rights reserved.
Sumner, Jennifer A.; Powers, Abigail; Jovanovic, Tanja; Koenen, Karestan C.
2015-01-01
The NIMH Research Domain Criteria (RDoC) initiative aims to describe key dimensional constructs underlying mental function across multiple units of analysis—from genes to observable behaviors—in order to better understand psychopathology. The acute threat (“fear”) construct of the RDoC Negative Valence System has been studied extensively from a translational perspective, and is highly pertinent to numerous psychiatric conditions, including anxiety and trauma-related disorders. We examined genetic contributions to the construct of acute threat at two units of analysis within the RDoC framework: 1) neural circuits and 2) physiology. Specifically, we focused on genetic influences on activation patterns of frontolimbic neural circuitry and on startle, skin conductance, and heart rate responses. Research on the heritability of activation in threat-related frontolimbic neural circuitry is lacking, but physiological indicators of acute threat have been found to be moderately heritable (35-50%). Genetic studies of the neural circuitry and physiology of acute threat have almost exclusively relied on the candidate gene method and, as in the broader psychiatric genetics literature, most findings have failed to replicate. The most robust support has been demonstrated for associations between variation in the serotonin transporter (SLC6A4) and catechol-O-methyltransferase (COMT) genes with threat-related neural activation and physiological responses. However, unbiased genome-wide approaches using very large samples are needed for gene discovery, and these can be accomplished with collaborative consortium-based research efforts, such as those of the Psychiatric Genomics Consortium (PGC) and Enhancing Neuro Imaging Genetics through Meta-Analysis (ENIGMA) Consortium. PMID:26377804
Compact USB-powered mobile ELISA-based pathogen detection: design and implementation challenges
NASA Astrophysics Data System (ADS)
Starodubov, Dmitry; Asanbaeva, Anya; Berezhnyy, Ihor; Chao, Chung-Yen; Koziol, Richard; Miller, David; Patton, Edward; Trehan, Sushma; Ulmer, Chris
2011-05-01
Physical Optics Corporation (POC) presents a novel Mobile ELISA-based Pathogen Detection system that is based on a disposable microfluidic chip for multiple-threat detection and a highly sensitive portable microfluidic fluorescence measurement unit that also controls the flow of samples and reagents through the microfluidic channels of the chip. The fluorescence detection subsystem is composed of a commercial 635-nm diode laser, an avalanche photodiode (APD) that measures fluorescence, and three filtering mirrors that provide more than 100 dB of excitation line suppression in the signal detection channel. Special techniques to suppress the fluorescence and scattering background allow optimizing the dynamic range for a compact package. Concentrations below 100 ng/mL can be reliably identified. The entire instrument is powered using a USB port of a notebook PC and operates as a plug-and-play human-interface device, resulting in a truly peripheral biosensor. The operation of the system is fully automated, with minimal user intervention through the detection process. The resolved challenges of the design and implementation are presented in detail in this publication.
AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid
Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik
2014-01-01
A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification. PMID:25152923
A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)
Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.
2007-01-01
The Florida manatee (Trichechus manatus latirostris) is an endangered marine mammal endemic to the southeastern United States. The primary threats to manatee populations are collisions with watercraft and the potential loss of warm-water refuges. For the purposes of listing, recovery, and regulation under the Endangered Species Act (ESA), an understanding of the relative effects of the principal threats is needed. This work is a quantitative approach to threats analysis, grounded in the assumption that an appropriate measure of status under the ESA is based on the risk of extinction, as quantified by the probability of quasi-extinction. This is related to the qualitative threats analyses that are more common under the ESA, but provides an additional level of rigor, objectivity, and integration. In this approach, our philosophy is that analysis of the five threat factors described in Section 4(a)(1) of the ESA can be undertaken within an integrated quantitative framework. The basis of this threats analysis is a comparative population viability analysis. This involves forecasting the Florida manatee population under different scenarios regarding the presence of threats, while accounting for process variation (environmental, demographic, and catastrophic stochasticity) as well as parametric and structural uncertainty. We used the manatee core biological model (CBM) for this viability analysis, and considered the role of five threats: watercraft-related mortality, loss of warm-water habitat in winter, mortality in water-control structures, entanglement, and red tide. All scenarios were run with an underlying parallel structure that allowed a more powerful estimation of the effects of the various threats. The results reflect our understanding of manatee ecology (as captured in the structure of the CBM), our estimates of manatee demography (as described by the parameters in the model), and our characterization of the mechanisms by which the threats act on manatees. As an example of the type of results generated, we estimated that the probability of the manatee population falling to less than 250 adults on either the Atlantic or Gulf coasts (from a current statewide population size of near 3300) within 100 years is 8.6%. Complete removal of the watercraft threat alone would reduce this risk to 0.4%; complete removal of the warm-water threat to 4.2%; removal of both threats would reduce the risk to 0.1%. The modeling approach we have taken also allows us to consider partial removal of threats, as well as removal of multiple threats simultaneously. We believe the measure we have proposed (probability of quasi-extinction over y years, with quasi-extinction defined as dropping below a threshold of z on either coast) is a suitable measure of status that integrates a number of the elements that are relevant to interpretation under the ESA (it directly integrates risk of extinction and reduction of range, and indirectly integrates loss of genetic diversity). But the identification of the time frame of interest and the tolerable risk of quasi-extinction are policy decisions, and an ecology-based quasi-extinction threshold has not yet been determined. We have endeavored to provide results over a wide range of these parameters to give decision-makers useful information to assess status. This assessment of threats suggests that watercraft-related mortality is having the greatest impact on manatee population growth and resilience. Elimination of this single threat would greatly reduce the probability of quasi-extinction. Loss of warm-water is also a significant threat, particularly over the long-term. Red tide and entanglement, while noticeable threats, have had less of an impact on the manatee population. The effect of water control structures may have already been largely mitigated. We did not, however, consider an exhaustive list of threats. Other threats (e.g., reduction of food resources due to storms and development) may play a
Visualization Development of the Ballistic Threat Geospatial Optimization
2015-07-01
topographic globes, Keyhole Markup Language (KML), and Collada files. World Wind gives the user the ability to import 3-D models and navigate...present. After the first person view window is closed , the images stored in memory are then converted to a QuickTime movie (.MOV). The video will be...processing unit HPC high-performance computing JOGL Java implementation of OpenGL KML Keyhole Markup Language NASA National Aeronautics and Space
Shape-based human detection for threat assessment
NASA Astrophysics Data System (ADS)
Lee, Dah-Jye; Zhan, Pengcheng; Thomas, Aaron; Schoenberger, Robert B.
2004-07-01
Detection of intrusions for early threat assessment requires the capability of distinguishing whether the intrusion is a human, an animal, or other objects. Most low-cost security systems use simple electronic motion detection sensors to monitor motion or the location of objects within the perimeter. Although cost effective, these systems suffer from high rates of false alarm, especially when monitoring open environments. Any moving objects including animals can falsely trigger the security system. Other security systems that utilize video equipment require human interpretation of the scene in order to make real-time threat assessment. Shape-based human detection technique has been developed for accurate early threat assessments for open and remote environment. Potential threats are isolated from the static background scene using differential motion analysis and contours of the intruding objects are extracted for shape analysis. Contour points are simplified by removing redundant points connecting short and straight line segments and preserving only those with shape significance. Contours are represented in tangent space for comparison with shapes stored in database. Power cepstrum technique has been developed to search for the best matched contour in database and to distinguish a human from other objects from different viewing angles and distances.
A Decision Theoretic Approach to Evaluate Radiation Detection Algorithms
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nobles, Mallory A.; Sego, Landon H.; Cooley, Scott K.
2013-07-01
There are a variety of sensor systems deployed at U.S. border crossings and ports of entry that scan for illicit nuclear material. In this work, we develop a framework for comparing the performance of detection algorithms that interpret the output of these scans and determine when secondary screening is needed. We optimize each algorithm to minimize its risk, or expected loss. We measure an algorithm’s risk by considering its performance over a sample, the probability distribution of threat sources, and the consequence of detection errors. While it is common to optimize algorithms by fixing one error rate and minimizing another,more » our framework allows one to simultaneously consider multiple types of detection errors. Our framework is flexible and easily adapted to many different assumptions regarding the probability of a vehicle containing illicit material, and the relative consequences of a false positive and false negative errors. Our methods can therefore inform decision makers of the algorithm family and parameter values which best reduce the threat from illicit nuclear material, given their understanding of the environment at any point in time. To illustrate the applicability of our methods, in this paper, we compare the risk from two families of detection algorithms and discuss the policy implications of our results.« less
Ching, Terence H W; Williams, Monnica T; Siev, Jedidiah; Olatunji, Bunmi O
2018-05-01
Disgust has been shown to perform a "disease-avoidance" function in contamination fears. However, no studies have examined the relevance of disgust to obsessive-compulsive (OC) concerns about sexual orientation (e.g., fear of one's sexual orientation transforming against one's will, and compulsive avoidance of same-sex and/or gay or lesbian individuals to prevent that from happening). Therefore, we investigated whether the specific domain of contamination-based disgust (i.e., evoked by the perceived threat of transmission of essences between individuals) predicted OC concerns about sexual orientation, and whether this effect was moderated/amplified by obsessive beliefs, in evaluation of a "sexual orientation transformation-avoidance" function. We recruited 283 self-identified heterosexual college students (152 females, 131 males; mean age = 20.88 years, SD = 3.19) who completed three measures assessing disgust, obsessive beliefs, and OC concerns about sexual orientation. Results showed that contamination-based disgust (β = .17), responsibility/threat overestimation beliefs (β = .15), and their interaction (β = .17) each uniquely predicted OC concerns about sexual orientation, ts = 2.22, 2.50, and 2.90, ps < .05. Post hoc probing indicated that high contamination-based disgust accompanied by strong responsibility/threat overestimation beliefs predicted more severe OC concerns about sexual orientation, β = .48, t = 3.24, p < .001. The present study, therefore, provided preliminary evidence for a "sexual orientation transformation-avoidance" process underlying OC concerns about sexual orientation in heterosexual college students, which is facilitated by contamination-based disgust, and exacerbated by responsibility/threat overestimation beliefs. Treatment for OC concerns about sexual orientation should target such beliefs.
Finite Energy and Bounded Attacks on Control System Sensor Signals
DOE Office of Scientific and Technical Information (OSTI.GOV)
Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M
Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signalmore » attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.« less
Optimal allocation of resources among threatened species: a project prioritization protocol.
Joseph, Liana N; Maloney, Richard F; Possingham, Hugh P
2009-04-01
Conservation funds are grossly inadequate to address the plight of threatened species. Government and conservation organizations faced with the task of conserving threatened species desperately need simple strategies for allocating limited resources. The academic literature dedicated to systematic priority setting usually recommends ranking species on several criteria, including level of endangerment and metrics of species value such as evolutionary distinctiveness, ecological importance, and social significance. These approaches ignore 2 crucial factors: the cost of management and the likelihood that the management will succeed. These oversights will result in misallocation of scarce conservation resources and possibly unnecessary losses. We devised a project prioritization protocol (PPP) to optimize resource allocation among New Zealand's threatened-species projects, where costs, benefits (including species values), and the likelihood of management success were considered simultaneously. We compared the number of species managed and the expected benefits gained with 5 prioritization criteria: PPP with weightings based on species value; PPP with species weighted equally; management costs; species value; and threat status. We found that the rational use of cost and success information substantially increased the number of species managed, and prioritizing management projects according to species value or threat status in isolation was inefficient and resulted in fewer species managed. In addition, we found a clear trade-off between funding management of a greater number of the most cost-efficient and least risky projects and funding fewer projects to manage the species of higher value. Specifically, 11 of 32 species projects could be funded if projects were weighted by species value compared with 16 projects if projects were not weighted. This highlights the value of a transparent decision-making process, which enables a careful consideration of trade-offs. The use of PPP can substantially improve conservation outcomes for threatened species by increasing efficiency and ensuring transparency of management decisions.
NASA Astrophysics Data System (ADS)
Kumar, Pankaj; Saraswat, Chitresh; Mishra, Binaya Kumar; Avtar, Ram; Patel, Hiral; Patel, Asha; Sharma, Tejal; Patel, Roshni
2017-09-01
Fluoride pollution (with concentration >1.0 mg/L) in groundwater has become a global threat in the recent past due to the lesser availability of potable groundwater resource. In between several defluoridation techniques discovered so far, the adsorption process proved to be most economic and efficient. This study is an effort to evaluate defluoridation efficiency of powdered rice husk, fine chopped rice husk and sawdust by the batch adsorption process. Optimum defluoridation capacity is achieved by optimizing various parameters, viz. dose of adsorbent, pH, contact time and initial concentration. It was found that all three materials can be employed for the defluoridation technique, but powdered rice husk is the best adsorbent in the midst of all three. Powdered rice husk showed fluoride removal efficiency ranging between 85 and 90 % in the contact period of 7 h only in conditions of all optimized parameter. Following this parameter optimization, adsorption efficiency was also evaluated at natural pH of groundwater to minimize the cost of defluoridation. No significant difference was found between fluoride adsorption at optimized pH (pH = 4) and natural one (pH = 7), which concludes that powdered rice husk can be efficiently used for the defluoridation technique at field scale. The adsorption isotherm using this adsorbent perfectly followed Langmuir isotherms. The value of calculated separation factor also suggests the favourable adsorption of fluoride onto this adsorbent under the conditions used for the experiments. The field application for defluoridation of groundwater using this adsorbent (based on pH of natural groundwater there and seasonal variation of temperature) showed the high success rate.
Jing, Xu; Hu, Hanwen; Yang, Huijun; Au, Man Ho; Li, Shuqin; Xiong, Naixue; Imran, Muhammad; Vasilakos, Athanasios V
2017-03-21
The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider's server contains a lot of valuable resources. LoBSs' users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs' risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs' risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing.
Jing, Xu; Hu, Hanwen; Yang, Huijun; Au, Man Ho; Li, Shuqin; Xiong, Naixue; Imran, Muhammad; Vasilakos, Athanasios V.
2017-01-01
The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider’s server contains a lot of valuable resources. LoBSs’ users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs’ risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs’ risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing. PMID:28335569
On the complex quantification of risk: systems-based perspective on terrorism.
Haimes, Yacov Y
2011-08-01
This article highlights the complexity of the quantification of the multidimensional risk function, develops five systems-based premises on quantifying the risk of terrorism to a threatened system, and advocates the quantification of vulnerability and resilience through the states of the system. The five premises are: (i) There exists interdependence between a specific threat to a system by terrorist networks and the states of the targeted system, as represented through the system's vulnerability, resilience, and criticality-impact. (ii) A specific threat, its probability, its timing, the states of the targeted system, and the probability of consequences can be interdependent. (iii) The two questions in the risk assessment process: "What is the likelihood?" and "What are the consequences?" can be interdependent. (iv) Risk management policy options can reduce both the likelihood of a threat to a targeted system and the associated likelihood of consequences by changing the states (including both vulnerability and resilience) of the system. (v) The quantification of risk to a vulnerable system from a specific threat must be built on a systemic and repeatable modeling process, by recognizing that the states of the system constitute an essential step to construct quantitative metrics of the consequences based on intelligence gathering, expert evidence, and other qualitative information. The fact that the states of all systems are functions of time (among other variables) makes the time frame pivotal in each component of the process of risk assessment, management, and communication. Thus, risk to a system, caused by an initiating event (e.g., a threat) is a multidimensional function of the specific threat, its probability and time frame, the states of the system (representing vulnerability and resilience), and the probabilistic multidimensional consequences. © 2011 Society for Risk Analysis.
A strategy for prioritizing threats and recovery actions for at-risk species.
Darst, Catherine R; Murphy, Philip J; Strout, Nathan W; Campbell, Steven P; Field, Kimberleigh J; Allison, Linda; Averill-Murray, Roy C
2013-03-01
Ensuring the persistence of at-risk species depends on implementing conservation actions that ameliorate threats. We developed and implemented a method to quantify the relative importance of threats and to prioritize recovery actions based on their potential to affect risk to Mojave desert tortoises (Gopherus agassizii). We used assessments of threat importance and elasticities of demographic rates from population matrix models to estimate the relative contributions of threats to overall increase in risk to the population. We found that urbanization, human access, military operations, disease, and illegal use of off highway vehicles are the most serious threats to the desert tortoise range-wide. These results suggest that, overall, recovery actions that decrease habitat loss, predation, and crushing will be most effective for recovery; specifically, we found that habitat restoration, topic-specific environmental education, and land acquisition are most likely to result in the greatest decrease in risk to the desert tortoise across its range. In addition, we have developed an application that manages the conceptual model and all supporting information and calculates threat severity and potential effectiveness of recovery actions. Our analytical approach provides an objective process for quantifying threats, prioritizing recovery actions, and developing monitoring metrics for those actions for adaptive management of any at-risk species.
Content specificity of attention bias to threat in anxiety disorders: a meta-analysis.
Pergamin-Hight, Lee; Naim, Reut; Bakermans-Kranenburg, Marian J; van IJzendoorn, Marinus H; Bar-Haim, Yair
2015-02-01
Despite the established evidence for threat-related attention bias in anxiety, the mechanisms underlying this bias remain unclear. One important unresolved question is whether disorder-congruent threats capture attention to a greater extent than do more general or disorder-incongruent threat stimuli. Evidence for attention bias specificity in anxiety would implicate involvement of previous learning and memory processes in threat-related attention bias, whereas lack of content specificity would point to perturbations in more generic attention processes. Enhanced clarity of mechanism could have clinical implications for the stimuli types used in Attention Bias Modification Treatments (ABMT). Content specificity of threat-related attention bias in anxiety and potential moderators of this effect were investigated. A systematic search identified 37 samples from 29 articles (N=866). Relevant data were extracted based on specific coding rules, and Cohen's d effect size was used to estimate bias specificity effects. The results indicate greater attention bias toward disorder-congruent relative to disorder-incongruent threat stimuli (d=0.28, p<0.0001). This effect was not moderated by age, type of anxiety disorder, visual attention tasks, or type of disorder-incongruent stimuli. No evidence of publication bias was observed. Implications for threat bias in anxiety and ABMT are discussed. Copyright © 2014 Elsevier Ltd. All rights reserved.
The impact of Stereotype Threat on the simulated driving performance of older drivers.
Joanisse, Mélanie; Gagnon, Sylvain; Voloaca, Mihnea
2013-01-01
Older drivers are perceived as being dangerous and overly cautious by other drivers. We tested the hypothesis that this negative stereotype has a direct influence on the performance of older drivers. Based on the Stereotype Threat literature, we predicted that older driving performance would be altered after exposure to a Stereotype Threat. Sixty-one older drivers aged 65 and above completed a simulated driving assessment course. Prior to testing, half of the participants were told that the objective of the study was to investigate why older adults aged 65 and above were more implicated in on-road accidents (Stereotype Threat condition) and half were showed a neutral statement. Results confirmed that exposure to the threat significantly altered driving performance. Older adults in the Stereotype Threat condition made more driving mistakes than those in the control group. Interestingly, under a Stereotype Threat condition, older adults tended to commit more speeding infractions. We also observed that domain identification (whether driving is deemed important or not) moderated the impact of the threat. Taken together, these results support recent older drivers' performance models suggesting that the interaction between individual and social factors need to be considered when examining older drivers' performance. Copyright © 2012 Elsevier Ltd. All rights reserved.
Bayesian Spatial Design of Optimal Deep Tubewell Locations in Matlab, Bangladesh.
Warren, Joshua L; Perez-Heydrich, Carolina; Yunus, Mohammad
2013-09-01
We introduce a method for statistically identifying the optimal locations of deep tubewells (dtws) to be installed in Matlab, Bangladesh. Dtw installations serve to mitigate exposure to naturally occurring arsenic found at groundwater depths less than 200 meters, a serious environmental health threat for the population of Bangladesh. We introduce an objective function, which incorporates both arsenic level and nearest town population size, to identify optimal locations for dtw placement. Assuming complete knowledge of the arsenic surface, we then demonstrate how minimizing the objective function over a domain favors dtws placed in areas with high arsenic values and close to largely populated regions. Given only a partial realization of the arsenic surface over a domain, we use a Bayesian spatial statistical model to predict the full arsenic surface and estimate the optimal dtw locations. The uncertainty associated with these estimated locations is correctly characterized as well. The new method is applied to a dataset from a village in Matlab and the estimated optimal locations are analyzed along with their respective 95% credible regions.
Sustainable food systems for optimal planetary health.
Canavan, Chelsey R; Noor, Ramadhani A; Golden, Christopher D; Juma, Calestous; Fawzi, Wafaie
2017-06-01
Sustainable food systems are an important component of a planetary health strategy to reduce the threat of infectious disease, minimize environmental footprint and promote nutrition. Human population trends and dietary transition have led to growing demand for food and increasing production and consumption of meat, amid declining availability of arable land and water. The intensification of livestock production has serious environmental and infectious disease impacts. Land clearing for agriculture alters ecosystems, increases human-wildlife interactions and leads to disease proliferation. Context-specific interventions should be evaluated towards optimizing nutrition resilience, minimizing environmental footprint and reducing animal and human disease risk. © The Author 2017. Published by Oxford University Press on behalf of Royal Society of Tropical Medicine and Hygiene.
ERIC Educational Resources Information Center
Robinson, Michael; Tibanyendera, Basil; Seltzer-Kelly, Debbie
2007-01-01
This article reports the effects of a science, technology, and society (STS) teaching approach on the knowledge and attitudes of preservice science and mathematics teachers in Uganda toward global science and technology-based problems and/or threats. The responses of a baseline or control group (N = 50) and an experimental group (N = 50) to five…
Postural threat influences vestibular-evoked muscular responses.
Lim, Shannon B; Cleworth, Taylor W; Horslen, Brian C; Blouin, Jean-Sébastien; Inglis, J Timothy; Carpenter, Mark G
2017-02-01
Standing balance is significantly influenced by postural threat. While this effect has been well established, the underlying mechanisms of the effect are less understood. The involvement of the vestibular system is under current debate, and recent studies that investigated the effects of height-induced postural threat on vestibular-evoked responses provide conflicting results based on kinetic (Horslen BC, Dakin CJ, Inglis JT, Blouin JS, Carpenter MG. J Physiol 592: 3671-3685, 2014) and kinematic (Osler CJ, Tersteeg MC, Reynolds RF, Loram ID. Eur J Neurosci 38: 3239-3247, 2013) data. We examined the effect of threat of perturbation, a different form of postural threat, on coupling (cross-correlation, coherence, and gain) of the vestibulo-muscular relationship in 25 participants who maintained standing balance. In the "No-Threat" conditions, participants stood quietly on a stable surface. In the "Threat" condition, participants' balance was threatened with unpredictable mediolateral support surface tilts. Quiet standing immediately before the surface tilts was compared to an equivalent time from the No-Threat conditions. Surface EMG was recorded from bilateral trunk, hip, and leg muscles. Hip and leg muscles exhibited significant increases in peak cross-correlation amplitudes, coherence, and gain (1.23-2.66×) in the Threat condition compared with No-Threat conditions, and significant correlations were observed between threat-related changes in physiological arousal and medium-latency peak cross-correlation amplitude in medial gastrocnemius (r = 0.408) muscles. These findings show a clear threat effect on vestibular-evoked responses in muscles in the lower body, with less robust effects of threat on trunk muscles. Combined with previous work, the present results can provide insight into observed changes during balance control in threatening situations. This is the first study to show increases in vestibular-evoked responses of the lower body muscles under conditions of increased threat of postural perturbation. While robust findings were observed in hip and leg muscles, less consistent results were found in muscles of the trunk. The present findings provide further support in the ongoing debate for arguments that vestibular-evoked balance responses are influenced by fear and anxiety and explain previous threat-related changes in balance. Copyright © 2017 the American Physiological Society.
Security risks associated with radio frequency identification in medical environments.
Hawrylak, Peter J; Schimke, Nakeisha; Hale, John; Papa, Mauricio
2012-12-01
Radio frequency identification (RFID) is a form of wireless communication that is used to identify assets and people. RFID has significant benefits to the medical environment. However, serious security threats are present in RFID systems that must be addressed in a medical environment. Of particular interest are threats to patient privacy and safety based on interception of messages, interruption of communication, modification of data, and fabrication of messages and devices. This paper presents an overview of these security threats present in RFID systems in a medical environment and provides guidance on potential solutions to these threats. This paper provides a roadmap for researchers and implementers to address the security issues facing RFID in the medical space.
Predictive Analytics for Safer Food Supply
USDA-ARS?s Scientific Manuscript database
Science based risk analysis improves the USDA Food Safety Inspection Service’s ability to combat threats to public health from food-borne illness by allowing the Agency to focus resources on hazards that pose the greatest risk. Innovative algorithms enable detection and containment of threat by an...
Incentives, Behavior, and Risk Management
ERIC Educational Resources Information Center
Liu, Debin
2011-01-01
Insiders are one of the most serious threats to an organization's information assets. Generally speaking, there are two types of insider threats based on the insiders' intents. Malicious Insiders are individuals with varying degrees of harmful intentions. Inadvertent Insiders are individuals without malicious intent. In this dissertation, I…
Use of Vertically Integrated Ice in WRF-Based Forecasts of Lightning Threat
NASA Technical Reports Server (NTRS)
McCaul, E. W., jr.; Goodman, S. J.
2008-01-01
Previously reported methods of forecasting lightning threat using fields of graupel flux from WRF simulations are extended to include the simulated field of vertically integrated ice within storms. Although the ice integral shows less temporal variability than graupel flux, it provides more areal coverage, and can thus be used to create a lightning forecast that better matches the areal coverage of the lightning threat found in observations of flash extent density. A blended lightning forecast threat can be constructed that retains much of the desirable temporal sensitivity of the graupel flux method, while also incorporating the coverage benefits of the ice integral method. The graupel flux and ice integral fields contributing to the blended forecast are calibrated against observed lightning flash origin density data, based on Lightning Mapping Array observations from a series of case studies chosen to cover a wide range of flash rate conditions. Linear curve fits that pass through the origin are found to be statistically robust for the calibration procedures.
Morriss, Jayne; Bell, Tiffany; Johnstone, Tom; van Reekum, Carien M; Hill, Jonathan
2018-06-21
The neural circuitry associated with threat regulation in the absence of other people is well established. An examination of threat regulatory processes with people from different domains of an individual's social world is key to understanding social emotion regulation and personality functioning conceptualised as social domain organisation. In this study, 42 healthy female participants completed functional magnetic imaging sessions in which they underwent a scan in the presence of a romantic partner or friend, whilst completing a threat of shock task. In the presence of a romantic partner vs. friend, we found a reduction in amygdala activation to threat vs. safe trials over time. Furthermore, in the presence of a romantic partner vs. friend we observed greater subgenual anterior cingulate cortex and ventromedial prefrontal cortex activation to threat vs. safe trials overall. The results support the hypothesis that recruitment of threat regulation circuitry is modulated by romantic partner relative to another person well-known to the individual. Future work needs to examine neural responses to a wider range of stimuli across more social domains, and implications of failures of this neural organisation for psychopathology.
Building Regional Threat-Based Networks for Estuaries in the Western United States
Merrifield, Matthew S.; Hines, Ellen; Liu, Xiaohang; Beck, Michael W.
2011-01-01
Estuaries are ecologically and economically valuable and have been highly degraded from both land and sea. Estuarine habitats in the coastal zone are under pressure from a range of human activities. In the United States and elsewhere, very few conservation plans focused on estuaries are regional in scope; fewer still address threats to estuary long term viability.We have compiled basic information about the spatial extent of threats to identify commonalities. To do this we classify estuaries into hierarchical networks that share similar threat characteristics using a spatial database (geodatabase) of threats to estuaries from land and sea in the western U.S.Our results show that very few estuaries in this region (16%) have no or minimal stresses from anthropogenic activity. Additionally, one quarter (25%) of all estuaries in this study have moderate levels of all threats. The small number of un-threatened estuaries is likely not representative of the ecological variability in the region and will require working to abate threats at others. We think the identification of these estuary groups can foster sharing best practices and coordination of conservation activities amongst estuaries in any geography. PMID:21387006
Porat, Roni; Tamir, Maya; Wohl, Michael J A; Gur, Tamar; Halperin, Eran
2018-04-18
A careful look at societies facing threat reveals a unique phenomenon in which liberals and conservatives react emotionally and attitudinally in a similar manner, rallying around the conservative flag. Previous research suggests that this rally effect is the result of liberals shifting in their attitudes and emotional responses toward the conservative end. Whereas theories of motivated social cognition provide a motivation-based account of cognitive processes (i.e. attitude shift), it remains unclear whether emotional shifts are, in fact, also a motivation-based process. Herein, we propose that under threat, liberals are motivated to feel existential concern about their group's future vitality (i.e. collective angst) to the same extent as conservatives, because this group-based emotion elicits support for ingroup protective action. Within the context of the Palestinian-Israeli conflict, we tested and found support for this hypothesis both inside (Study 1) and outside (Study 2) the laboratory. We did so using a behavioural index of motivation to experience collective angst. We discuss the implications of our findings for understanding motivated emotion regulation in the context of intergroup threat.
Henriksen, Eva; Burkow, Tatjana M; Johnsen, Elin; Vognild, Lars K
2013-08-09
Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient's TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform. Risk assessment was performed in an iterative manner during the development process. Thus, security solutions have been incorporated into the design from an early stage instead of being included as an add-on to a nearly completed system. We have adapted existing risk management methods to our own environment, thus creating our own method. Our method conforms to ISO's standard for information security risk management. A total of approximately 50 threats and possible unwanted incidents were identified and analysed. Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk. This is because health-related personal information is regarded as sensitive. Availability threats were analysed as low risk, as the aim of the home programmes is to provide education and rehabilitation services; not for use in acute situations or for continuous health monitoring. Most of the identified threats are applicable for healthcare services intended for patients or citizens in their own homes. Confidentiality risks in home are different from in a more controlled environment such as a hospital; and electronic equipment located in private homes and communicating via Internet, is more exposed to unauthorised access. By implementing the proposed measures, it has been possible to design a home-based service which ensures the necessary level of information security and privacy.
DHS S&T First Responders Group and NATO Counter UAS Proposal Interest Response.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Salton, Jonathan R.
The capability, speed, size, and widespread availability of small unmanned aerial systems (sUAS) makes them a serious security concern. The enabling technologies for sUAS are rapidly evolving and so too are the threats they pose to national security. Potential threat vehicles have a small cross-section, and are difficult to reliably detect using purely ground-based systems (e.g. radar or electro-optical) and challenging to target using conventional anti-aircraft defenses. Ground-based sensors are static and suffer from interference with the earth, vegetation and other man-made structures which obscure objects at low altitudes. Because of these challenges, sUAS pose a unique and rapidly evolvingmore » threat to national security.« less
More on Inoculating Against Reactance to Persuasive Health Messages: The Paradox of Threat.
Richards, Adam S; Banas, John A; Magid, Yoav
2017-07-01
This research examined the efficacy of inoculation as a strategy to mitigate psychological reactance based on the level of threat communicated in the forewarning and subsequent persuasive health appeal. Two 2 (inoculation) × 2 (freedom-threatening language) experiments were conducted. The first (N = 181) used elaborated inoculation designed to enhance the threat of impending reactance to a message advocating for responsible alcohol consumption. The second (N = 159) used limited inoculation designed to minimize the threat of impending reactance to a message advocating for responsible soft drink consumption. Results showed that elaborated inoculation increased reactance, whereas limited inoculation decreased reactance but only when the subsequent appeal used less freedom-threatening language. These findings suggest that inoculation has the potential to facilitate or buffer reactance depending on the level of threat communicated in inoculation forewarnings and in subsequent persuasive health appeals.
17 CFR 37.3 - Requirements for underlying commodities.
Code of Federal Regulations, 2012 CFR
2012-04-01
... to minimize the threat of market abuses such as price manipulation and distortions, congestion, and... highly unlikely to be susceptible to the threat of manipulation; or (iii) No cash market; (2) Commodities... which the Commission has determined, based on the market characteristics and surveillance history, and...
Mikkola, Riitta; Huhtala, Heini; Paavilainen, Eija
2017-10-01
To describe fear, the threats causing fear and the occurrence of fear among emergency department nursing staff and physicians. The emergency department is a challenging workplace where the staff is often confronted by factors that cause fear. A cross-sectional study. A survey was conducted in 16 hospitals (n = 544). Nurses, practical nurses, orderlies and physicians from those hospitals participated in the survey. The survey questionnaire was based on the analysis of interviews of 30 nurses from one university hospital and one central hospital. The results of the interviews were analysed using the inductive content analysis method. The analysis of the survey was performed using statistical methods, such as frequencies, cross-tabulation and principal component analysis. The results showed that nearly all of the emergency department personnel had experienced work-related fear. Generally, the fear had been momentary. According to the survey results, fear was most often caused by medication errors, the resuscitation of a child, a catastrophic accident, urgent or violent situations or patients armed with weapons. Threats that caused fear included insecurity, danger in the work environment, threat of loss of one's health and threat of the consequences of one's mistakes and actions. The staff of emergency departments often encountered factors or situations that caused fear. The main threats causing fear that were raised by the respondents were insecurity and danger in the work environment. The data obtained from this study can be utilised in identifying and describing work-related fear and threats of fear among emergency department nursing staff and physicians. Based on the information herein, it will be possible to develop methods to prevent situations that cause fear in emergency departments. © 2016 John Wiley & Sons Ltd.
Incorporating climate and ocean change into extinction risk assessments for 82 coral species.
Brainard, Russell E; Weijerman, Mariska; Eakin, C Mark; McElhany, Paul; Miller, Margaret W; Patterson, Matt; Piniak, Gregory A; Dunlap, Matthew J; Birkeland, Charles
2013-12-01
Many marine invertebrate species facing potential extinction have uncertain taxonomies and poorly known demographic and ecological traits. Uncertainties are compounded when potential extinction drivers are climate and ocean changes whose effects on even widespread and abundant species are only partially understood. The U.S. Endangered Species Act mandates conservation management decisions founded on the extinction risk to species based on the best available science at the time of consideration-requiring prompt action rather than awaiting better information. We developed an expert-opinion threat-based approach that entails a structured voting system to assess extinction risk from climate and ocean changes and other threats to 82 coral species for which population status and threat response information was limited. Such methods are urgently needed because constrained budgets and manpower will continue to hinder the availability of desired data for many potentially vulnerable marine species. Significant species-specific information gaps and uncertainties precluded quantitative assessments of habitat loss or population declines and necessitated increased reliance on demographic characteristics and threat vulnerabilities at genus or family levels. Adapting some methods (e.g., a structured voting system) used during other assessments and developing some new approaches (e.g., integrated assessment of threats and demographic characteristics), we rated the importance of threats contributing to coral extinction risk and assessed those threats against population status and trend information to evaluate each species' extinction risk over the 21st century. This qualitative assessment resulted in a ranking with an uncertainty range for each species according to their estimated likelihood of extinction. We offer guidance on approaches for future biological extinction risk assessments, especially in cases of data-limited species likely to be affected by global-scale threats. Incorporación del Cambio Climático y Oceánico en Estudios de Riesgo de Extinción para 82 Especies de Coral. © 2013 Society for Conservation Biology.
Smith, Timothy W; Birmingham, Wendy; Uchino, Bert N
2012-11-01
Physiological effects of social evaluation are central in models of psychosocial influences on physical health. Experimental manipulations of evaluative threat evoke substantial cardiovascular and neuroendocrine responses in laboratory studies, but only preliminary evidence is available regarding naturally occurring evaluative threats in daily life. In such nonexperimental ambulatory studies, it is essential to distinguish effects of evaluative threat from related constructs known to alter stress, such as ability perceptions and concerns about appearance. 94 married, working couples (mean age 29.2 years) completed a 1-day (8 a.m. to 10 p.m.) ambulatory blood pressure protocol with random interval-contingent measurements using a Suntech monitor and Palm Pilot-based measures of control variables and momentary experiences of social-evaluative threat, concerns about appearance, and perceived ability. In hierarchical analyses for couples and multiple measurement occasions (Proc Mixed; SAS) and controlling individual differences (BMI, age, income) and potential confounds (e.g., posture, activity), higher reports of social-evaluative threat were associated with higher concurrent systolic (estimate = .87, SE = .34) and diastolic blood pressure (estimate = 1.06; SE = .26), both p < .02. Effects of social-evaluative threat remained significant when perceived ability and appearance concerns were controlled. Naturally occurring social-evaluative threat during daily activity is associated with increased systolic and diastolic blood pressure. Given associations between ambulatory blood pressure and risk of cardiovascular disease, the findings support conceptual models of threats to the social self as a potentially important influence on physical health.
Environmental Risk Profiling of the Volta Delta, Ghana
NASA Astrophysics Data System (ADS)
Nyarko, B. K.; Appeaning-Addo, K.; Amisigo, B.
2017-12-01
Volta Delta communities find it difficult to absorb or bear risk at different levels, because of the physical and economic impacts of environmental hazards. In this regards various agencies and organizations have in recent years launched initiatives to measure and identify risk areas with a set of indicators and indices. The theory underpinning this study is concepts of Modern Portfolio Theory (MPT). The Cox proportional hazards regression model will be used as the model for the risk profile. Finding the optimal level of environmental risk for activities in the Volta Delta considering the risk required, risk capacity and risk tolerance. Using data from different sources, an environmental risk profile was developed for the Volta Delta. The result indicates that risks are distributed across the Delta. However, areas that have government interventions, such as sea defense system and irrigation facilities have less threat. In addition wealthy areas do effectively reduce the threat of any form of disaster.
Waugh, Christian E.; Fredrickson, Barbara L.; Taylor, Stephan F.
2009-01-01
Following highly negative events, people are deemed resilient if they maintain psychological stability and experience fewer mental health problems. The current research investigated how trait resilience (Block & Kremen, 1996, ER89) influences recovery from anticipated threats. Participants viewed cues (‘aversive’, ‘threat’, ‘safety’) that signified the likelihood of an upcoming picture (100% aversive, 50/50 aversive/neutral, or 100% neutral; respectively), and provided continuous affective ratings during the cue, picture, and after picture offset (recovery period). Participants high in trait resilience (HighR) exhibited more complete affective recovery (compared to LowR) after viewing a neutral picture that could have been aversive. Although other personality traits previously associated with resilience (i.e., optimism, extraversion, neuroticism) predicted affective responses during various portions of the task, none mediated the influence of trait resilience on affective recovery. PMID:19649310
Fragment Capture Simulation for MANPADS Test Arena Optimization
2014-03-27
length and weighing 13 to 25 kilograms (Bureau of Political- Military Affairs, 2011). Examples of MANPADS include the SA-7b and the SA-14. A MANPADS...terrorist activities. An estimated 500,000-750,000 MANPADS remain stockpiled worldwide, making them a persistent threat to both military and civilian...aircraft (Schroeder, 2007). According to the U.S. State Department’s Bureau of Political- Military Affairs, curbing the spread of MANPADS is a top priority
Water and Power Systems Co-optimization under a High Performance Computing Framework
NASA Astrophysics Data System (ADS)
Xuan, Y.; Arumugam, S.; DeCarolis, J.; Mahinthakumar, K.
2016-12-01
Water and energy systems optimizations are traditionally being treated as two separate processes, despite their intrinsic interconnections (e.g., water is used for hydropower generation, and thermoelectric cooling requires a large amount of water withdrawal). Given the challenges of urbanization, technology uncertainty and resource constraints, and the imminent threat of climate change, a cyberinfrastructure is needed to facilitate and expedite research into the complex management of these two systems. To address these issues, we developed a High Performance Computing (HPC) framework for stochastic co-optimization of water and energy resources to inform water allocation and electricity demand. The project aims to improve conjunctive management of water and power systems under climate change by incorporating improved ensemble forecast models of streamflow and power demand. First, by downscaling and spatio-temporally disaggregating multimodel climate forecasts from General Circulation Models (GCMs), temperature and precipitation forecasts are obtained and input into multi-reservoir and power systems models. Extended from Optimus (Optimization Methods for Universal Simulators), the framework drives the multi-reservoir model and power system model, Temoa (Tools for Energy Model Optimization and Analysis), and uses Particle Swarm Optimization (PSO) algorithm to solve high dimensional stochastic problems. The utility of climate forecasts on the cost of water and power systems operations is assessed and quantified based on different forecast scenarios (i.e., no-forecast, multimodel forecast and perfect forecast). Analysis of risk management actions and renewable energy deployments will be investigated for the Catawba River basin, an area with adequate hydroclimate predicting skill and a critical basin with 11 reservoirs that supplies water and generates power for both North and South Carolina. Further research using this scalable decision supporting framework will provide understanding and elucidate the intricate and interdependent relationship between water and energy systems and enhance the security of these two critical public infrastructures.
A Novel Space Partitioning Algorithm to Improve Current Practices in Facility Placement
Jimenez, Tamara; Mikler, Armin R; Tiwari, Chetan
2012-01-01
In the presence of naturally occurring and man-made public health threats, the feasibility of regional bio-emergency contingency plans plays a crucial role in the mitigation of such emergencies. While the analysis of in-place response scenarios provides a measure of quality for a given plan, it involves human judgment to identify improvements in plans that are otherwise likely to fail. Since resource constraints and government mandates limit the availability of service provided in case of an emergency, computational techniques can determine optimal locations for providing emergency response assuming that the uniform distribution of demand across homogeneous resources will yield and optimal service outcome. This paper presents an algorithm that recursively partitions the geographic space into sub-regions while equally distributing the population across the partitions. For this method, we have proven the existence of an upper bound on the deviation from the optimal population size for sub-regions. PMID:23853502
Patterns and biases of climate change threats in the IUCN Red List.
Trull, Nicholas; Böhm, Monika; Carr, Jamie
2018-02-01
International Union for Conservation of Nature (IUCN) Red List assessments rely on published data and expert inputs, and biases can be introduced where underlying definitions and concepts are ambiguous. Consideration of climate change threat is no exception, and recently numerous approaches to assessing the threat of climate change to species have been developed. We explored IUCN Red List assessments of amphibians and birds to determine whether species listed as threatened by climate change display distinct patterns in terms of habitat occupied and additional nonclimatic threats faced. We compared IUCN Red List data with a published data set of species' biological and ecological traits believed to infer high vulnerability to climate change and determined whether distributions of climate change-threatened species on the IUCN Red List concur with those of climate change-threatened species identified with the trait-based approach and whether species possessing these traits are more likely to have climate change listed as a threat on the IUCN Red List. Species in some ecosystems (e.g., grassland, shrubland) and subject to particular threats (e.g., invasive species) were more likely to have climate change as a listed threat. Geographical patterns of climate change-threatened amphibians and birds on the IUCN Red List were incongruent with patterns of global species richness and patterns identified using trait-based approaches. Certain traits were linked to increases or decreases in the likelihood of a species being threatened by climate change. Broad temperature tolerance of a species was consistently related to an increased likelihood of climate change threat, indicating counterintuitive relationships in IUCN assessments. To improve the robustness of species assessments of the vulnerability or extinction risk associated with climate change, we suggest IUCN adopt a more cohesive approach whereby specific traits highlighted by our results are considered in Red List assessments. To achieve this and to strengthen the climate change-vulnerability assessments approach, it is necessary to identify and implement logical avenues for further research into traits that make species vulnerable to climate change (including population-level threats). © 2017 Society for Conservation Biology.
2015-01-01
Stereotype threat effects arise when an individual feels at risk of confirming a negative stereotype about their group and consequently underperforms on stereotype relevant tasks (Steele, 2010). Among older people, underperformance across cognitive and physical tasks is hypothesized to result from age-based stereotype threat (ABST) because of negative age-stereotypes regarding older adults’ competence. The present review and meta-analyses examine 22 published and 10 unpublished articles, including 82 effect sizes (N = 3882) investigating ABST on older people’s (Mage = 69.5) performance. The analysis revealed a significant small-to-medium effect of ABST (d = .28) and important moderators of the effect size. Specifically, older adults are more vulnerable to ABST when (a) stereotype-based rather than fact-based manipulations are used (d = .52); (b) when performance is tested using cognitive measures (d = .36); and (c) occurs reliably when the dependent variable is measured proximally to the manipulation. The review raises important theoretical and methodological issues, and areas for future research. PMID:25621742
Distracted by the Unthought - Suppression and Reappraisal of Mind Wandering under Stereotype Threat.
Schuster, Carolin; Martiny, Sarah E; Schmader, Toni
2015-01-01
Previous research has found that subtle reminders of negative stereotypes about one's group can lead individuals to underperform on stereotype-relevant tests (e.g., women in math, ethnic minorities on intelligence tests). This so called stereotype threat effect can contribute to systematic group differences in performance that can obscure the true abilities of certain social groups and thereby sustain social inequalities. In the present study, we examined processes underlying stereotype threat effects on women's math performance, specifically focusing on the role of suppression of mind wandering (i.e., task-irrelevant thinking) in stereotype threat (ST) and no threat (NT) situations. Based on a process model of stereotype threat effects on performance, we hypothesized that women under stereotype threat spontaneously suppress mind wandering, and that this suppression impairs performance. An alternative regulation strategy that prevents suppression (i.e., reappraising task-irrelevant thoughts as normal) was predicted to prevent stereotype threat effects on performance. We manipulated stereotype threat (ST vs. NT) and cognitive regulation strategy (suppression, reappraisal, or no strategy) and measured women's performance on a math and a concentration task (N = 113). We expected three groups to perform relatively more poorly: Those in ST with either no strategy or suppression and those in NT with a suppression strategy. We tested the performance of these groups against the remaining three groups hypothesized to perform relatively better: those in NT with no strategy or reappraisal and those in ST with reappraisal. The results showed the expected pattern for participants' math performance, but not for concentration achievement. This pattern suggests that ineffective self-regulation by suppressing mind wandering can at least partly explain stereotype threat effects on performance, whereas a reappraisal strategy can prevent this impairment. We discuss implications for the understanding of processes underlying stereotype threat effects and the benefits of reappraising subjective experience under threat.
Distracted by the Unthought – Suppression and Reappraisal of Mind Wandering under Stereotype Threat
Schuster, Carolin; Martiny, Sarah E.; Schmader, Toni
2015-01-01
Previous research has found that subtle reminders of negative stereotypes about one’s group can lead individuals to underperform on stereotype-relevant tests (e.g., women in math, ethnic minorities on intelligence tests). This so called stereotype threat effect can contribute to systematic group differences in performance that can obscure the true abilities of certain social groups and thereby sustain social inequalities. In the present study, we examined processes underlying stereotype threat effects on women’s math performance, specifically focusing on the role of suppression of mind wandering (i.e., task-irrelevant thinking) in stereotype threat (ST) and no threat (NT) situations. Based on a process model of stereotype threat effects on performance, we hypothesized that women under stereotype threat spontaneously suppress mind wandering, and that this suppression impairs performance. An alternative regulation strategy that prevents suppression (i.e., reappraising task-irrelevant thoughts as normal) was predicted to prevent stereotype threat effects on performance. We manipulated stereotype threat (ST vs. NT) and cognitive regulation strategy (suppression, reappraisal, or no strategy) and measured women’s performance on a math and a concentration task (N = 113). We expected three groups to perform relatively more poorly: Those in ST with either no strategy or suppression and those in NT with a suppression strategy. We tested the performance of these groups against the remaining three groups hypothesized to perform relatively better: those in NT with no strategy or reappraisal and those in ST with reappraisal. The results showed the expected pattern for participants’ math performance, but not for concentration achievement. This pattern suggests that ineffective self-regulation by suppressing mind wandering can at least partly explain stereotype threat effects on performance, whereas a reappraisal strategy can prevent this impairment. We discuss implications for the understanding of processes underlying stereotype threat effects and the benefits of reappraising subjective experience under threat. PMID:25815814
Where Local and National Evaluators Meet: Unintended Threats to Ethical Evaluation Practice
ERIC Educational Resources Information Center
Rodi, Michael S.; Paget, Kathleen D.
2007-01-01
The ethical work of program evaluators is based on a covenant of honesty and transparency among stakeholders. Yet even under the most favorable evaluation conditions, threats to ethical standards exist and muddle that covenant. Unfortunately, ethical issues associated with different evaluation structures and contracting arrangements have received…
A 5TH GENERATION FIGHTER FOR BELGIUM:LUXURY OR NECESSITY
2016-02-16
violence to assert power. Overall, 3 we see threats, old and new, from piracy to terrorism to cyber-attacks. Based on these increased threats, NATO...share information seamlessly and contribute to a Common Operating Picture ( COP ). This construct will balance speed with accuracy to deliver the
76 FR 20048 - Notice of Revised Determination on Reconsideration
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-11
... negative determination was based on the findings that the worker separations, or threat of separation, were... importantly to worker separations (total or partial), or threat of such separations, at NCR Corporation, Call... investigation, I affirm the original notice of negative determination of eligibility to apply for worker...
Risk-Based Models for Managing Data Privacy in Healthcare
ERIC Educational Resources Information Center
AL Faresi, Ahmed
2011-01-01
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Iuliano, A. Danielle; Uyeki, Timothy M.; Mintz, Eric D.; Nichol, Stuart T.; Rollin, Pierre; Staples, J. Erin; Arthur, Ray R.
2017-01-01
To better track public health events in areas where the public health system is unable or unwilling to report the event to appropriate public health authorities, agencies can conduct event-based surveillance, which is defined as the organized collection, monitoring, assessment, and interpretation of unstructured information regarding public health events that may represent an acute risk to public health. The US Centers for Disease Control and Prevention's (CDC's) Global Disease Detection Operations Center (GDDOC) was created in 2007 to serve as CDC's platform dedicated to conducting worldwide event-based surveillance, which is now highlighted as part of the “detect” element of the Global Health Security Agenda (GHSA). The GHSA works toward making the world more safe and secure from disease threats through building capacity to better “Prevent, Detect, and Respond” to those threats. The GDDOC monitors approximately 30 to 40 public health events each day. In this article, we describe the top threats to public health monitored during 2012 to 2016: avian influenza, cholera, Ebola virus disease, and the vector-borne diseases yellow fever, chikungunya virus, and Zika virus, with updates to the previously described threats from Middle East respiratory syndrome-coronavirus (MERS-CoV) and poliomyelitis. PMID:28805465
Christian, Kira A; Iuliano, A Danielle; Uyeki, Timothy M; Mintz, Eric D; Nichol, Stuart T; Rollin, Pierre; Staples, J Erin; Arthur, Ray R
To better track public health events in areas where the public health system is unable or unwilling to report the event to appropriate public health authorities, agencies can conduct event-based surveillance, which is defined as the organized collection, monitoring, assessment, and interpretation of unstructured information regarding public health events that may represent an acute risk to public health. The US Centers for Disease Control and Prevention's (CDC's) Global Disease Detection Operations Center (GDDOC) was created in 2007 to serve as CDC's platform dedicated to conducting worldwide event-based surveillance, which is now highlighted as part of the "detect" element of the Global Health Security Agenda (GHSA). The GHSA works toward making the world more safe and secure from disease threats through building capacity to better "Prevent, Detect, and Respond" to those threats. The GDDOC monitors approximately 30 to 40 public health events each day. In this article, we describe the top threats to public health monitored during 2012 to 2016: avian influenza, cholera, Ebola virus disease, and the vector-borne diseases yellow fever, chikungunya virus, and Zika virus, with updates to the previously described threats from Middle East respiratory syndrome-coronavirus (MERS-CoV) and poliomyelitis.
Krypotos, Angelos-Miltiadis; Klugkist, Irene; Engelhard, Iris M.
2017-01-01
ABSTRACT Threat conditioning procedures have allowed the experimental investigation of the pathogenesis of Post-Traumatic Stress Disorder. The findings of these procedures have also provided stable foundations for the development of relevant intervention programs (e.g. exposure therapy). Statistical inference of threat conditioning procedures is commonly based on p-values and Null Hypothesis Significance Testing (NHST). Nowadays, however, there is a growing concern about this statistical approach, as many scientists point to the various limitations of p-values and NHST. As an alternative, the use of Bayes factors and Bayesian hypothesis testing has been suggested. In this article, we apply this statistical approach to threat conditioning data. In order to enable the easy computation of Bayes factors for threat conditioning data we present a new R package named condir, which can be used either via the R console or via a Shiny application. This article provides both a non-technical introduction to Bayesian analysis for researchers using the threat conditioning paradigm, and the necessary tools for computing Bayes factors easily. PMID:29038683
Kang, Sonia K; Galinsky, Adam D; Kray, Laura J; Shirako, Aiwa
2015-05-01
The current research examines how power affects performance in pressure-filled contexts. We present low-power-threat and high-power-lift effects, whereby performance in high-stakes situations suffers or is enhanced depending on one's power; that is, the power inherent to a situational role can produce effects similar to stereotype threat and lift. Three negotiations experiments demonstrate that role-based power affects outcomes but only when the negotiation is diagnostic of ability and, therefore, pressure-filled. We link these outcomes conceptually to threat and lift effects by showing that (a) role power affects performance more strongly when the negotiation is diagnostic of ability and (b) underperformance disappears when the low-power negotiator has an opportunity to self-affirm. These results suggest that stereotype threat and lift effects may represent a more general phenomenon: When the stakes are raised high, relative power can act as either a toxic brew (stereotype/low-power threat) or a beneficial elixir (stereotype/high-power lift) for performance. © 2015 by the Society for Personality and Social Psychology, Inc.
Automating Risk Analysis of Software Design Models
Ruiz, Guifré; Heymann, Elisa; César, Eduardo; Miller, Barton P.
2014-01-01
The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance. PMID:25136688
Automating risk analysis of software design models.
Frydman, Maxime; Ruiz, Guifré; Heymann, Elisa; César, Eduardo; Miller, Barton P
2014-01-01
The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance.
Miura, Asako; Kobayashi, Tetsuro
2016-01-01
Though survey satisficing, grudging cognitive efforts required to provide optimal answers in the survey response process, poses a serious threat to the validity of online experiments, a detailed explanation of the mechanism has yet to be established. Focusing on attitudes toward immigrants, we examined the mechanism by which survey satisficing distorts treatment effect estimates in online experiments. We hypothesized that satisficers would display more stereotypical responses than non-satisficers would when presented with stereotype-disconfirming information about an immigrant. Results of two experiments largely supported our hypotheses. Satisficers, whom we identified through an instructional manipulation check (IMC), processed information about immigrants' personality traits congruently with the stereotype activated by information provided about nationality. The significantly shorter vignette reading time of satisficers corroborates their time-efficient impression formation based on stereotyping. However, the shallow information processing of satisficers can be rectified by alerting them to their inattentiveness through use of a repeated IMC. PMID:27803680
Optical and acoustical UAV detection
NASA Astrophysics Data System (ADS)
Christnacher, Frank; Hengy, Sébastien; Laurenzis, Martin; Matwyschuk, Alexis; Naz, Pierre; Schertzer, Stéphane; Schmitt, Gwenael
2016-10-01
Recent world events have highlighted that the proliferation of UAVs is bringing with it a new and rapidly increasing threat for national defense and security agencies. Whilst many of the reported UAV incidents seem to indicate that there was no terrorist intent behind them, it is not unreasonable to assume that it may not be long before UAV platforms are regularly employed by terrorists or other criminal organizations. The flight characteristics of many of these mini- and micro-platforms present challenges for current systems which have been optimized over time to defend against the traditional air-breathing airborne platforms. A lot of programs to identify cost-effective measures for the detection, classification, tracking and neutralization have begun in the recent past. In this paper, lSL shows how the performance of a UAV detection and tracking concept based on acousto-optical technology can be powerfully increased through active imaging.
Machine learning: novel bioinformatics approaches for combating antimicrobial resistance.
Macesic, Nenad; Polubriaginof, Fernanda; Tatonetti, Nicholas P
2017-12-01
Antimicrobial resistance (AMR) is a threat to global health and new approaches to combating AMR are needed. Use of machine learning in addressing AMR is in its infancy but has made promising steps. We reviewed the current literature on the use of machine learning for studying bacterial AMR. The advent of large-scale data sets provided by next-generation sequencing and electronic health records make applying machine learning to the study and treatment of AMR possible. To date, it has been used for antimicrobial susceptibility genotype/phenotype prediction, development of AMR clinical decision rules, novel antimicrobial agent discovery and antimicrobial therapy optimization. Application of machine learning to studying AMR is feasible but remains limited. Implementation of machine learning in clinical settings faces barriers to uptake with concerns regarding model interpretability and data quality.Future applications of machine learning to AMR are likely to be laboratory-based, such as antimicrobial susceptibility phenotype prediction.
Study of Threat Scenario Reconstruction based on Multiple Correlation
NASA Astrophysics Data System (ADS)
Yuan, Xuejun; Du, Jing; Qin, Futong; Zhou, Yunyan
2017-10-01
The emergence of intrusion detection technology has solved many network attack problems, ensuring the safety of computer systems. However, because of the isolated output alarm information, large amount of data, and mixed events, it is difficult for the managers to understand the deep logic relationship between the alarm information, thus they cannot deduce the attacker’s true intentions. This paper presents a method of online threat scene reconstruction to handle the alarm information, which reconstructs of the threat scene. For testing, the standard data set is used.
Association between attention bias to threat and anxiety symptoms in children and adolescents.
Abend, Rany; de Voogd, Leone; Salemink, Elske; Wiers, Reinout W; Pérez-Edgar, Koraly; Fitzgerald, Amanda; White, Lauren K; Salum, Giovanni A; He, Jie; Silverman, Wendy K; Pettit, Jeremy W; Pine, Daniel S; Bar-Haim, Yair
2018-03-01
Considerable research links threat-related attention biases to anxiety symptoms in adults, whereas extant findings on threat biases in youth are limited and mixed. Inconsistent findings may arise due to substantial methodological variability and limited sample sizes, emphasizing the need for systematic research on large samples. The aim of this report is to examine the association between threat bias and pediatric anxiety symptoms using standardized measures in a large, international, multi-site youth sample. A total of 1,291 children and adolescents from seven research sites worldwide completed standardized attention bias assessment task (dot-probe task) and child anxiety symptoms measure (Screen for Child Anxiety Related Emotional Disorders). Using a dimensional approach to symptomatology, we conducted regression analyses predicting overall, and disorder-specific, anxiety symptoms severity, based on threat bias scores. Threat bias correlated positively with overall anxiety symptoms severity (ß = 0.078, P = .004). Furthermore, threat bias was positively associated specifically with social anxiety (ß = 0.072, P = .008) and school phobia (ß = 0.076, P = .006) symptoms severity, but not with panic, generalized anxiety, or separation anxiety symptoms. These associations were not moderated by age or gender. These findings indicate associations between threat bias and pediatric anxiety symptoms, and suggest that vigilance to external threats manifests more prominently in symptoms of social anxiety and school phobia, regardless of age and gender. These findings point to the role of attention bias to threat in anxiety, with implications for translational clinical research. The significance of applying standardized methods in multi-site collaborations for overcoming challenges inherent to clinical research is discussed. © 2017 Wiley Periodicals, Inc.
Cyber Security Threats to Safety-Critical, Space-Based Infrastructures
NASA Astrophysics Data System (ADS)
Johnson, C. W.; Atencia Yepez, A.
2012-01-01
Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.
2012-01-01
Background Optimal adherence to highly active antiretroviral therapy (HAART) is required to promote viral suppression and to prevent disease progression and mortality. Forcibly displaced and conflict-affected populations may face challenges succeeding on HAART. We performed a systematic review of the literature on adherence to HAART and treatment outcomes in these groups, including refugees and internally-displaced persons (IDPs), assessed the quality of the evidence and suggest a future research program. Methods Medline, Embase, and Global Health databases for 1995–2011 were searched using the Ovid platform. A backward citation review of subsequent work that had cited the Ovid results was performed using the Web of Science database. ReliefWeb and Médecins Sans Frontières (MSF) websites were searched for additional grey literature. Results and conclusion We screened 297 records and identified 17 reports covering 15 quantitative and two qualitative studies from 13 countries. Three-quarters (11/15) of the quantitative studies were retrospective studies based on chart review; five studies included <100 clients. Adherence or treatment outcomes were reported in resettled refugees, conflict-affected persons, internally-displaced persons (IDPs), and combinations of refugees, IDPs and other foreign-born persons. The reviewed reports showed promise for conflict-affected and forcibly-displaced populations; the range of optimal adherence prevalence reported was 87–99.5%. Treatment outcomes, measured using virological, immunological and mortality estimates, were good in relation to non-affected groups. Given the diversity of settings where forcibly-displaced and conflict-affected persons access ART, further studies on adherence and treatment outcomes are needed to support scale-up and provide evidence-based justifications for inclusion of these vulnerable groups in national treatment plans. Future studies and program evaluations should focus on systematic monitoring of adherence and treatment interruptions by using facility-based pharmacy records, understanding threats to optimal adherence and timely linkage to care throughout the displacement cycle, and testing interventions designed to support adherence and treatment outcomes in these settings. PMID:23110782
NASA Technical Reports Server (NTRS)
Spruce, Joseph; Hargrove, William; Gasser, Gerald; Smoot, James; Kuper, Philip
2011-01-01
U.S. forests occupy approx. 751 million acres (approx. 1/3 of total land). These forests are exposed to multiple biotic and abiotic threats that collectively damage extensive acreages each year. Hazardous forest disturbances can threaten human life and property, bio-diversity and water supplies. Timely regional forest monitoring products are needed to aid forest management and decision making by the US Forest Service and its state and private partners. Daily MODIS data products provide a means to monitor regional forest disturbances on a weekly basis. In response, we began work in 2006 to develop a Near Real Time (NRT) forest monitoring capability, based on MODIS NDVI data, as part of a national forest threat early warning system (EWS)
Counter-regulating on the Internet: Threat elicits preferential processing of positive information.
Greving, Hannah; Sassenberg, Kai; Fetterman, Adam
2015-09-01
The Internet is a central source of information. It is increasingly used for information search in self-relevant domains (e.g., health). Self-relevant topics are also associated with specific emotions and motivational states. For example, individuals may fear serious illness and feel threatened. Thus far, the impact of threat has received little attention in Internet-based research. The current studies investigated how threat influences Internet search. Threat is known to elicit the preferential processing of positive information. The self-directed nature of Internet search should particularly provide opportunities for such processing behavior. We predicted that during Internet search, more positive information would be processed (i.e., allocated more attention to) and more positive knowledge would be acquired under threat than in a control condition. Three experiments supported this prediction: Under threat, attention is directed more to positive web pages (Study 1) and positive links (Study 2), and more positive information is acquired (Studies 1 and 3) than in a control condition. Notably, the effect on knowledge acquisition was mediated by the effect on attention allocation during an actual Internet search (Study 1). Thus, Internet search under threat leads to selective processing of positive information and dampens threatened individuals' negative affect. (c) 2015 APA, all rights reserved).
NASA Astrophysics Data System (ADS)
Chou, Shuo-Ju
2011-12-01
In recent years the United States has shifted from a threat-based acquisition policy that developed systems for countering specific threats to a capabilities-based strategy that emphasizes the acquisition of systems that provide critical national defense capabilities. This shift in policy, in theory, allows for the creation of an "optimal force" that is robust against current and future threats regardless of the tactics and scenario involved. In broad terms, robustness can be defined as the insensitivity of an outcome to "noise" or non-controlled variables. Within this context, the outcome is the successful achievement of defense strategies and the noise variables are tactics and scenarios that will be associated with current and future enemies. Unfortunately, a lack of system capability, budget, and schedule robustness against technology performance and development uncertainties has led to major setbacks in recent acquisition programs. This lack of robustness stems from the fact that immature technologies have uncertainties in their expected performance, development cost, and schedule that cause to variations in system effectiveness and program development budget and schedule requirements. Unfortunately, the Technology Readiness Assessment process currently used by acquisition program managers and decision-makers to measure technology uncertainty during critical program decision junctions does not adequately capture the impact of technology performance and development uncertainty on program capability and development metrics. The Technology Readiness Level metric employed by the TRA to describe program technology elements uncertainties can only provide a qualitative and non-descript estimation of the technology uncertainties. In order to assess program robustness, specifically requirements robustness, against technology performance and development uncertainties, a new process is needed. This process should provide acquisition program managers and decision-makers with the ability to assess or measure the robustness of program requirements against such uncertainties. A literature review of techniques for forecasting technology performance and development uncertainties and subsequent impacts on capability, budget, and schedule requirements resulted in the conclusion that an analysis process that coupled a probabilistic analysis technique such as Monte Carlo Simulations with quantitative and parametric models of technology performance impact and technology development time and cost requirements would allow the probabilities of meeting specific constraints of these requirements to be established. These probabilities of requirements success metrics can then be used as a quantitative and probabilistic measure of program requirements robustness against technology uncertainties. Combined with a Multi-Objective Genetic Algorithm optimization process and computer-based Decision Support System, critical information regarding requirements robustness against technology uncertainties can be captured and quantified for acquisition decision-makers. This results in a more informed and justifiable selection of program technologies during initial program definition as well as formulation of program development and risk management strategies. To meet the stated research objective, the ENhanced TEchnology Robustness Prediction and RISk Evaluation (ENTERPRISE) methodology was formulated to provide a structured and transparent process for integrating these enabling techniques to provide a probabilistic and quantitative assessment of acquisition program requirements robustness against technology performance and development uncertainties. In order to demonstrate the capabilities of the ENTERPRISE method and test the research Hypotheses, an demonstration application of this method was performed on a notional program for acquiring the Carrier-based Suppression of Enemy Air Defenses (SEAD) using Unmanned Combat Aircraft Systems (UCAS) and their enabling technologies. The results of this implementation provided valuable insights regarding the benefits and inner workings of this methodology as well as its limitations that should be addressed in the future to narrow the gap between current state and the desired state.
Grapendorf, Johannes; Greving, Hannah; Sassenberg, Kai
2018-01-01
Background Many people use the Internet for health-related information search, which is known to help regulate their emotional state. However, not much is known yet about how Web-based information search together with negative emotional states (ie, threat of cancer diagnosis) relate to preventive medical treatment decisions (ie, colonoscopy intentions). Objective The aim of this study was to investigate how frequency of health-related Internet use together with perceived threat of a possible (bowel) cancer diagnosis influences intentions to get a colonoscopy. Previous research has shown that people who experience threat preferentially process positive information in an attempt to downregulate the aversive emotional state. The Internet can facilitate this regulatory strategy through allowing self-directed, unrestricted, and thus biased information search. In the context of threat regarding a possible bowel cancer diagnosis, feelings of threat can still be effectively reduced through cancer screening (ie, colonoscopy). We, therefore, predict that in that particular context, feelings of threat should be related to stronger colonoscopy intentions, and that this relationship should be enhanced for people who use the Internet often. Methods A longitudinal questionnaire study was conducted among healthy participants who were approaching or just entering the bowel cancer risk group (aged 45-55 years). Perceived threat of a possible (bowel) cancer diagnosis, frequency of health-related Internet use, and intentions to have a colonoscopy were assessed at 2 time points (6-month time lag between the 2 measurement points T1 and T2). Multiple regression analyses were conducted to test whether threat and Internet use at T1 together predicted colonoscopy intentions at T2. Results In line with our predictions, we found that the threat of a possible (bowel) cancer diagnosis interacted with the frequency of Internet use (both T1) to predict colonoscopy intentions (T2; B=.23, standard error [SE]=0.09, P=.01). For people who used the Internet relatively often (+1 SD), the positive relationship between threat and colonoscopy intentions was significantly stronger (B=.56, SE=0.15, P<.001) compared with participants who used the Internet less often (−1 SD; B=.17, SE=0.09, P=.07). This relationship was unique to Web-based (vs other types of) information search and independent of risk factors (eg, body mass index [BMI] and smoking). Conclusions The results of this study suggest that health-related Internet use can facilitate emotion-regulatory processes. People who feel threatened by a possible (bowel) cancer diagnosis reported stronger colonoscopy intentions, especially when they used the Internet often. We propose that this is because people who experience threat are more likely to search for and process information that allows them to downregulate their aversive emotional state. In the present case of (bowel) cancer prevention, the most effective way to reduce threat is to get screened. PMID:29415872
An end-to-end approach to developing biological and chemical detector requirements
NASA Astrophysics Data System (ADS)
Teclemariam, Nerayo P.; Purvis, Liston K.; Foltz, Greg W.; West, Todd; Edwards, Donna M.; Fruetel, Julia A.; Gleason, Nathaniel J.
2009-05-01
Effective defense against chemical and biological threats requires an "end-to-end" strategy that encompasses the entire problem space, from threat assessment and target hardening to response planning and recovery. A key element of the strategy is the definition of appropriate system requirements for surveillance and detection of threat agents. Our end-to-end approach to venue chem/bio defense is captured in the Facilities Weapons of Mass Destruction Decision Analysis Capability (FacDAC), an integrated system-of-systems toolset that can be used to generate requirements across all stages of detector development. For example, in the early stage of detector development the approach can be used to develop performance targets (e.g., sensitivity, selectivity, false positive rate) to provide guidance on what technologies to pursue. In the development phase, after a detector technology has been selected, the approach can aid in determining performance trade-offs and down-selection of competing technologies. During the application stage, the approach can be employed to design optimal defensive architectures that make the best use of available technology to maximize system performance. This presentation will discuss the end-to-end approach to defining detector requirements and demonstrate the capabilities of the FacDAC toolset using examples from a number of studies for the Department of Homeland Security.
USGS California Water Science Center water programs in California
Shulters, Michael V.
2005-01-01
California is threatened by many natural hazards—fire, floods, landslides, earthquakes. The State is also threatened by longer-term problems, such as hydrologic effects of climate change, and human-induced problems, such as overuse of ground water and degradation of water quality. The threats and problems are intensified by increases in population, which has risen to nearly 36.8 million. For the USGS California Water Science Center, providing scientific information to help address hazards, threats, and hydrologic issues is a top priority. To meet the demands of a growing California, USGS scientific investigations are helping State and local governments improve emergency management, optimize resources, collect contaminant-source and -mobility information, and improve surface- and ground-water quality. USGS hydrologic studies and data collection throughout the State give water managers quantifiable and detailed scientific information that can be used to plan for development and to protect and more efficiently manage resources. The USGS, in cooperation with state, local, and tribal agencies, operates more than 500 instrument stations, which monitor streamflow, ground-water levels, and surface- and ground-water constituents to help protect water supplies and predict the threats of natural hazards. The following are some of the programs implemented by the USGS, in cooperation with other agencies, to obtain and analyze information needed to preserve California's environment and resources.
Promoting Improved Ballistic Resistance of Transparent Armor
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wereszczak, Andrew A; Patel, P; Templeton, D W
2011-01-01
Transparent armor is a material or system of materials designed to be optically transparent, yet protect from fragmentation or ballistic impacts. Although engineered to defeat specific threats, or a range of threats, there are general requirements common to all of these designs. The primary requirement for a transparent armor system is to not only defeat the designated threat but also provide a multi-hit capability with minimized distortion of surrounding areas. Ground platforms have several parameters that must be optimized, such as weight, space efficiency, and cost versus performance. Glass exhibits tensile failure stress that is very much dependent on themore » amount of material being stressed, the side being tensile-stressed (i.e., air-versus tin-side if a float glass), and where it is being tensile stressed (i.e., in the middle or near an edge). An axiom arising from those effects is a greater amount of allowable deflection (i.e., higher failure stress) of a ballistically impacted transparent armor will result in improved ballistic resistance. Therefore, the interpretation and management of those tensile-failure-stress dependencies shall ultimately improve ballistic resistance and its predictability of transparent armor. Each of those three dependencies (size, side, and location) in a soda-lime silicate glass is described.« less
Forbes, Chad E; Leitner, Jordan B
2014-10-01
Stereotype threat, a situational pressure individuals experience when they fear confirming a negative group stereotype, engenders a cascade of physiological stress responses, negative appraisals, and performance monitoring processes that tax working memory resources necessary for optimal performance. Less is known, however, about how stereotype threat biases attentional processing in response to performance feedback, and how such attentional biases may undermine performance. Women received feedback on math problems in stereotype threatening compared to stereotype-neutral contexts while continuous EEG activity was recorded. Findings revealed that stereotype threatened women elicited larger midline P100 ERPs, increased phase locking between anterior cingulate cortex and dorsolateral prefrontal cortex (two regions integral for attentional processes), and increased power in left fusiform gyrus in response to negative feedback compared to positive feedback and women in stereotype-neutral contexts. Increased power in left fusiform gyrus in response to negative feedback predicted underperformance on the math task among stereotype threatened women only. Women in stereotype-neutral contexts exhibited the opposite trend. Findings suggest that in stereotype threatening contexts, neural networks integral for attention and working memory are biased toward negative, stereotype confirming feedback at very early speeds of information processing. This bias, in turn, plays a role in undermining performance. Copyright © 2014 Elsevier B.V. All rights reserved.
Moritz, Steffen; Pohl, Rüdiger F
2009-11-01
Overestimation of threat (OET) has been implicated in the pathogenesis of obsessive-compulsive disorder (OCD). The present study deconstructed this complex concept and looked for specific deviances in OCD relative to controls. A total of 46 participants with OCD and 51 nonclinical controls were asked: (a) to estimate the incidence rate for 20 events relating to washing, checking, positive, or negative incidents. Furthermore, they were required (b) to assess their personal vulnerability to experience each event type, and (c) to judge the degree of accompanying worry. Later, participants were confronted with the correct statistics and asked (d) to rate their degree of worry versus relief. OCD participants did not provide higher estimates for OCD-related events than healthy participants, thus rendering a knowledge deficit unlikely. The usual unrealistic optimism bias was found in both groups but was markedly attenuated in OCD participants. OCD-related events worried OCD participants more than controls. Confrontation with the correct statistics appeased OCD participants less than healthy participants. Even in the case of large initial overestimations for OCD-related events, correct information appeased OCD participants significantly less than healthy participants. Our results suggest that OCD is not associated with a knowledge deficit regarding OCD-related events but that patients feel personally more vulnerable than nonclinical controls.
Internalising Problems and the Effects of Peer Ostracism on Children's Primary Needs
ERIC Educational Resources Information Center
Hawes, David J.; Zadro, Lisa; Iannuzzelli, Rose; Godwin, Alexandra; MacNevin, Georgia; Dadds, Mark R.; Griffiths, Brendan; Richardson, Rick
2013-01-01
The aim of this study was to examine associations between ostracism, internalising problems, and threat to primary needs (belonging, control, self-esteem, meaningful existence) in children (N= 165, M age = 9 years). Ostracism was simulated experimentally using the Cyberball paradigm--a computer-based ball-throwing game--and threats to primary…
The Stereotyped Task Engagement Process: The Role of Interest and Achievement Motivation
ERIC Educational Resources Information Center
Smith, Jessi L.; Sansone, Carol; White, Paul H.
2007-01-01
Competence-based stereotypes can negatively affect women's performance in math and science (referred to as stereotype threat), presumably leading to lower motivation. The authors examined the effects of stereotype threat on interest, a motivational path not necessarily mediated by performance. They predicted that working on a computer science task…
Characterizing and Optimizing the Performance of the MAESTRO 49-Core Processor
2014-03-27
process large volumes of data, it is necessary during testing to vary the dimensions of the inbound data matrix to determine what effect this has on the...needed that can process the extra data these systems seek to collect. However, the space environment presents a number of threats, such as ambient or...induced faults, and that also have sufficient computational power to handle the large flow of data they encounter. This research investigates one
Designing dual-plate meteoroid shields: A new analysis
NASA Technical Reports Server (NTRS)
Swift, H. F.; Bamford, R.; Chen, R.
1982-01-01
Physics governing ultrahigh velocity impacts onto dual-plate meteor armor is discussed. Meteoroid shield design methodologies are considered: failure mechanisms, qualitative features of effective meteoroid shield designs, evaluating/processing meteoroid threat models, and quantitative techniques for optimizing effective meteoroid shield designs. Related investigations are included: use of Kevlar cloth/epoxy panels in meteoroid shields for the Halley's Comet intercept vehicle, mirror exposure dynamics, and evaluation of ion fields produced around the Halley Intercept Mission vehicle by meteoroid impacts.
1993-06-01
world events, political policy will have a greater impact on military strategy (necessity to achieve UN mandate in support of coalition warfare), the new...United States determine and implement optimal courses of action, allocate assets subject to environmental constraints, and direct forces against threats to...warrior. Finally, this chapter focuses the reader on the impact of technology and how the user or warrior will interact with information. A. BACKGROUND
2016-07-01
Influenza H1N1 modeling working group meeting, European Center for Disease Control ECDC, Stockholm, 19 October 2010 (A.Vespignani, Panelist). We...dynamics and assessing non -pharmaceutical control interventions. METHODS: We modelled the movements of individuals, including patients not infected with...classification of urban areas according to quantitative risk assessment metrics of secondary E-WMD threats. 2. Optimal mobility control strategies informed by
Configuration of electro-optic fire source detection system
NASA Astrophysics Data System (ADS)
Fabian, Ram Z.; Steiner, Zeev; Hofman, Nir
2007-04-01
The recent fighting activities in various parts of the world have highlighted the need for accurate fire source detection on one hand and fast "sensor to shooter cycle" capabilities on the other. Both needs can be met by the SPOTLITE system which dramatically enhances the capability to rapidly engage hostile fire source with a minimum of casualties to friendly force and to innocent bystanders. Modular system design enable to meet each customer specific requirements and enable excellent future growth and upgrade potential. The design and built of a fire source detection system is governed by sets of requirements issued by the operators. This can be translated into the following design criteria: I) Long range, fast and accurate fire source detection capability. II) Different threat detection and classification capability. III) Threat investigation capability. IV) Fire source data distribution capability (Location, direction, video image, voice). V) Men portability. ) In order to meet these design criteria, an optimized concept was presented and exercised for the SPOTLITE system. Three major modular components were defined: I) Electro Optical Unit -Including FLIR camera, CCD camera, Laser Range Finder and Marker II) Electronic Unit -including system computer and electronic. III) Controller Station Unit - Including the HMI of the system. This article discusses the system's components definition and optimization processes, and also show how SPOTLITE designers successfully managed to introduce excellent solutions for other system parameters.
Resilience, Vulnerability and Residual Threat: An Assessment from Indian Sundarban
NASA Astrophysics Data System (ADS)
Ghosh, T.
2016-12-01
The estuarine islands within Indian Sundarban are extremely vulnerable due to climate change, erosion, flooding and increasing population pressure. Around 4.6 million people are living under constant threat of climatic shocks, affecting their farm based economy and dependency on forest resources for their livelihood. This paper attempts to focus on the dynamics of system's resilience in the backdrop of higher level of vulnerability. Globally the assessment of island vulnerability is generally more focused towards the climate change impacts, rather than taking into account other determining drivers with proper weightage. Three estuarine islands namely Sagar, Ghoramara and Mousani at the western part of Indian Sundarban Delta (ISD) have been chosen for this study to derive the indicator based scoring method using the household survey data from twenty seven (27) sampled `Mouza' (lowest administrative boundary; village) with cluster random sampling. Vulnerability and resilience of these islands have been calculated using the indicators like housing condition, electrification, population density, accretion, adult secondary education level, percentage of people `Below Poverty Line' (BPL) based on per capita income. Residual threats for these islands have been obtained by subtracting the score of resilience and vulnerability of the system. Result suggests that all these islands are in less resilient condition to combat the negative impact of the influencing factors. Sapkhali, Ghoramara, Bankimnagar, Shibpur and Baliara are becoming sensitive from excess residual threats. This study is an initiation for identifying the thrust areas need to address with effective policy adaptation, necessary to minimize the existing vulnerable conditions in these islands. Key words: Vulnerability, Resilience, Residual threat, Indian Sundarban
Bønes, Erlend; Hasvold, Per; Henriksen, Eva; Strandenaes, Thomas
2007-09-01
Instant messaging (IM) is suited for immediate communication because messages are delivered almost in real time. Results from studies of IM use in enterprise work settings make us believe that IM based services may prove useful also within the healthcare sector. However, today's public instant messaging services do not have the level of information security required for adoption of IM in healthcare. We proposed MedIMob, our own architecture for a secure enterprise IM service for use in healthcare. MedIMob supports IM clients on mobile devices in addition to desktop based clients. Security threats were identified in a risk analysis of the MedIMob architecture. The risk analysis process consists of context identification, threat identification, analysis of consequences and likelihood, risk evaluation, and proposals for risk treatment. The risk analysis revealed a number of potential threats to the information security of a service like this. Many of the identified threats are general when dealing with mobile devices and sensitive data; others are threats which are more specific to our service and architecture. Individual threats identified in the risks analysis are discussed and possible counter measures presented. The risk analysis showed that most of the proposed risk treatment measures must be implemented to obtain an acceptable risk level; among others blocking much of the additional functionality of the smartphone. To conclude on the usefulness of this IM service, it will be evaluated in a trial study of the human-computer interaction. Further work also includes an improved design of the proposed MedIMob architecture. 2006 Elsevier Ireland Ltd
Ionospheric Slant Total Electron Content Analysis Using Global Positioning System Based Estimation
NASA Technical Reports Server (NTRS)
Komjathy, Attila (Inventor); Mannucci, Anthony J. (Inventor); Sparks, Lawrence C. (Inventor)
2017-01-01
A method, system, apparatus, and computer program product provide the ability to analyze ionospheric slant total electron content (TEC) using global navigation satellite systems (GNSS)-based estimation. Slant TEC is estimated for a given set of raypath geometries by fitting historical GNSS data to a specified delay model. The accuracy of the specified delay model is estimated by computing delay estimate residuals and plotting a behavior of the delay estimate residuals. An ionospheric threat model is computed based on the specified delay model. Ionospheric grid delays (IGDs) and grid ionospheric vertical errors (GIVEs) are computed based on the ionospheric threat model.
Violence prevention education program for psychiatric outpatient departments.
Feinstein, Robert E
2014-10-01
Approximately 40 % of psychiatrists and up to 64 % of psychiatric residents have been physically assaulted. Ranges of 72-96 % of psychiatric residents in various studies have been verbally threatened. As violence risk occurs in outpatient settings, our department developed a quality and safety curriculum designed to prepare psychiatric residents and staff to optimally respond to aggressive outpatients and violence threats or events. In 2011 and 2012, we offered an 8-part violence prevention performance improvement curriculum/program including (1) situational awareness/creating a safe environment; (2) violence de-escalation training; (3) violence risk assessment training, use of risk assessment tools, and medical record documentation; (4) violence safety discharge planning; (5) legal issues and violence; (6) "shots fired on campus" video/discussion; (7) "2011 violence threat simulation" video/discussion; and (8) violence threat simulation exercise. This program was offered to approximately 60 psychiatric residents/staff in each year. We obtained qualitative comments about the entire program and data from 2 years of post-event surveys on the usefulness of the "violence threat simulation exercise." The large majority of comments about program elements 1 to 7 were positive. In 2011 and 2012, respectively, 76 and 86 % of participants responded to a post-event survey of the violence threat simulation exercise; 90 and 88 % of participants, respectively, reported the simulation to be very helpful/somewhat helpful; and 86 and 82 % of participants, respectively, reported feeling much better/better prepared to deal with a violent event. Although some participants experienced anxiety, sleep disturbances, increase in work safety concerns, and/or traumatic memories, the majority reported no post-simulation symptoms (72 and 80 %, respectively). Although we are unable to demonstrate that this program effectively prevents violence, the overall positive response from participants encourages us to continue developing our quality and safety program and to offer our easily reproducible and modifiable curriculum to others.
Latent typologies of posttraumatic stress disorder in World Trade Center responders.
Horn, Sarah R; Pietrzak, Robert H; Schechter, Clyde; Bromet, Evelyn J; Katz, Craig L; Reissman, Dori B; Kotov, Roman; Crane, Michael; Harrison, Denise J; Herbert, Robin; Luft, Benjamin J; Moline, Jacqueline M; Stellman, Jeanne M; Udasin, Iris G; Landrigan, Philip J; Zvolensky, Michael J; Southwick, Steven M; Feder, Adriana
2016-12-01
Posttraumatic stress disorder (PTSD) is a debilitating and often chronic psychiatric disorder. Following the 9/11/2001 World Trade Center (WTC) attacks, thousands of individuals were involved in rescue, recovery and clean-up efforts. While a growing body of literature has documented the prevalence and correlates of PTSD in WTC responders, no study has evaluated predominant typologies of PTSD in this population. Participants were 4352 WTC responders with probable WTC-related DSM-IV PTSD. Latent class analyses were conducted to identify predominant typologies of PTSD symptoms and associated correlates. A 3-class solution provided the optimal representation of latent PTSD symptom typologies. The first class, labeled "High-Symptom (n = 1,973, 45.3%)," was characterized by high probabilities of all PTSD symptoms. The second class, "Dysphoric (n = 1,371, 31.5%)," exhibited relatively high probabilities of emotional numbing and dysphoric arousal (e.g., sleep disturbance). The third class, "Threat (n = 1,008, 23.2%)," was characterized by high probabilities of re-experiencing, avoidance and anxious arousal (e.g., hypervigilance). Compared to the Threat class, the Dysphoric class reported a greater number of life stressors after 9/11/2001 (OR = 1.06). The High-Symptom class was more likely than the Threat class to have a positive psychiatric history before 9/11/2001 (OR = 1.7) and reported a greater number of life stressors after 9/11/2001 (OR = 1.1). The High-Symptom class was more likely than the Dysphoric class, which was more likely than the Threat class, to screen positive for depression (83% > 74% > 53%, respectively), and to report greater functional impairment (High-Symptom > Dysphoric [Cohen d = 0.19], Dysphoric > Threat [Cohen d = 0.24]). These results may help inform assessment, risk stratification, and treatment approaches for PTSD in WTC and disaster responders. Copyright © 2016 Elsevier Ltd. All rights reserved.
Comparing the effects of real versus simulated violence on dream imagery.
Dale, Allyson; Murkar, Anthony; Miller, Nicolle; Black, Joshua
2014-08-01
Participants in the current study were 75 males, including 25 Canadian soldiers, 25 heavy gamers who play military based video games such as "Call of Duty," and a control group comprised of 25 males. One dream per participant was analyzed using Hall and Van de Castle content analysis guidelines, including aggression, threat, and previously established scales for intensity of aggression and emotion. The dreams of soldiers had a higher frequency of both aggression and threat, and were also more intense in aggression and emotion than both the heavy gamers and the controls. These findings suggest that exposure to real life violence and threat (as well as the emotional significance of the experience) is more frequently incorporated into dream imagery than simulated or virtual threat. Limitations and directions for future studies are discussed.
Needs assessment for business strategies of anesthesiology groups' practices.
Scurlock, Corey; Dexter, Franklin; Reich, David L; Galati, Maria
2011-07-01
Progress has been made in understanding strategic decision making influencing anesthesia groups' operating room business practices. However, there has been little analysis of the remaining gaps in our knowledge. We performed a needs assessment to identify unsolved problems in anesthesia business strategy based on Porter's Five Forces Analysis. The methodology was a narrative literature review. We found little previous investigation for 2 of the 5 forces (threat of new entrants and bargaining power of suppliers), modest understanding for 1 force (threat of substitute products or services), and substantial understanding for 2 forces (bargaining power of customers and jockeying for position among current competitors). Additional research in strategic decisions influencing anesthesia groups should focus on the threat of new entrants, bargaining power of suppliers, and the threat of substitute products or services.
Thornton, R; Court, B; Meara, J; Murray, V; Palmer, I; Scott, R; Wale, M; Wright, D
2004-03-01
Chemical, biological, radiological and nuclear terrorism poses considerable threat throughout the world. To provide occupational physicians with an understanding of this threat and its main forms and what action can be taken to counter this threat. Presenters at a conference on chemical, biological, radiological and nuclear terrorism were asked to contribute their evidence-based opinions in order to produce a review article. This paper presents a summary of the different forms of chemical, biological, radiological and nuclear terrorism and the effective counter-measures and also provides a review of current scientific literature. The threat of chemical, biological, radiological and nuclear terrorism is present throughout the world and is one that occupational physicians should be aware of, as well as the action that can be taken to counter it.
Radioactive threat detection using scintillant-based detectors
NASA Astrophysics Data System (ADS)
Chalmers, Alex
2004-09-01
An update to the performance of AS&E's Radioactive Threat Detection sensor technology. A model is presented detailing the components of the scintillant-based RTD system employed in AS&E products aimed at detecting radiological WMD. An overview of recent improvements in the sensors, electrical subsystems and software algorithms are presented. The resulting improvements in performance are described and sample results shown from existing systems. Advanced and future capabilities are described with an assessment of their feasibility and their application to Homeland Defense.
Paukert, Craig P.; Pitts, K.L.; Whittier, Joanna B.; Olden, Julian D.
2011-01-01
Anthropogenic disturbances impact freshwater biota but are rarely incorporated into conservation planning due to the difficulties in quantifying threats. There is currently no widely accepted method to quantify disturbances, and determining how to measure threats to upstream catchments using disturbance metrics can be time consuming and subjective. We compared four watershed-scale ecological threat indices for the Lower Colorado River Basin (LCRB) using landscape-level threats of land use (e.g., agricultural and urban lands), waterway development and diversions (e.g., number of canals, dams), and human development (e.g., road and railroads density, pollution sites). The LCRB is an ideal region to assess ecological threat indices because of the increasing need for conservation to ensure the persistence of native fishes in highly altered habitat. Each threat was measured for severity (i.e., level of influence on the upstream watershed) and frequency throughout each watershed; both severity and frequency were measured using two different methods. Severity values were based either on peer-reviewed literature and weighted in accordance to their published ecological impact, or assumed equal severity across stressors. Threat frequency was calculated according to either the presence/absence of each stressor, or on the relative density of each stressor in the watershed. Each measure of severity was combined with a measure of frequency, creating four ecological threat indices, and transformed to a 0–100 scale. Threat indices were highly correlated (slopes of 0.94–1.63; R2 of 0.82–0.98), and were highest for watersheds close to urban centers, including Phoenix, Tucson, and Flagstaff, Arizona, and Las Vegas, Nevada. Road crossings and density appeared to be the most influential stressors in the index, but the removal of any individual stressor only changed the index by <5.1 units. Our results indicate that a simpler index with less subjectivity (i.e., presence/absence of a stressor in a watershed) provides similar results to the more subjective measure of threats (i.e., peer-reviewed threat severity). Because these threats have been linked to ecological health, the development of the index should be a useful tool to identify regions of greatest potential threat to aquatic biota and can aid in conservation planning for the Lower Colorado River Basin.
Information fusion: telling the story (or threat narrative)
NASA Astrophysics Data System (ADS)
Fenstermacher, Laurie
2014-06-01
Today's operators face a "double whammy" - the need to process increasing amounts of information, including "Twitter-INT"1 (social information such as Facebook, You-Tube videos, blogs, Twitter) as well as the need to discern threat signatures in new security environments, including those in which the airspace is contested. To do this will require the Air Force to "fuse and leverage its vast capabilities in new ways."2 For starters, the integration of quantitative and qualitative information must be done in a way that preserves important contextual information since the goal increasingly is to identify and mitigate violence before it occurs. To do so requires a more nuanced understanding of the environment being sensed, including the human environment, ideally from the "emic" perspective; that is, from the perspective of that individual or group. This requires not only data and information that informs the understanding of how the individuals and/or groups see themselves and others (social identity) but also information on how that identity filters information in their environment which, in turn, shapes their behaviors.3 The goal is to piece together the individual and/or collective narratives regarding threat, the threat narrative, from various sources of information. Is there a threat? If so, what is it? What is motivating the threat? What is the intent of those who pose the threat and what are their capabilities and their vulnerabilities?4 This paper will describe preliminary investigations regarding the application of prototype hybrid information fusion method based on the threat narrative framework.
Wong, Norman C. H.; Cappella, Joseph N.
2009-01-01
This study examined the effects of sequencing different types of antismoking threat and efficacy appeals on smoking cessation intentions for smokers with low and high levels of readiness to quit. An experiment was done to test predictions based on Witte's (1992) Extended Parallel Process Model and research by Cho and Salmon (2006). A national probability sample of 555 adult smokers was recruited to take part in this study. Results found a positive two-way interaction effect between message threat and perceived level of message efficacy on intentions to seek help for quitting. A three-way interaction effect was found between message threat, perceived level of message efficacy, and readiness to quit on quitting intentions. Both threat and efficacy were important for smokers with low readiness to quit, whereas efficacy was most important among smokers with high readiness to quit. Implications of the results for antismoking campaigns are discussed along with limitations and future directions. PMID:20046966
Altenburg, A F; Magnusson, S E; Bosman, F; Stertman, L; de Vries, R D; Rimmelzwaan, G F
2017-10-01
Because of the high variability of seasonal influenza viruses and the eminent threat of influenza viruses with pandemic potential, there is great interest in the development of vaccines that induce broadly protective immunity. Most probably, broadly protective influenza vaccines are based on conserved proteins, such as nucleoprotein (NP). NP is a vaccine target of interest as it has been shown to induce cross-reactive antibody and T cell responses. Here we tested and compared various NP-based vaccine preparations for their capacity to induce humoral and cellular immune responses to influenza virus NP. The immunogenicity of protein-based vaccine preparations with Matrix-M™ adjuvant as well as recombinant viral vaccine vector modified Vaccinia virus Ankara (MVA) expressing the influenza virus NP gene, with or without modifications that aim at optimization of CD8 + T cell responses, was addressed in BALB/c mice. Addition of Matrix-M™ adjuvant to NP wild-type protein-based vaccines significantly improved T cell responses. Furthermore, recombinant MVA expressing the influenza virus NP induced strong antibody and CD8 + T cell responses, which could not be improved further by modifications of NP to increase antigen processing and presentation. © 2017 British Society for Immunology.
River water quality analysis via headspace detection of volatile organic compounds
NASA Astrophysics Data System (ADS)
Tang, Johnny Jock Lee; Nishi, Phyllis Jacqueline; Chong, Gabriel Eng Wee; Wong, Martin Gideon; Chua, Hong Siang; Persaud, Krishna; Ng, Sing Muk
2017-03-01
Human civilization has intensified the interaction between the community and the environment. This increases the threat on the environm ent for being over exploited and contaminated with m anmade products and synthetic chemicals. Of all, clean water is one of the resources that can be easily contaminated since it is a universal solvent and of high mobility. This work reports the development and optimization of a water quality monitoring system based on metal oxide sensors. The system is intended to a ssist the detection of volatile organic compounds (VOCs) present in water sources online and onsite. The sampling mechanism was based on contactless mode, where headspace partial pressure of the VOCs formed above the water body in a close chamber was drawn for detection at the sensor platform. Pure toluene was used as standard to represent the broad spectrum of VOCs, and the sensor dynamic range was achieved from 1-1000 ppb. Several sensing parameters such as sampling time, headspace volume, and sensor recovery were s tudied and optimized. Besides direct detection of VOC contaminants in the water, the work has also been extended to detect VOCs produced by microbial communities and to c orrelate the size of the communities with the reading of V OCs recorded. This can serve to give b etter indication of water quality, not only on the conce ntration of VOCs c ontamination from chemicals, but also the content of microbes, which some can have severe effect on human health.
Analysis of security and threat of underwater wireless sensor network topology
NASA Astrophysics Data System (ADS)
Yang, Guang; Wei, Zhiqiang; Cong, Yanping; Jia, Dongning
2012-04-01
Underwater wireless sensor networks (UWSNs) are a subclass of wireless sensor networks. Underwater sensor deployment is a significant challenge due to the characteristics of UWSNs and underwater environment. Recent researches for UWSNs deployment mostly focus on the maintenance of network connectivity and maximum communication coverage. However, the broadcast nature of the transmission medium incurs various types of security attacks. This paper studies the security issues and threats of UWSNs topology. Based on the cluster-based topology, an underwater cluster-based security scheme (U-CBSS) is presented to defend against these attacks. and safety.
2013-01-01
Background Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient’s TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform. Methods Risk assessment was performed in an iterative manner during the development process. Thus, security solutions have been incorporated into the design from an early stage instead of being included as an add-on to a nearly completed system. We have adapted existing risk management methods to our own environment, thus creating our own method. Our method conforms to ISO’s standard for information security risk management. Results A total of approximately 50 threats and possible unwanted incidents were identified and analysed. Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk. This is because health-related personal information is regarded as sensitive. Availability threats were analysed as low risk, as the aim of the home programmes is to provide education and rehabilitation services; not for use in acute situations or for continuous health monitoring. Conclusions Most of the identified threats are applicable for healthcare services intended for patients or citizens in their own homes. Confidentiality risks in home are different from in a more controlled environment such as a hospital; and electronic equipment located in private homes and communicating via Internet, is more exposed to unauthorised access. By implementing the proposed measures, it has been possible to design a home-based service which ensures the necessary level of information security and privacy. PMID:23937965
Meta-analysis in evidence-based healthcare: a paradigm shift away from random effects is overdue.
Doi, Suhail A R; Furuya-Kanamori, Luis; Thalib, Lukman; Barendregt, Jan J
2017-12-01
Each year up to 20 000 systematic reviews and meta-analyses are published whose results influence healthcare decisions, thus making the robustness and reliability of meta-analytic methods one of the world's top clinical and public health priorities. The evidence synthesis makes use of either fixed-effect or random-effects statistical methods. The fixed-effect method has largely been replaced by the random-effects method as heterogeneity of study effects led to poor error estimation. However, despite the widespread use and acceptance of the random-effects method to correct this, it too remains unsatisfactory and continues to suffer from defective error estimation, posing a serious threat to decision-making in evidence-based clinical and public health practice. We discuss here the problem with the random-effects approach and demonstrate that there exist better estimators under the fixed-effect model framework that can achieve optimal error estimation. We argue for an urgent return to the earlier framework with updates that address these problems and conclude that doing so can markedly improve the reliability of meta-analytical findings and thus decision-making in healthcare.
Liu, Jie; Guo, Liang; Jiang, Jiping; Jiang, Dexun; Wang, Peng
2017-01-01
In the emergency management relevant to chemical contingency spills, efficiency emergency rescue can be deeply influenced by a reasonable assignment of the available emergency materials to the related risk sources. In this study, an emergency material scheduling model (EMSM) with time-effective and cost-effective objectives is developed to coordinate both allocation and scheduling of the emergency materials. Meanwhile, an improved genetic algorithm (IGA) which includes a revision operation for EMSM is proposed to identify the emergency material scheduling schemes. Then, scenario analysis is used to evaluate optimal emergency rescue scheme under different emergency pollution conditions associated with different threat degrees based on analytic hierarchy process (AHP) method. The whole framework is then applied to a computational experiment based on south-to-north water transfer project in China. The results demonstrate that the developed method not only could guarantee the implementation of the emergency rescue to satisfy the requirements of chemical contingency spills but also help decision makers identify appropriate emergency material scheduling schemes in a balance between time-effective and cost-effective objectives.
Children and Terrorism-Related News: Training Parents in Coping and Media Literacy
Comer, Jonathan S.; Furr, Jami M.; Beidas, Rinad S.; Weiner, Courtney L.; Kendall, Philip C.
2009-01-01
This study examined associations between televised news regarding risk for future terrorism and youth outcomes and investigated the effects of training mothers in an empirically based approach to addressing such news with children. This approach—Coping and Media Literacy (CML)—emphasized modeling, media literacy, and contingent reinforcement and was compared via randomized design to Discussion as Usual (DAU). Ninety community youth (aged 7−13 years) and their mothers viewed a televised news clip about the risk of future terrorism, and threat perceptions and state anxiety were assessed preclip, postclip, and postdiscussion. Children responded to the clip with elevated threat perceptions and anxiety. Children of CML-trained mothers exhibited lower threat perceptions than DAU youth at postclip and at postdiscussion. Additionally, CML-trained mothers exhibited lower threat perceptions and state anxiety at postclip and postdiscussion than did DAU mothers. Moreover, older youth responded to the clip with greater societal threat perception than did younger youth. Findings document associations between terrorism-related news, threat perceptions, and anxiety and support the utility of providing parents with strategies for addressing news with children. Implications and research suggestions are discussed. PMID:18665686
Stereotype Threat and Perceptions of Family-Friendly Policies among Female Employees
von Hippel, Courtney; Kalokerinos, Elise K.; Zacher, Hannes
2017-01-01
In their efforts to recruit and retain female employees, organizations often attempt to make their workplaces “family-friendly.” Yet there is little research on how women view family-friendly policies, particularly women who experience gender-based stereotype threat, or the concern of being viewed through the lens of gender stereotypes at work. Pilot research with female managers (N = 169) showed that women who experienced stereotype threat perceived more negative career consequences for utilizing family-friendly policies. We then conducted two studies to further probe this relationship. Study 1 replicated the relationship between stereotype threat and the perceived consequences of utilizing family-friendly policies among women who recently returned to work after the birth of a child (N = 65). In Study 2 (N = 473), female employees who reported feelings of stereotype threat perceived more negative consequences of utilizing family-friendly policies, but they also reported greater intentions to use these policies. Our findings suggest that female employees are susceptible to stereotype threat, which in turn is associated with more negative views of family-friendly policies. Thus, the mere provision of such policies may not create the kind of family-friendly workplaces that organizations are attempting to provide. PMID:28111560
Stereotype Threat and Perceptions of Family-Friendly Policies among Female Employees.
von Hippel, Courtney; Kalokerinos, Elise K; Zacher, Hannes
2016-01-01
In their efforts to recruit and retain female employees, organizations often attempt to make their workplaces "family-friendly." Yet there is little research on how women view family-friendly policies, particularly women who experience gender-based stereotype threat, or the concern of being viewed through the lens of gender stereotypes at work. Pilot research with female managers ( N = 169) showed that women who experienced stereotype threat perceived more negative career consequences for utilizing family-friendly policies. We then conducted two studies to further probe this relationship. Study 1 replicated the relationship between stereotype threat and the perceived consequences of utilizing family-friendly policies among women who recently returned to work after the birth of a child ( N = 65). In Study 2 ( N = 473), female employees who reported feelings of stereotype threat perceived more negative consequences of utilizing family-friendly policies, but they also reported greater intentions to use these policies. Our findings suggest that female employees are susceptible to stereotype threat, which in turn is associated with more negative views of family-friendly policies. Thus, the mere provision of such policies may not create the kind of family-friendly workplaces that organizations are attempting to provide.
Children and terrorism-related news: training parents in Coping and Media Literacy.
Comer, Jonathan S; Furr, Jami M; Beidas, Rinad S; Weiner, Courtney L; Kendall, Philip C
2008-08-01
This study examined associations between televised news regarding risk for future terrorism and youth outcomes and investigated the effects of training mothers in an empirically based approach to addressing such news with children. This approach--Coping and Media Literacy (CML)--emphasized modeling, media literacy, and contingent reinforcement and was compared via randomized design to Discussion as Usual (DAU). Ninety community youth (aged 7-13 years) and their mothers viewed a televised news clip about the risk of future terrorism, and threat perceptions and state anxiety were assessed preclip, postclip, and postdiscussion. Children responded to the clip with elevated threat perceptions and anxiety. Children of CML-trained mothers exhibited lower threat perceptions than DAU youth at postclip and at postdiscussion. Additionally, CML-trained mothers exhibited lower threat perceptions and state anxiety at postclip and postdiscussion than did DAU mothers. Moreover, older youth responded to the clip with greater societal threat perception than did younger youth. Findings document associations between terrorism-related news, threat perceptions, and anxiety and support the utility of providing parents with strategies for addressing news with children. Implications and research suggestions are discussed. Copyright 2008 APA, all rights reserved.
Heilbrun, Kirk; Wolbransky, Melinda; Shah, Sanjay; Kelly, Rebecca
2010-01-01
Risk communication is an important vehicle for the scientific understanding of the perception of and response to various kinds of threats. The present study provides apparently the first empirical attempt to compare perceptions, decision-making, and anticipated action in response to threats of three kinds: natural disaster, violent crime, and terrorism. A total of 258 college undergraduates were surveyed using a vignette-based, 2 × 2 × 3 between-subjects design that systematically manipulated threat imminence (high vs. low), risk level (high vs. low), and nature of the threat (natural disaster vs. crime vs. terrorism). There were substantial differences in participants' perceptions and reported actions in response to natural disaster, relative to the other domains of risk, under conditions of high risk. The risk of natural disaster was more likely to lead participants to report that they would change their daily activities and to relocate. It was also more likely than terrorism to lead to action securing the home. It appears that the mechanisms for perception, decision-making, and action in response to threats cannot be generalized in a straightforward way across these domains of threat. Copyright © 2010 John Wiley & Sons, Ltd.
Protection motivation theory and stages of change in sun protective behavior.
Prentice-Dunn, Steven; McMath, Ben F; Cramer, Robert J
2009-03-01
This study examined the usefulness of the stage of change model and protection motivation theory (PMT) in creating brief persuasive appeals to promote healthy sun-behavior. College women (N = 254) read one of four essays that manipulated the level of threat and coping appraisal. The transition from the precontemplation to contemplation stage was promoted by threat appraisal information, but transition from contemplation to the preparation stage occurred only when individuals were provided with both high threat and high coping information. Thus, brief communications based on PMT may create attitudes leading to behavior change when later, more intensive, interventions are introduced.
A cost effective FBG-based security fence with fire alarm function
NASA Astrophysics Data System (ADS)
Wu, H. J.; Li, S. S.; Lu, X. L.; Wu, Y.; Rao, Y. J.
2012-02-01
Fiber Bragg Grating (FBG) is sensitive to the temperature as well when it is measuring the strain change, which is always avoided in most measurement applications. However, in this paper strain/temperature dual sensitivity is utilized to construct a special security fence with a second function of fire threat prediction. In an FBG-based fiber fence configuration, only by characteristics analysis and identification method, it can intelligently distinguish the different effects of personal threats and fires from their different trends of the wavelength drifts. Thus without any additional temperature sensing fittings or other fire alarm systems integrated, a normal perimeter security system can possess a second function of fire prediction, which can not only monitor the intrusion induced by personal actions but also predict fire threats in advance. The experimental results show the effectiveness of the method.
Detecting insider activity using enhanced directory virtualization.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shin, Dongwan; Claycomb, William R.
2010-07-01
Insider threats often target authentication and access control systems, which are frequently based on directory services. Detecting these threats is challenging, because malicious users with the technical ability to modify these structures often have sufficient knowledge and expertise to conceal unauthorized activity. The use of directory virtualization to monitor various systems across an enterprise can be a valuable tool for detecting insider activity. The addition of a policy engine to directory virtualization services enhances monitoring capabilities by allowing greater flexibility in analyzing changes for malicious intent. The resulting architecture is a system-based approach, where the relationships and dependencies between datamore » sources and directory services are used to detect an insider threat, rather than simply relying on point solutions. This paper presents such an architecture in detail, including a description of implementation results.« less
Lamont, Ruth A; Swift, Hannah J; Abrams, Dominic
2015-03-01
Stereotype threat effects arise when an individual feels at risk of confirming a negative stereotype about their group and consequently underperforms on stereotype relevant tasks (Steele, 2010). Among older people, underperformance across cognitive and physical tasks is hypothesized to result from age-based stereotype threat (ABST) because of negative age-stereotypes regarding older adults' competence. The present review and meta-analyses examine 22 published and 10 unpublished articles, including 82 effect sizes (N = 3882) investigating ABST on older people's (Mage = 69.5) performance. The analysis revealed a significant small-to-medium effect of ABST (d = .28) and important moderators of the effect size. Specifically, older adults are more vulnerable to ABST when (a) stereotype-based rather than fact-based manipulations are used (d = .52); (b) when performance is tested using cognitive measures (d = .36); and (c) occurs reliably when the dependent variable is measured proximally to the manipulation. The review raises important theoretical and methodological issues, and areas for future research. (c) 2015 APA, all rights reserved).
Lead in ammunition: a persistent threat to health and conservation.
Johnson, C K; Kelly, T R; Rideout, B A
2013-12-01
Many scavenging bird populations have experienced abrupt declines across the globe, and intensive recovery activities have been necessary to sustain several species, including the critically endangered California condor (Gymnogyps californianus). Exposure to lead from lead-based ammunition is widespread in condors and lead toxicosis presents an immediate threat to condor recovery, accounting for the highest proportion of adult mortality. Lead contamination of carcasses across the landscape remains a serious threat to the health and sustainability of scavenging birds, and here we summarize recent evidence for exposure to lead-based ammunition and health implications across many species. California condors and other scavenging species are sensitive indicators of the occurrence of lead contaminated carcasses in the environment. Transdisciplinary science-based approaches have been critical to managing lead exposure in California condors and paving the way for use of non-lead ammunition in California. Similar transdisciplinary approaches are now needed to translate the science informing on this issue and establish education and outreach efforts that focus on concerns brought forth by key stakeholders.
Asynchronous threat awareness by observer trials using crowd simulation
NASA Astrophysics Data System (ADS)
Dunau, Patrick; Huber, Samuel; Stein, Karin U.; Wellig, Peter
2016-10-01
The last few years showed that a high risk of asynchronous threats is given in every day life. Especially in large crowds a high probability of asynchronous attacks is evident. High observational abilities to detect threats are desirable. Consequently highly trained security and observation personal is needed. This paper evaluates the effectiveness of a training methodology to enhance performance of observation personnel engaging in a specific target identification task. For this purpose a crowd simulation video is utilized. The study first provides a measurement of the base performance before the training sessions. Furthermore a training procedure will be performed. Base performance will then be compared to the after training performance in order to look for a training effect. A thorough evaluation of both the training sessions as well as the overall performance will be done in this paper. A specific hypotheses based metric is used. Results will be discussed in order to provide guidelines for the design of training for observational tasks.
Fourth Generation Warfare in Chile: Illicit Drug Trafficking Threats
2011-03-21
observable fact in the world-wide scenario which affects diplomatic, cultural, economic , and military connections among countries. Cooperative and... economic and technological resources because they are supported by international organizations and even some states, based on radical inclinations of...concept and approach must be expanded to encompass new and nontraditional threats, which include political, economic , social, health, and
Global warming and extinctions of endemic species from biodiversity hotspots.
Jay R. Malcolm; Canran Liu; Ronald P. Neilson; Lara Hansen; Lee Hannah
2006-01-01
Global warming is a key threat to biodiversity, but few researchers have assessed the magnitude of this threat at the global scale. We used major vegetation types (biomes) as proxies for natural habitats and, based on projected future biome distributions under doubled-C02 climates, calculated changes in habitat areas and associated extinctions of...
Legal Barriers to Educational Technology and Instructional Productivity. Final Report.
ERIC Educational Resources Information Center
Heinich, Robert; Ebert, Kim
A study sought to determine if deterrents to the introduction of certain kinds of educational technology were statutory in nature. The thesis was advanced that educational technology is a threat to the power base of education and the more comprehensive the technology, the greater the threat; therefore the laws and policies setting forth the…
ERIC Educational Resources Information Center
Hollis-Sawyer, Lisa A.; Sawyer, Thomas P., Jr.
2008-01-01
Evaluation is an inherent part of education for an increasingly diverse student population. Confidence in one's test-taking skills, and the associated testing environment, needs to be examined from a perspective that combines the concept of Bandurian self-efficacy with the concept of stereotype threat reactions in a diverse student sample. Factors…
Cyber Intelligence Threat Prioritization
2014-10-01
platform that allows anyone to make their organization more visible to threat actors. Online Presence Extracurricular Activities Motive Risk...intelligence • The acquisition and analysis of information to identify, track, and predict cyber capabilities, intentions, and activities to offer courses of...access can significantly aid in identifying the risk to employees. Physical and Network-Based Access Position Abnormal Activity Infrastructure
Pollution, habitat loss, fishing, and climate change as critical threats to penguins.
Trathan, Phil N; García-Borboroglu, Pablo; Boersma, Dee; Bost, Charles-André; Crawford, Robert J M; Crossin, Glenn T; Cuthbert, Richard J; Dann, Peter; Davis, Lloyd Spencer; De La Puente, Santiago; Ellenberg, Ursula; Lynch, Heather J; Mattern, Thomas; Pütz, Klemens; Seddon, Philip J; Trivelpiece, Wayne; Wienecke, Barbara
2015-02-01
Cumulative human impacts across the world's oceans are considerable. We therefore examined a single model taxonomic group, the penguins (Spheniscidae), to explore how marine species and communities might be at risk of decline or extinction in the southern hemisphere. We sought to determine the most important threats to penguins and to suggest means to mitigate these threats. Our review has relevance to other taxonomic groups in the southern hemisphere and in northern latitudes, where human impacts are greater. Our review was based on an expert assessment and literature review of all 18 penguin species; 49 scientists contributed to the process. For each penguin species, we considered their range and distribution, population trends, and main anthropogenic threats over the past approximately 250 years. These threats were harvesting adults for oil, skin, and feathers and as bait for crab and rock lobster fisheries; harvesting of eggs; terrestrial habitat degradation; marine pollution; fisheries bycatch and resource competition; environmental variability and climate change; and toxic algal poisoning and disease. Habitat loss, pollution, and fishing, all factors humans can readily mitigate, remain the primary threats for penguin species. Their future resilience to further climate change impacts will almost certainly depend on addressing current threats to existing habitat degradation on land and at sea. We suggest protection of breeding habitat, linked to the designation of appropriately scaled marine reserves, including in the High Seas, will be critical for the future conservation of penguins. However, large-scale conservation zones are not always practical or politically feasible and other ecosystem-based management methods that include spatial zoning, bycatch mitigation, and robust harvest control must be developed to maintain marine biodiversity and ensure that ecosystem functioning is maintained across a variety of scales. © 2014 The Authors. Conservation Biology published by Wiley Periodicals, Inc. on behalf of Society for Conservation Biology.
Lapid Pickman, Liron; Greene, Talya; Gelkopf, Marc
2017-08-01
Exposure and sense of threat have been associated with stress symptoms, yet these relationships have not been clarified during the peritraumatic period. We investigated the mediating role of sense of threat in the link between exposure to rocket warning sirens and stress symptoms during wartime, and the effect of severe mental illness (SMI) status and gender on this mediation. A 30-day twice-daily smartphone-based intensive assessment of exposure to sirens, sense of threat, and peritraumatic stress symptoms was performed during the 2014 Israel-Gaza conflict. Participants included 182 highly exposed individuals with or without SMI. Multilevel structural equation modeling analysis was performed, with SMI status and gender as confounders. Exposure affected the level of peritraumatic stress symptoms both directly, b = 1.07, p < .001, 95% CI [0.32, 1.82], and indirectly, b = 0.78, p < .001, 95% CI [0.24, 1.33], through sense of threat. The effect of sense of threat on stress symptoms was larger in the SMI group, b = 0.86, p < .001, 95% CI [0.31, 1.40]. Gender did not have a significant effect. Sense of threat has a key role in symptom development during the peritraumatic timeframe. Intervention and prevention efforts should start early and focus on promoting a sense of safety, particularly with people with SMI. Copyright © 2017 International Society for Traumatic Stress Studies.
Airborne Particulate Threat Assessment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Patrick Treado; Oksana Klueva; Jeffrey Beckstead
Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. governmentmore » agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our findings and APICD Gen II subsystems for automated collection, deposition and detection of ambient particulate matter. Key findings from the APTA Program include: Ambient biological PM taxonomy; Demonstration of key subsystems needed for autonomous bioaerosol detection; System design; Efficient electrostatic collection; Automated bioagent recognition; Raman analysis performance validating Td<9 sec; Efficient collection surface regeneration; and Development of a quantitative bioaerosol defection model. The objective of the APTA program was to advance the state of our knowledge of ambient background PM composition. Operation of an automated aerosol detection system was enhanced by a more accurate assessment of background variability, especially for sensitive and specific sensing strategies like Raman detection that are background-limited in performance. Based on this improved knowledge of background, the overall threat detection performance of Raman sensors was improved.« less
Users Guide for the Anvil Threat Corridor Forecast Tool V1.7.0 for AWIPS
NASA Technical Reports Server (NTRS)
Bauman, William H., III
2007-01-01
The Applied Meteorology Unit (AMU) originally developed the Anvil Threat Sector Tool for the Meteorological Interactive Data Display System (MIDDS) and delivered the capability in three phases beginning with a feasibility study in 2000 and delivering the operational final product in December 2003. This tool is currently used operationally by the 45th Weather Squadron (45 WS) Launch Weather Officers (LWO) and Spaceflight Meteorology Group (SMG) forecasters. Phase I of the task established the technical feasibility of developing an objective, observations-based tool for short-range anvil forecasting. The AMU was subsequently tasked to develop short-term anvil forecasting tools to improve predictions of the threat of triggered lightning to space launch and landing vehicles. Under the Phase II effort, the AMU developed a nowcasting anvil threat sector tool, which provided the user with a threat sector based on the most current radiosonde upper wind data from a co-located or upstream station. The Phase II Anvil Threat Sector Tool computes the average wind speed and direction in the layer between 300 and 150 mb from the latest radiosonde for a user-designated station. The following threat sector properties are consistent with the propagation and lifetime characteristics of thunderstorm anvil clouds observed over Florida and its coastal waters (Short et al. 2002): a) 20 n mi standoff circle, b) 30 degree sector width, c) Orientation given by 300 to 150 mb average wind direction, d) 1-, 2-, and 3- hour arcs in upwind direction, and e) Arc distances given by 300 to 150 mb average wind speed. Figure 1 is an example of the MIDDS Anvil Threat Sector tool overlaid on a visible satellite image at 2132 UTC 13 May 2001. Space Launch Complex 39A was selected as the center point and the Anvil Threat Sector was determined from upper-level wind data at 1500 UTC in the preconvective environment. Narrow thunderstorm anvil clouds extend from central Florida to the space launch and landing facilities at the Kennedy Space Center (KSC) and Cape Canaveral Air Force Station (CCAFS) and beyond. The anvil clouds were generated around 1930 UTC (1430 EDT) by thunderstorm activity over central Florida and transported 90 n mi east-northeastward within 2 hours, as diagnosed by the anvil forecast tool. Phase III, delivered in February 2003, built upon the results of Phase II by enhancing the Anvil Threat Sector Tool with the capability to use national model forecast winds for depiction of potential anvil lengths and orientations over the KSC/CCAFS area with lead times from 3 through 168 hours (7 days). In September 2003, AMU customers requested the capability to use data from the KSC 50 MHz Doppler Radar Wind Profiler (DRWP) in the Anvil Threat Sector Tool and this capability was delivered by the AMU in December 2003. In March 2005, the AMU was tasked to migrate the MIDDS Anvil Threat Sector Tool capabilities onto the Advanced Weather Interactive Processing System (AWIPS) as the Anvil Threat Corridor Forecast Tool.
Helping Parents Cope with Suicide Threats: An Approach Based on Nonviolent Resistance.
Omer, Haim; Dolberger, Dan Isaac
2015-09-01
Parent training in nonviolent resistance was adapted to deal with situations of suicide threat by children, adolescents, and young adults. The approach aims at reducing the risk potential and the mutual distress surrounding the threat-interaction. Parent training in nonviolent resistance has been shown to help parents move from helplessness to presence, from isolation to connectedness, from submission to resistance, from escalation to self-control, and from mutual distancing and hostility to care and support. Those emphases can be crucial for the diminution of suicide risk. Parents show good ability to implement the approach and report gains on various areas over and beyond the reduction in suicide threat. A particular advantage is that the method can be used also in cases where the young person threatening suicide is not willing to cooperate. © 2015 Family Process Institute.
Forecasting Lightning Threat using Cloud-resolving Model Simulations
NASA Technical Reports Server (NTRS)
McCaul, E. W., Jr.; Goodman, S. J.; LaCasse, K. M.; Cecil, D. J.
2009-01-01
As numerical forecasts capable of resolving individual convective clouds become more common, it is of interest to see if quantitative forecasts of lightning flash rate density are possible, based on fields computed by the numerical model. Previous observational research has shown robust relationships between observed lightning flash rates and inferred updraft and large precipitation ice fields in the mixed phase regions of storms, and that these relationships might allow simulated fields to serve as proxies for lightning flash rate density. It is shown in this paper that two simple proxy fields do indeed provide reasonable and cost-effective bases for creating time-evolving maps of predicted lightning flash rate density, judging from a series of diverse simulation case study events in North Alabama for which Lightning Mapping Array data provide ground truth. One method is based on the product of upward velocity and the mixing ratio of precipitating ice hydrometeors, modeled as graupel only, in the mixed phase region of storms at the -15\\dgc\\ level, while the second method is based on the vertically integrated amounts of ice hydrometeors in each model grid column. Each method can be calibrated by comparing domainwide statistics of the peak values of simulated flash rate proxy fields against domainwide peak total lightning flash rate density data from observations. Tests show that the first method is able to capture much of the temporal variability of the lightning threat, while the second method does a better job of depicting the areal coverage of the threat. A blended solution is designed to retain most of the temporal sensitivity of the first method, while adding the improved spatial coverage of the second. Weather Research and Forecast Model simulations of selected North Alabama cases show that this model can distinguish the general character and intensity of most convective events, and that the proposed methods show promise as a means of generating quantitatively realistic fields of lightning threat. However, because models tend to have more difficulty in correctly predicting the instantaneous placement of storms, forecasts of the detailed location of the lightning threat based on single simulations can be in error. Although these model shortcomings presently limit the precision of lightning threat forecasts from individual runs of current generation models, the techniques proposed herein should continue to be applicable as newer and more accurate physically-based model versions, physical parameterizations, initialization techniques and ensembles of cloud-allowing forecasts become available.
Prioritizing Land and Sea Conservation Investments to Protect Coral Reefs
Klein, Carissa J.; Ban, Natalie C.; Halpern, Benjamin S.; Beger, Maria; Game, Edward T.; Grantham, Hedley S.; Green, Alison; Klein, Travis J.; Kininmonth, Stuart; Treml, Eric; Wilson, Kerrie; Possingham, Hugh P.
2010-01-01
Background Coral reefs have exceptional biodiversity, support the livelihoods of millions of people, and are threatened by multiple human activities on land (e.g. farming) and in the sea (e.g. overfishing). Most conservation efforts occur at local scales and, when effective, can increase the resilience of coral reefs to global threats such as climate change (e.g. warming water and ocean acidification). Limited resources for conservation require that we efficiently prioritize where and how to best sustain coral reef ecosystems. Methodology/Principal Findings Here we develop the first prioritization approach that can guide regional-scale conservation investments in land- and sea-based conservation actions that cost-effectively mitigate threats to coral reefs, and apply it to the Coral Triangle, an area of significant global attention and funding. Using information on threats to marine ecosystems, effectiveness of management actions at abating threats, and the management and opportunity costs of actions, we calculate the rate of return on investment in two conservation actions in sixteen ecoregions. We discover that marine conservation almost always trumps terrestrial conservation within any ecoregion, but terrestrial conservation in one ecoregion can be a better investment than marine conservation in another. We show how these results could be used to allocate a limited budget for conservation and compare them to priorities based on individual criteria. Conclusions/Significance Previous prioritization approaches do not consider both land and sea-based threats or the socioeconomic costs of conserving coral reefs. A simple and transparent approach like ours is essential to support effective coral reef conservation decisions in a large and diverse region like the Coral Triangle, but can be applied at any scale and to other marine ecosystems. PMID:20814570
Prioritizing land and sea conservation investments to protect coral reefs.
Klein, Carissa J; Ban, Natalie C; Halpern, Benjamin S; Beger, Maria; Game, Edward T; Grantham, Hedley S; Green, Alison; Klein, Travis J; Kininmonth, Stuart; Treml, Eric; Wilson, Kerrie; Possingham, Hugh P
2010-08-30
Coral reefs have exceptional biodiversity, support the livelihoods of millions of people, and are threatened by multiple human activities on land (e.g. farming) and in the sea (e.g. overfishing). Most conservation efforts occur at local scales and, when effective, can increase the resilience of coral reefs to global threats such as climate change (e.g. warming water and ocean acidification). Limited resources for conservation require that we efficiently prioritize where and how to best sustain coral reef ecosystems. Here we develop the first prioritization approach that can guide regional-scale conservation investments in land- and sea-based conservation actions that cost-effectively mitigate threats to coral reefs, and apply it to the Coral Triangle, an area of significant global attention and funding. Using information on threats to marine ecosystems, effectiveness of management actions at abating threats, and the management and opportunity costs of actions, we calculate the rate of return on investment in two conservation actions in sixteen ecoregions. We discover that marine conservation almost always trumps terrestrial conservation within any ecoregion, but terrestrial conservation in one ecoregion can be a better investment than marine conservation in another. We show how these results could be used to allocate a limited budget for conservation and compare them to priorities based on individual criteria. Previous prioritization approaches do not consider both land and sea-based threats or the socioeconomic costs of conserving coral reefs. A simple and transparent approach like ours is essential to support effective coral reef conservation decisions in a large and diverse region like the Coral Triangle, but can be applied at any scale and to other marine ecosystems.
NASA Astrophysics Data System (ADS)
Hermann, Nadin; Menzel, Susanne
2013-12-01
Conservation efforts such as the restoration of European bison or the support of wolf immigration into Germany are often socio-scientifically controversial. In many cases, disputes are based on individuals' threat perception and attitudes towards the animal involved. The herewith reported study provides qualitative insights into German adolescents' (n = 31, Mage = 16.6 years) attitudes towards animal reintroduction, their threat and coping appraisal about wildlife and their knowledge of local endangered species. We found that students had rather limited knowledge of local endangered species. After Kellert's categories of animal attitudes, the adolescents showed a strong moralistic view on wildlife return. Naturalistic, ecologistic and utilitarian views were also strongly apparent. According to the Protection Motivation Theory, perceived threats could be identified as threats to animals on the one hand and threats to human interests on the other. Such threat perceptions often lead to a dilemma, which made it difficult to decide upon the priorities of wildlife protection versus protection of human interests. Coping mechanism to reduce threats to human interests as mentioned by the participants included restrictions of the animal as well as strategies that focused on responsibility by humans. Regarding coping mechanism to prevent the species' extinction, participants showed a relatively superficial understanding. Furthermore, we found that participants from regions where wolves are currently immigrating or European bison are being reintroduced showed a more positive understanding of the respective animal. Our findings are discussed in the light of this topic's potential as an example of a real-life socio-scientific issue in classroom discussions.
Early stage response problem for post-disaster incidents
NASA Astrophysics Data System (ADS)
Kim, Sungwoo; Shin, Youngchul; Lee, Gyu M.; Moon, Ilkyeong
2018-07-01
Research on evacuation plans for reducing damages and casualties has been conducted to advise defenders against threats. However, despite the attention given to the research in the past, emergency response management, designed to neutralize hazards, has been undermined since planners frequently fail to apprehend the complexities and contexts of the emergency situation. Therefore, this study considers a response problem with unique characteristics for the duration of the emergency. An early stage response problem is identified to find the optimal routing and scheduling plan for responders to prevent further hazards. Due to the complexity of the proposed mathematical model, two algorithms are developed. Data from a high-rise building, called Central City in Seoul, Korea, are used to evaluate the algorithms. Results show that the proposed algorithms can procure near-optimal solutions within a reasonable time.
Mathematical analysis of dynamic spread of Pine Wilt disease.
Dimitrijevic, D D; Bacic, J
2013-01-01
Since its detection in Portugal in 1999, the pinewood nematode Bursaphelenchus xylophilus (Steiner and Buhrer), a causal agent of Pine Wilt Disease, represents a threat to European forestry. Significant amount of money has been spent on its monitoring and eradication. This paper presents mathematical analysis of spread of pine wilt disease using a set of partial differential equations with space (longitude and latitude) and time as parameters of estimated spread of disease. This methodology can be used to evaluate risk of various assumed entry points of disease and make defense plans in advance. In case of an already existing outbreak, it can be used to draw optimal line of defense and plan removal of trees. Optimization constraints are economic loss of removal of susceptible trees as well as budgetary constraints of workforce cost.
Miller, Jennifer R. B.; Jhala, Yadvendradev V.; Schmitz, Oswald J.
2016-01-01
Human-carnivore conflict is challenging to quantify because it is shaped by both the realities and people’s perceptions of carnivore threats. Whether perceptions align with realities can have implications for conflict mitigation: misalignments can lead to heightened and indiscriminant persecution of carnivores whereas alignments can offer deeper insights into human-carnivore interactions. We applied a landscape-scale spatial analysis of livestock killed by tigers and leopards in India to model and map observed attack risk, and surveyed owners of livestock killed by tigers and leopards for their rankings of threats across habitats to map perceived attack risk. Observed tiger risk to livestock was greatest near dense forests and at moderate distances from human activity while leopard risk was greatest near open vegetation. People accurately perceived spatial differences between tiger and leopard hunting patterns, expected greater threat in areas with high values of observed risk for both carnivores. Owners’ perception of threats largely did not depend on environmental conditions surrounding their village (spatial location, dominant land-use or observed carnivore risk). Surveys revealed that owners who previously lost livestock to carnivores used more livestock protection methods than those who had no prior losses, and that owners who had recently lost livestock for the first time expressed greater interest in changing their protection methods than those who experienced prior losses. Our findings suggest that in systems where realities and perceptions of carnivore risk align, conservation programs and policies can optimize conservation outcomes by (1) improving the effectiveness of livestock protection methods and (2) working with owners who have recently lost livestock and are most willing to invest effort in adapting protection strategies to mitigate human-carnivore conflict. PMID:27617831
Miller, Jennifer R B; Jhala, Yadvendradev V; Schmitz, Oswald J
2016-01-01
Human-carnivore conflict is challenging to quantify because it is shaped by both the realities and people's perceptions of carnivore threats. Whether perceptions align with realities can have implications for conflict mitigation: misalignments can lead to heightened and indiscriminant persecution of carnivores whereas alignments can offer deeper insights into human-carnivore interactions. We applied a landscape-scale spatial analysis of livestock killed by tigers and leopards in India to model and map observed attack risk, and surveyed owners of livestock killed by tigers and leopards for their rankings of threats across habitats to map perceived attack risk. Observed tiger risk to livestock was greatest near dense forests and at moderate distances from human activity while leopard risk was greatest near open vegetation. People accurately perceived spatial differences between tiger and leopard hunting patterns, expected greater threat in areas with high values of observed risk for both carnivores. Owners' perception of threats largely did not depend on environmental conditions surrounding their village (spatial location, dominant land-use or observed carnivore risk). Surveys revealed that owners who previously lost livestock to carnivores used more livestock protection methods than those who had no prior losses, and that owners who had recently lost livestock for the first time expressed greater interest in changing their protection methods than those who experienced prior losses. Our findings suggest that in systems where realities and perceptions of carnivore risk align, conservation programs and policies can optimize conservation outcomes by (1) improving the effectiveness of livestock protection methods and (2) working with owners who have recently lost livestock and are most willing to invest effort in adapting protection strategies to mitigate human-carnivore conflict.
Paul H. Gobster
2005-01-01
Invasive species is a hot topic in the USDA Forest Service these days. Along with wildfire, land conversion and unmanaged recreation, Chief Dale Bosworth has called invasive species one of the `Four Threats` needing the attention of Forest Service land managers and researchers (USDA Forest Service 2004). My unit of the Forest Service, the North Central Research...
Paul W. Schaefer; Gerhard Gries
2007-01-01
Many Asian lymantriid moths in the genera Lymantria and Orgyia pose imminent threats of being accidentally introduced into North America. Based on their (a) extent of polyphagy; (b) potential of transoceanic transportation; (c) likelihood of establishment in North America; and (d) life history traits, we propose a ranked list (...
ERIC Educational Resources Information Center
Trad, Laura; Katt, James; Miller, Ann Neville
2014-01-01
Instructor nonverbal immediacy has been associated with a range of positive student outcomes, but it is difficult to convey in an online environment. We investigated whether the text-based variable of face threat mitigation (FTM) alone--without the visual cues of nonverbally immediate behaviors--could significantly raise students' motivation and…
ERIC Educational Resources Information Center
Hermann, Nadin; Menzel, Susanne
2013-01-01
Conservation efforts such as the restoration of European bison or the support of wolf immigration into Germany are often socio-scientifically controversial. In many cases, disputes are based on individuals' threat perception and attitudes towards the animal involved. The herewith reported study provides qualitative insights into German…
Richard Trans Mills; Forrest M Hoffman; Jitendra Kumar; William W. Hargrove
2011-01-01
We investigate methods for geospatiotemporal data mining of multi-year land surface phenology data (250 m2 Normalized Difference Vegetation Index (NDVI) values derived from the Moderate Resolution Imaging Spectrometer (MODIS) in this study) for the conterminous United States (CONUS) as part of an early warning system for detecting threats to forest ecosystems. The...
ERIC Educational Resources Information Center
Ljujic, Vanja
2011-01-01
This study investigates Serbian adolescents' attitudes towards the Roma, i.e. Romaphobia. The sample consisted of 687 secondary school students (mean age 17), of which 53% were females. In a survey-based study, we assessed perception of physical threat, quality of previous contact with Roma, and Romaphobia. The findings demonstrate that perceived…
ERIC Educational Resources Information Center
Lenhardt, Ann Marie C.; Graham, Lemuel W.; Farrell, Melissa L.
2018-01-01
Targeted violence continues to pose a threat to school safety. Reported here are the results of a study of 18 cases of school shooters from 1996 to 2012. Variables examined are individual factors and behaviors, family dynamics, and triggering events. Results indicate the need for expanded school-based mental health services, threat assessment, and…
System for ranking relative threats of U.S. volcanoes
Ewert, J.W.
2007-01-01
A methodology to systematically rank volcanic threat was developed as the basis for prioritizing volcanoes for long-term hazards evaluations, monitoring, and mitigation activities. A ranking of 169 volcanoes in the United States and the Commonwealth of the Northern Mariana Islands (U.S. volcanoes) is presented based on scores assigned for various hazard and exposure factors. Fifteen factors define the hazard: Volcano type, maximum known eruptive explosivity, magnitude of recent explosivity within the past 500 and 5,000 years, average eruption-recurrence interval, presence or potential for a suite of hazardous phenomena (pyroclastic flows, lahars, lava flows, tsunami, flank collapse, hydrothermal explosion, primary lahar), and deformation, seismic, or degassing unrest. Nine factors define exposure: a measure of ground-based human population in hazard zones, past fatalities and evacuations, a measure of airport exposure, a measure of human population on aircraft, the presence of power, transportation, and developed infrastructure, and whether or not the volcano forms a significant part of a populated island. The hazard score and exposure score for each volcano are multiplied to give its overall threat score. Once scored, the ordered list of volcanoes is divided into five overall threat categories from very high to very low. ?? 2007 ASCE.
McCann, Stewart J H
2008-05-01
On the basis of K. Stenner's (2005) authoritarian dynamic theory, it was hypothesized that the number of death sentences and executions would be higher in more threatened conservative states than in less threatened conservative states, and would be lower in more threatened liberal states than in less threatened liberal states. Threat was based on state homicide rate, violent crime rate, and non-White percentage of population. Conservatism was based on state voter ideological identification, Democratic and Republican Party elite liberalism-conservatism, policy liberalism-conservatism, religious fundamentalism, degree of economic freedom, and 2004 presidential election results. For 1977-2004, with controls for state population and years with a death penalty provision, the interactive hypothesis received consistent support using the state conservatism composite and voter ideological identification alone. As well, state conservatism was related to death penalties and executions, but state threat was not. The temporal stability of the findings was demonstrated with a split-half internal replication using the periods 1977-1990 and 1991-2004. The interactive hypothesis and the results also are discussed in the context of other threat-authoritarianism theories and terror management theory. (c) 2008 APA, all rights reserved
Web malware spread modelling and optimal control strategies
NASA Astrophysics Data System (ADS)
Liu, Wanping; Zhong, Shouming
2017-02-01
The popularity of the Web improves the growth of web threats. Formulating mathematical models for accurate prediction of malicious propagation over networks is of great importance. The aim of this paper is to understand the propagation mechanisms of web malware and the impact of human intervention on the spread of malicious hyperlinks. Considering the characteristics of web malware, a new differential epidemic model which extends the traditional SIR model by adding another delitescent compartment is proposed to address the spreading behavior of malicious links over networks. The spreading threshold of the model system is calculated, and the dynamics of the model is theoretically analyzed. Moreover, the optimal control theory is employed to study malware immunization strategies, aiming to keep the total economic loss of security investment and infection loss as low as possible. The existence and uniqueness of the results concerning the optimality system are confirmed. Finally, numerical simulations show that the spread of malware links can be controlled effectively with proper control strategy of specific parameter choice.
Web malware spread modelling and optimal control strategies.
Liu, Wanping; Zhong, Shouming
2017-02-10
The popularity of the Web improves the growth of web threats. Formulating mathematical models for accurate prediction of malicious propagation over networks is of great importance. The aim of this paper is to understand the propagation mechanisms of web malware and the impact of human intervention on the spread of malicious hyperlinks. Considering the characteristics of web malware, a new differential epidemic model which extends the traditional SIR model by adding another delitescent compartment is proposed to address the spreading behavior of malicious links over networks. The spreading threshold of the model system is calculated, and the dynamics of the model is theoretically analyzed. Moreover, the optimal control theory is employed to study malware immunization strategies, aiming to keep the total economic loss of security investment and infection loss as low as possible. The existence and uniqueness of the results concerning the optimality system are confirmed. Finally, numerical simulations show that the spread of malware links can be controlled effectively with proper control strategy of specific parameter choice.
Web malware spread modelling and optimal control strategies
Liu, Wanping; Zhong, Shouming
2017-01-01
The popularity of the Web improves the growth of web threats. Formulating mathematical models for accurate prediction of malicious propagation over networks is of great importance. The aim of this paper is to understand the propagation mechanisms of web malware and the impact of human intervention on the spread of malicious hyperlinks. Considering the characteristics of web malware, a new differential epidemic model which extends the traditional SIR model by adding another delitescent compartment is proposed to address the spreading behavior of malicious links over networks. The spreading threshold of the model system is calculated, and the dynamics of the model is theoretically analyzed. Moreover, the optimal control theory is employed to study malware immunization strategies, aiming to keep the total economic loss of security investment and infection loss as low as possible. The existence and uniqueness of the results concerning the optimality system are confirmed. Finally, numerical simulations show that the spread of malware links can be controlled effectively with proper control strategy of specific parameter choice. PMID:28186203
Radiation biodosimetry: applications for spaceflight
NASA Astrophysics Data System (ADS)
Blakely, W.; Miller, A.; Grace, M.; Prasanna, P.; Muderhwa, J.
The multiparametric dosimetry system that we are developing for medical radiological defense applications could be adapted for spaceflight environments. The system complements the internationally accepted cytogenetic analysis of chromosome aberrations, considered the best means of documenting radiation doses for health records. Our system consists of a dose assessment software application, a portable blood cell counter, and molecular biodosimetry using miniaturized equipment. The Biodosimetry Assessment Tool (BAT) software application calculates radiation dose based on a patient's physical signs and symptoms and blood analysis, annotates location of personnel dosimeters, displays a summary of a patient's dosimetric information to healthcare professionals, and archives the data for further use. The dry reagent centrifuge-based blood cell counter (QBC Autoread Plus, Beckon Dickinson Bioscience) measures peripheral blood lymphocytes and monocytes, which could determine radiation dose based on the kinetics of blood cell depletion. Molecular biomarkers for ionizing radiation exposure (gene expression changes, blood proteins), once dose-dependent targets are identified, optimized, and validated, will make use of miniaturized diagnostic equipment for nucleic acid sequence and antigen-based biosensor detection technologies. These radiation assessment diagnostic technologies can have dual use for other medical related applications. [The Armed Forces Radiobiology Research Institute, under work unit AFRRI-01-3, and the Defense Threat Reduction Agency, under contract GG4661, supported this research.
Rapid simulation of X-ray transmission imaging for baggage inspection via GPU-based ray-tracing
NASA Astrophysics Data System (ADS)
Gong, Qian; Stoian, Razvan-Ionut; Coccarelli, David S.; Greenberg, Joel A.; Vera, Esteban; Gehm, Michael E.
2018-01-01
We present a pipeline that rapidly simulates X-ray transmission imaging for arbitrary system architectures using GPU-based ray-tracing techniques. The purpose of the pipeline is to enable statistical analysis of threat detection in the context of airline baggage inspection. As a faster alternative to Monte Carlo methods, we adopt a deterministic approach for simulating photoelectric absorption-based imaging. The highly-optimized NVIDIA OptiX API is used to implement ray-tracing, greatly speeding code execution. In addition, we implement the first hierarchical representation structure to determine the interaction path length of rays traversing heterogeneous media described by layered polygons. The accuracy of the pipeline has been validated by comparing simulated data with experimental data collected using a heterogenous phantom and a laboratory X-ray imaging system. On a single computer, our approach allows us to generate over 400 2D transmission projections (125 × 125 pixels per frame) per hour for a bag packed with hundreds of everyday objects. By implementing our approach on cloud-based GPU computing platforms, we find that the same 2D projections of approximately 3.9 million bags can be obtained in a single day using 400 GPU instances, at a cost of only 0.001 per bag.
Sloan-Power, Elizabeth M; Boxer, Paul; McGuirl, Colleen; Church, Ruslana
2013-06-01
This mixed-method study explored how urban children aged 11 to 14 cope with multicontextual violence exposures simultaneously and analyzed the immediate action steps these children took when faced with such violence over time. Participants' (N = 12) narratives were initially analyzed utilizing a grounded theory framework as 68 violent incidents were coded for perceived threat and coping levels. Coping strategies were examined from a Transactional Model of Stress and Coping perspective taking into account the context and severity of each violent exposure itself. A comprehensive assessment map was developed to plot and visually reveal participants (N = 12) overall contextualized coping responses. Overall "coping zone" scores were generated to index perceived threat and coping responses associated with each violent incident described. These scores were then correlated with indicators of post-traumatic stress disorder (PTSD). Results indicated that urban children with less optimal coping zone scores across context have a greater likelihood of PTSD than do children who do not.
Chemical and biological threat-agent detection using electrophoresis-based lab-on-a-chip devices.
Borowsky, Joseph; Collins, Greg E
2007-10-01
The ability to separate complex mixtures of analytes has made capillary electrophoresis (CE) a powerful analytical tool since its modern configuration was first introduced over 25 years ago. The technique found new utility with its application to the microfluidics based lab-on-a-chip platform (i.e., microchip), which resulted in ever smaller footprints, sample volumes, and analysis times. These features, coupled with the technique's potential for portability, have prompted recent interest in the development of novel analyzers for chemical and biological threat agents. This article will comment on three main areas of microchip CE as applied to the separation and detection of threat agents: detection techniques and their corresponding limits of detection, sampling protocol and preparation time, and system portability. These three areas typify the broad utility of lab-on-a-chip for meeting critical, present-day security, in addition to illustrating areas wherein advances are necessary.
Ell, Shawn W; Cosley, Brandon; McCoy, Shannon K
2011-02-01
The way in which we respond to everyday stressors can have a profound impact on cognitive functioning. Maladaptive stress responses in particular are generally associated with impaired cognitive performance. We argue, however, that the cognitive system mediating task performance is also a critical determinant of the stress-cognition relationship. Consistent with this prediction, we observed that stress reactivity consistent with a maladaptive, threat response differentially predicted performance on two categorization tasks. Increased threat reactivity predicted enhanced performance on an information-integration task (i.e., learning is thought to depend upon a procedural-based memory system), and a (nonsignificant) trend for impaired performance on a rule-based task (i.e., learning is thought to depend upon a hypothesis-testing system). These data suggest that it is critical to consider both variability in the stress response and variability in the cognitive system mediating task performance in order to fully understand the stress-cognition relationship.
NASA Astrophysics Data System (ADS)
Tuna, G.; Örenbaş, H.; Daş, R.; Kogias, D.; Baykara, M.; K, K.
2016-03-01
Wireless Sensor Networks (WSNs) when combined with various energy harvesting solutions managing to prolong the overall lifetime of the system and enhanced capabilities of the communication protocols used by modern sensor nodes are efficiently used in are efficiently used in Smart Grid (SG), an evolutionary system for the modernization of existing power grids. However, wireless communication technology brings various types of security threats. In this study, firstly the use of WSNs for SG applications is presented. Second, the security related issues and challenges as well as the security threats are presented. In addition, proposed security mechanisms for WSN-based SG applications are discussed. Finally, an easy- to-implement and simple attack detection framework to prevent attacks directed to sink and gateway nodes with web interfaces is proposed and its efficiency is proved using a case study.
Stollberg, Janine; Fritsche, Immo; Bäcker, Anna
2015-01-01
When their sense of personal control is threatened people try to restore perceived control through the social self. We propose that it is the perceived agency of ingroups that provides the self with a sense of control. In three experiments, we for the first time tested the hypothesis that threat to personal control increases the attractiveness of being part or joining those groups that are perceived as coherent entities engaging in coordinated group goal pursuit (agentic groups) but not of those groups whose agency is perceived to be low. Consistent with this hypothesis we found in Study 1 (N = 93) that threat to personal control increased ingroup identification only with task groups, but not with less agentic types of ingroups that were made salient simultaneously. Furthermore, personal control threat increased a sense of collective control and support within the task group, mediated through task-group identification (indirect effects). Turning to groups people are not (yet) part of, Study 2 (N = 47) showed that personal control threat increased relative attractiveness ratings of small groups as possible future ingroups only when the relative agency of small groups was perceived to be high. Perceived group homogeneity or social power did not moderate the effect. Study 3 (N = 78) replicated the moderating role of perceived group agency for attractiveness ratings of entitative groups, whereas perceived group status did not moderate the effect. These findings extend previous research on group-based control, showing that perceived agency accounts for group-based responses to threatened control.
Nothing is safe: Intolerance of uncertainty is associated with compromised fear extinction learning.
Morriss, Jayne; Christakou, Anastasia; van Reekum, Carien M
2016-12-01
Extinction-resistant fear is considered to be a central feature of pathological anxiety. Here we sought to determine if individual differences in Intolerance of Uncertainty (IU), a potential risk factor for anxiety disorders, underlies compromised fear extinction. We tested this hypothesis by recording electrodermal activity in 38 healthy participants during fear acquisition and extinction. We assessed the temporality of fear extinction, by examining early and late extinction learning. During early extinction, low IU was associated with larger skin conductance responses to learned threat vs. safety cues, whereas high IU was associated with skin conductance responding to both threat and safety cues, but no cue discrimination. During late extinction, low IU showed no difference in skin conductance between learned threat and safety cues, whilst high IU predicted continued fear expression to learned threat, indexed by larger skin conductance to threat vs. safety cues. These findings suggest a critical role of uncertainty-based mechanisms in the maintenance of learned fear. Copyright © 2016 The Authors. Published by Elsevier B.V. All rights reserved.
FRET-based quantum dot immunoassay for rapid and sensitive detection of Aspergillus amstelodami.
Kattke, Michele D; Gao, Elizabeth J; Sapsford, Kim E; Stephenson, Larry D; Kumar, Ashok
2011-01-01
In this study, a fluorescence resonance energy transfer (FRET)-based quantum dot (QD) immunoassay for detection and identification of Aspergillus amstelodami was developed. Biosensors were formed by conjugating QDs to IgG antibodies and incubating with quencher-labeled analytes; QD energy was transferred to the quencher species through FRET, resulting in diminished fluorescence from the QD donor. During a detection event, quencher-labeled analytes are displaced by higher affinity target analytes, creating a detectable fluorescence signal increase from the QD donor. Conjugation and the resulting antibody:QD ratios were characterized with UV-Vis spectroscopy and QuantiT protein assay. The sensitivity of initial fluorescence experiments was compromised by inherent autofluorescence of mold spores, which produced low signal-to-noise and inconsistent readings. Therefore, excitation wavelength, QD, and quencher were adjusted to provide optimal signal-to-noise over spore background. Affinities of anti-Aspergillus antibody for different mold species were estimated with sandwich immunoassays, which identified A. fumigatus and A. amstelodami for use as quencher-labeled- and target-analytes, respectively. The optimized displacement immunoassay detected A. amstelodami concentrations as low as 10(3) spores/mL in five minutes or less. Additionally, baseline fluorescence was produced in the presence of 10(5) CFU/mL heat-killed E. coli O157:H7, demonstrating high specificity. This sensing modality may be useful for identification and detection of other biological threat agents, pending identification of suitable antibodies. Overall, these FRET-based QD-antibody biosensors represent a significant advancement in detection capabilities, offering sensitive and reliable detection of targets with applications in areas from biological terrorism defense to clinical analysis.
FRET-Based Quantum Dot Immunoassay for Rapid and Sensitive Detection of Aspergillus amstelodami
Kattke, Michele D.; Gao, Elizabeth J.; Sapsford, Kim E.; Stephenson, Larry D.; Kumar, Ashok
2011-01-01
In this study, a fluorescence resonance energy transfer (FRET)-based quantum dot (QD) immunoassay for detection and identification of Aspergillus amstelodami was developed. Biosensors were formed by conjugating QDs to IgG antibodies and incubating with quencher-labeled analytes; QD energy was transferred to the quencher species through FRET, resulting in diminished fluorescence from the QD donor. During a detection event, quencher-labeled analytes are displaced by higher affinity target analytes, creating a detectable fluorescence signal increase from the QD donor. Conjugation and the resulting antibody:QD ratios were characterized with UV-Vis spectroscopy and QuantiT protein assay. The sensitivity of initial fluorescence experiments was compromised by inherent autofluorescence of mold spores, which produced low signal-to-noise and inconsistent readings. Therefore, excitation wavelength, QD, and quencher were adjusted to provide optimal signal-to-noise over spore background. Affinities of anti-Aspergillus antibody for different mold species were estimated with sandwich immunoassays, which identified A. fumigatus and A. amstelodami for use as quencher-labeled- and target-analytes, respectively. The optimized displacement immunoassay detected A. amstelodami concentrations as low as 103 spores/mL in five minutes or less. Additionally, baseline fluorescence was produced in the presence of 105 CFU/mL heat-killed E. coli O157:H7, demonstrating high specificity. This sensing modality may be useful for identification and detection of other biological threat agents, pending identification of suitable antibodies. Overall, these FRET-based QD-antibody biosensors represent a significant advancement in detection capabilities, offering sensitive and reliable detection of targets with applications in areas from biological terrorism defense to clinical analysis. PMID:22163961
Emotion blocks the path to learning under stereotype threat
Good, Catherine; Whiteman, Ronald C.; Maniscalco, Brian; Dweck, Carol S.
2012-01-01
Gender-based stereotypes undermine females’ performance on challenging math tests, but how do they influence their ability to learn from the errors they make? Females under stereotype threat or non-threat were presented with accuracy feedback after each problem on a GRE-like math test, followed by an optional interactive tutorial that provided step-wise problem-solving instruction. Event-related potentials tracked the initial detection of the negative feedback following errors [feedback related negativity (FRN), P3a], as well as any subsequent sustained attention/arousal to that information [late positive potential (LPP)]. Learning was defined as success in applying tutorial information to correction of initial test errors on a surprise retest 24-h later. Under non-threat conditions, emotional responses to negative feedback did not curtail exploration of the tutor, and the amount of tutor exploration predicted learning success. In the stereotype threat condition, however, greater initial salience of the failure (FRN) predicted less exploration of the tutor, and sustained attention to the negative feedback (LPP) predicted poor learning from what was explored. Thus, under stereotype threat, emotional responses to negative feedback predicted both disengagement from learning and interference with learning attempts. We discuss the importance of emotion regulation in successful rebound from failure for stigmatized groups in stereotype-salient environments. PMID:21252312
Emotion blocks the path to learning under stereotype threat.
Mangels, Jennifer A; Good, Catherine; Whiteman, Ronald C; Maniscalco, Brian; Dweck, Carol S
2012-02-01
Gender-based stereotypes undermine females' performance on challenging math tests, but how do they influence their ability to learn from the errors they make? Females under stereotype threat or non-threat were presented with accuracy feedback after each problem on a GRE-like math test, followed by an optional interactive tutorial that provided step-wise problem-solving instruction. Event-related potentials tracked the initial detection of the negative feedback following errors [feedback related negativity (FRN), P3a], as well as any subsequent sustained attention/arousal to that information [late positive potential (LPP)]. Learning was defined as success in applying tutorial information to correction of initial test errors on a surprise retest 24-h later. Under non-threat conditions, emotional responses to negative feedback did not curtail exploration of the tutor, and the amount of tutor exploration predicted learning success. In the stereotype threat condition, however, greater initial salience of the failure (FRN) predicted less exploration of the tutor, and sustained attention to the negative feedback (LPP) predicted poor learning from what was explored. Thus, under stereotype threat, emotional responses to negative feedback predicted both disengagement from learning and interference with learning attempts. We discuss the importance of emotion regulation in successful rebound from failure for stigmatized groups in stereotype-salient environments.
Classifying threats with a 14-MeV neutron interrogation system.
Strellis, Dan; Gozani, Tsahi
2005-01-01
SeaPODDS (Sea Portable Drug Detection System) is a non-intrusive tool for detecting concealed threats in hidden compartments of maritime vessels. This system consists of an electronic neutron generator, a gamma-ray detector, a data acquisition computer, and a laptop computer user-interface. Although initially developed to detect narcotics, recent algorithm developments have shown that the system is capable of correctly classifying a threat into one of four distinct categories: narcotic, explosive, chemical weapon, or radiological dispersion device (RDD). Detection of narcotics, explosives, and chemical weapons is based on gamma-ray signatures unique to the chemical elements. Elements are identified by their characteristic prompt gamma-rays induced by fast and thermal neutrons. Detection of RDD is accomplished by detecting gamma-rays emitted by common radioisotopes and nuclear reactor fission products. The algorithm phenomenology for classifying threats into the proper categories is presented here.
Stereotype Threat Among Black and White Women in Health Care Settings
Abdou, Cleopatra M.; Fingerhut, Adam W.
2016-01-01
The first of its kind, the present experiment applied stereotype threat—the threat of being judged by or confirming negative group-based stereotypes—to the health sciences. Black and White women (N = 162) engaged in a virtual health care situation. In the experimental condition, one’s ethnic identity and negative stereotypes of Black women specifically were made salient. As predicted, Black women in the stereotype threat condition who were strongly identified as Black (in terms of having explored what their ethnic identity means to them and the role it plays in their lives) reported significantly greater anxiety while waiting to see the doctor in the virtual health care setting than all other women. It is hypothesized that stereotype threat experienced in health care settings is one overlooked social barrier contributing to disparities in health care utilization and broader health disparities among Black women. PMID:25045944
NASA Astrophysics Data System (ADS)
Humpherys, Candice; Pyper, Brian
2006-05-01
A good deal of research has been done on the issue of stereotype threat. [1, 2] This research proposes that if a person identifies with a group of people that is negatively stereotyped for performance, then they will not perform as well as someone from the same group of people who is not made aware of the negative stereotype. The research we conducted investigates the legitimacy of stereotype threat based on gender in the area of science in the BYU-Idaho student population. Our results have significance in the current national debate about the lack of women pursuing careers in scientific disciplines. [1] Quinn, Diane M.; Spencer, Steven J.. (2001). The Interference of Stereotype Threat With Women's Generation of Mathematical Problem-Solving Strategies. Journal of Social Issues. 57(1):55-71. [2] Schmader, Tony, & Johns, Michael. (2003). Converging Evidence That Stereotype Threat Reduces Working Memory Capacity. Journal of Personality and Social Psychology. 85(3):440-452.
NASA Astrophysics Data System (ADS)
Humpherys, Candice; Pyper, Brian
2006-10-01
A good deal of research has been done on the issue of stereotype threat.^1, 2 This research proposes that if a person identifies with a group of people that is negatively stereotyped for performance, then they will not perform as well as someone from the same group of people who is not made aware of the negative stereotype. The research we conducted investigates the legitimacy of stereotype threat based on gender in the area of science in the BYU-Idaho student population. Our results have significance in the current national debate about the lack of women pursuing careers in scientific disciplines. ^1 Quinn, Diane M.; Spencer, Steven J.. (2001). The Interference of Stereotype Threat With Women's Generation of Mathematical Problem-Solving Strategies. Journal of Social Issues. 57(1):55-71. ^2 Schmader, Tony, & Johns, Michael. (2003). Converging Evidence That Stereotype Threat Reduces Working Memory Capacity. Journal of Personality and Social Psychology. 85(3):440-452.
Guo, Xitong; Han, Xiaocui; Zhang, Xiaofei; Dang, Yuanyuan; Chen, Chun
2015-08-01
Mobile health (m-health) services are becoming increasingly important and widely accepted. However, empirical studies on potential users' m-health acceptance behavior remain underexplored. Indeed, m-health adoption is not only a technology acceptance behavior, but also a health-related behavior. Based on the Protection Motivation Theory, this article explores users' m-health adoption behavior from the perspectives of threat appraisal and coping appraisal, and also examines the moderating role of gender and age through a survey of potential users. The survey was conducted among 500 potential m-health service participants. Our results show that threat appraisal and coping appraisal factors influence adoption intention through attitude. It is also found that gender and age play different moderating roles with threat appraisal and coping appraisal factors. Gender and age play different roles between threat appraisal and coping appraisal factors in the acceptance of m-health. Implications for research and practice are discussed.
Anxiety and Threat-Related Attention: Cognitive-Motivational Framework and Treatment.
Mogg, Karin; Bradley, Brendan P
2018-03-01
Research in experimental psychopathology and cognitive theories of anxiety highlight threat-related attention biases (ABs) and underpin the development of a computer-delivered treatment for anxiety disorders: attention-bias modification (ABM) training. Variable effects of ABM training on anxiety and ABs generate conflicting research recommendations, novel ABM training procedures, and theoretical controversy. This article summarises an updated cognitive-motivational framework, integrating proposals from cognitive models of anxiety and attention, as well as evidence of ABs. Interactions between motivational salience-driven and goal-directed influences on multiple cognitive processes (e.g., stimulus evaluation, inhibition, switching, orienting) underlie anxiety and the variable manifestations of ABs (orienting towards and away from threat; threat-distractor interference). This theoretical analysis also considers ABM training as cognitive skill training, describes a conceptual framework for evaluating/developing novel ABM training procedures, and complements network-based research on reciprocal anxiety-cognition relationships. Copyright © 2018 The Authors. Published by Elsevier Ltd.. All rights reserved.
Mujica-Parodi, Lilianne R; Cha, Jiook; Gao, Jonathan
2017-01-01
Here we provide an integrative review of basic control circuits, and introduce techniques by which their regulation can be quantitatively measured using human neuroimaging. We illustrate the utility of the control systems approach using four human neuroimaging threat detection studies ( N = 226), to which we applied circuit-wide analyses in order to identify the key mechanism underlying individual variation. In so doing, we build upon the canonical prefrontal-limbic control system to integrate circuit-wide influence from the inferior frontal gyrus (IFG). These were incorporated into a computational control systems model constrained by neuroanatomy and designed to replicate our experimental data. In this model, the IFG acts as an informational set point, gating signals between the primary prefrontal-limbic negative feedback loop and its cortical information-gathering loop. Along the cortical route, if the sensory cortex provides sufficient information to make a threat assessment, the signal passes to the ventromedial prefrontal cortex (vmPFC), whose threat-detection threshold subsequently modulates amygdala outputs. However, if signal outputs from the sensory cortex do not provide sufficient information during the first pass, the signal loops back to the sensory cortex, with each cycle providing increasingly fine-grained processing of sensory data. Simulations replicate IFG (chaotic) dynamics experimentally observed at both ends at the threat-detection spectrum. As such, they identify distinct types of IFG disconnection from the circuit, with associated clinical outcomes. If IFG thresholds are too high, the IFG and sensory cortex cycle for too long; in the meantime the coarse-grained (excitatory) pathway will dominate, biasing ambiguous stimuli as false positives. On the other hand, if cortical IFG thresholds are too low, the inhibitory pathway will suppress the amygdala without cycling back to the sensory cortex for much-needed fine-grained sensory cortical data, biasing ambiguous stimuli as false negatives. Thus, the control systems model provides a consistent mechanism for IFG regulation, capable of producing results consistent with our data for the full spectrum of threat-detection: from fearful to optimal to reckless. More generally, it illustrates how quantitative characterization of circuit dynamics can be used to unify a fundamental dimension across psychiatric affective symptoms, with implications for populations that range from anxiety disorders to addiction.
Policing of reproduction by hidden threats in a cooperative mammal.
Cant, Michael A; Nichols, Hazel J; Johnstone, Rufus A; Hodge, Sarah J
2014-01-07
The evolution of cooperation in animal and human societies is associated with mechanisms to suppress individual selfishness. In insect societies, queens and workers enforce cooperation by "policing" selfish reproduction by workers. Insect policing typically takes the form of damage limitation after individuals have carried out selfish acts (such as laying eggs). In contrast, human policing is based on the use of threats that deter individuals from acting selfishly in the first place, minimizing the need for damage limitation. Policing by threat could in principle be used to enforce reproductive suppression in animal societies, but testing this idea requires an experimental approach to simulate reproductive transgression and provoke out-of-equilibrium behavior. We carried out an experiment of this kind on a wild population of cooperatively breeding banded mongooses (Mungos mungo) in Uganda. In this species, each group contains multiple female breeders that give birth to a communal litter, usually on the same day. In a 7-y experiment we used contraceptive injections to manipulate the distribution of maternity within groups, triggering hidden threats of infanticide. Our data suggest that older, socially dominant females use the threat of infanticide to deter selfish reproduction by younger females, but that females can escape the threat of infanticide by synchronizing birth to the same day as older females. Our study shows that reproduction in animal societies can be profoundly influenced by threats that remain hidden until they are triggered experimentally. Coercion may thus extend well beyond the systems in which acts of infanticide are common.
Naim, R; Wald, I; Lior, A; Pine, D S; Fox, N A; Sheppes, G; Halpern, P; Bar-Haim, Y
2014-07-01
Post-traumatic stress disorder (PTSD) is a chronic and difficult to treat psychiatric disorder. Objective, performance-based diagnostic markers that uniquely index risk for PTSD above and beyond subjective self-report markers could inform attempts to improve prevention and early intervention. We evaluated the predictive value of threat-related attention bias measured immediately after a potentially traumatic event, as a risk marker for PTSD at a 3-month follow-up. We measured the predictive contribution of attentional threat bias above and beyond that of the more established marker of risk for PTSD, self-reported psychological dissociation. Dissociation symptoms and threat-related attention bias were measured in 577 motor vehicle accident (MVA) survivors (mean age = 35.02 years, 356 males) within 24 h of admission to an emergency department (ED) of a large urban hospital. PTSD symptoms were assessed at a 3-month follow-up using the Clinician-Administered PTSD Scale (CAPS). Self-reported dissociation symptoms significantly accounted for 16% of the variance in PTSD at follow-up, and attention bias toward threat significantly accounted for an additional 4% of the variance in PTSD. Threat-related attention bias can be reliably measured in the context of a hospital ED and significantly predicts risk for later PTSD. Possible mechanisms underlying the association between threat bias following a potentially traumatic event and risk for PTSD are discussed. The potential application of an attention bias modification treatment (ABMT) tailored to reduce risk for PTSD is suggested.
Identification of threats using linguistics-based knowledge extraction.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chew, Peter A.
One of the challenges increasingly facing intelligence analysts, along with professionals in many other fields, is the vast amount of data which needs to be reviewed and converted into meaningful information, and ultimately into rational, wise decisions by policy makers. The advent of the world wide web (WWW) has magnified this challenge. A key hypothesis which has guided us is that threats come from ideas (or ideology), and ideas are almost always put into writing before the threats materialize. While in the past the 'writing' might have taken the form of pamphlets or books, today's medium of choice is themore » WWW, precisely because it is a decentralized, flexible, and low-cost method of reaching a wide audience. However, a factor which complicates matters for the analyst is that material published on the WWW may be in any of a large number of languages. In 'Identification of Threats Using Linguistics-Based Knowledge Extraction', we have sought to use Latent Semantic Analysis (LSA) and other similar text analysis techniques to map documents from the WWW, in whatever language they were originally written, to a common language-independent vector-based representation. This then opens up a number of possibilities. First, similar documents can be found across language boundaries. Secondly, a set of documents in multiple languages can be visualized in a graphical representation. These alone offer potentially useful tools and capabilities to the intelligence analyst whose knowledge of foreign languages may be limited. Finally, we can test the over-arching hypothesis--that ideology, and more specifically ideology which represents a threat, can be detected solely from the words which express the ideology--by using the vector-based representation of documents to predict additional features (such as the ideology) within a framework based on supervised learning. In this report, we present the results of a three-year project of the same name. We believe these results clearly demonstrate the general feasibility of an approach such as that outlined above. Nevertheless, there are obstacles which must still be overcome, relating primarily to how 'ideology' should be defined. We discuss these and point to possible solutions.« less
Exploration of Force Transition in Stability Operations Using Multi-Agent Simulation
2006-09-01
risk, mission failure risk, and time in the context of the operational threat environment. The Pythagoras Multi-Agent Simulation and Data Farming...NUMBER OF PAGES 173 14. SUBJECT TERMS Stability Operations, Peace Operations, Data Farming, Pythagoras , Agent- Based Model, Multi-Agent Simulation...the operational threat environment. The Pythagoras Multi-Agent Simulation and Data Farming techniques are used to investigate force-level
ERIC Educational Resources Information Center
Maxwell, Lesli A.
2006-01-01
This article reports, that in a growing number of districts, school leaders are ranking the threat of sex offenders-some of them the parents of enrolled students--as one of their chief student-safety concerns. That threat, they say, is a primary reason for investing thousands of dollars in a Web-based tracking system that tells school officials if…
Reduction of Decision-Making Time in the Air Defense Management
2013-06-01
Cohen, Freeman, & Thompson, 1997), “Threat Evaluation and Weapon Allocation” ( Turan , 2012) and Evaluating the Performance of TEWA Systems (Fredrik...uses these threat values to propose weapon allocation ( Turan , 2012). Turan studied only static based weapon-target allocation. She evaluates and... Turan : - Proximity parameters (CPA, Time to CPA, CPA in units of time, time before hit, distance), - Capability parameters (target type, weapon
ERIC Educational Resources Information Center
Ssentamu, Proscovia Namubiru
2014-01-01
Faculty quality is a key variable in the quality of teaching and learning. However, although learning is the basis for teaching, the circumstances under which faculty learn largely remain unexplained. This paper focuses on the opportunities and threats to learning by faculty at Uganda Management Institute (UMI). The paper is based on a study of…
Euler, Sebastian; Wrege, Johannes; Busmann, Mareike; Lindenmeyer, Hannah J; Sollberger, Daniel; Lang, Undine E; Gaab, Jens; Walter, Marc
2018-01-01
Interpersonal sensitivity, particularly threat of potential exclusion, is a critical condition in borderline personality disorder (BPD) which impairs patients' social adjustment. Current evidence-based treatments include group components, such as mentalization-based group therapy (MBT-G), in order to improve interpersonal functioning. These treatments additionally focus on the therapeutic alliance since it was discovered to be a robust predictor of treatment outcome. However, alliance is a multidimensional factor of group therapy, which includes the fellow patients, and may thus be negatively affected by the exclusion-proneness of BPD patients. The aim of this pilot study was to examine the predictive value of threat of social exclusion for the therapeutic alliance in MBT-G. In the first part of the study, social exclusion was experimentally induced in 23 BPD inpatients and 28 healthy subjects using the Cyberball paradigm, a virtual ball tossing game. The evoked level of threat was measured with the Need-Threat Scale (NTS) which captures four dimensions of fundamental human needs, i.e., the need for belongingness, for self-esteem, for control, and for a meaningful existence. In the second part of the study, therapeutic alliance was measured on three dimensions, the therapists, the fellow patients and the group as a whole, using the Group-Questionnaire (GQ-D). BPD patients scored higher in their level of threat according to the NTS in both, the inclusion and the exclusion condition. The level of threat after exclusion predicted impairments of the therapeutic alliance in MBT-G. It was associated with more negative relationships, lower positive bonding and a lower positive working alliance with the fellow patients and lower positive bonding to the group as a whole whilst no negative prediction of the alliance to the therapists was found. Consequently, our translational study design has shown that Cyberball is an appropriate tool to use as an approach for clinical questions. We further conclude that exclusion-proneness in BPD is a critical feature with respect to alliance in group treatments. In order to neutralize BPD patients' exclusion bias, therapists may be advised to provide an "inclusive stance," especially in initial sessions. It is also recommendable to strengthen patient to patient relations.
Effects of threat management interactions on conservation priorities.
Auerbach, Nancy A; Wilson, Kerrie A; Tulloch, Ayesha I T; Rhodes, Jonathan R; Hanson, Jeffrey O; Possingham, Hugh P
2015-12-01
Decisions need to be made about which biodiversity management actions are undertaken to mitigate threats and about where these actions are implemented. However, management actions can interact; that is, the cost, benefit, and feasibility of one action can change when another action is undertaken. There is little guidance on how to explicitly and efficiently prioritize management for multiple threats, including deciding where to act. Integrated management could focus on one management action to abate a dominant threat or on a strategy comprising multiple actions to abate multiple threats. Furthermore management could be undertaken at sites that are in close proximity to reduce costs. We used cost-effectiveness analysis to prioritize investments in fire management, controlling invasive predators, and reducing grazing pressure in a bio-diverse region of southeastern Queensland, Australia. We compared outcomes of 5 management approaches based on different assumptions about interactions and quantified how investment needed, benefits expected, and the locations prioritized for implementation differed when interactions were taken into account. Managing for interactions altered decisions about where to invest and in which actions to invest and had the potential to deliver increased investment efficiency. Differences in high priority locations and actions were greatest between the approaches when we made different assumptions about how management actions deliver benefits through threat abatement: either all threats must be managed to conserve species or only one management action may be required. Threatened species management that does not consider interactions between actions may result in misplaced investments or misguided expectations of the effort required to mitigate threats to species. © 2015 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of Society for Conservation Biology.
Threat affects risk preferences in movement decision making
O'Brien, Megan K.; Ahmed, Alaa A.
2015-01-01
Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks. PMID:26106311
Threat affects risk preferences in movement decision making.
O'Brien, Megan K; Ahmed, Alaa A
2015-01-01
Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.
A Hybrid Metaheuristic DE/CS Algorithm for UCAV Three-Dimension Path Planning
Wang, Gaige; Guo, Lihong; Duan, Hong; Wang, Heqi; Liu, Luo; Shao, Mingzhen
2012-01-01
Three-dimension path planning for uninhabited combat air vehicle (UCAV) is a complicated high-dimension optimization problem, which primarily centralizes on optimizing the flight route considering the different kinds of constrains under complicated battle field environments. A new hybrid metaheuristic differential evolution (DE) and cuckoo search (CS) algorithm is proposed to solve the UCAV three-dimension path planning problem. DE is applied to optimize the process of selecting cuckoos of the improved CS model during the process of cuckoo updating in nest. The cuckoos can act as an agent in searching the optimal UCAV path. And then, the UCAV can find the safe path by connecting the chosen nodes of the coordinates while avoiding the threat areas and costing minimum fuel. This new approach can accelerate the global convergence speed while preserving the strong robustness of the basic CS. The realization procedure for this hybrid metaheuristic approach DE/CS is also presented. In order to make the optimized UCAV path more feasible, the B-Spline curve is adopted for smoothing the path. To prove the performance of this proposed hybrid metaheuristic method, it is compared with basic CS algorithm. The experiment shows that the proposed approach is more effective and feasible in UCAV three-dimension path planning than the basic CS model. PMID:23193383
A hybrid metaheuristic DE/CS algorithm for UCAV three-dimension path planning.
Wang, Gaige; Guo, Lihong; Duan, Hong; Wang, Heqi; Liu, Luo; Shao, Mingzhen
2012-01-01
Three-dimension path planning for uninhabited combat air vehicle (UCAV) is a complicated high-dimension optimization problem, which primarily centralizes on optimizing the flight route considering the different kinds of constrains under complicated battle field environments. A new hybrid metaheuristic differential evolution (DE) and cuckoo search (CS) algorithm is proposed to solve the UCAV three-dimension path planning problem. DE is applied to optimize the process of selecting cuckoos of the improved CS model during the process of cuckoo updating in nest. The cuckoos can act as an agent in searching the optimal UCAV path. And then, the UCAV can find the safe path by connecting the chosen nodes of the coordinates while avoiding the threat areas and costing minimum fuel. This new approach can accelerate the global convergence speed while preserving the strong robustness of the basic CS. The realization procedure for this hybrid metaheuristic approach DE/CS is also presented. In order to make the optimized UCAV path more feasible, the B-Spline curve is adopted for smoothing the path. To prove the performance of this proposed hybrid metaheuristic method, it is compared with basic CS algorithm. The experiment shows that the proposed approach is more effective and feasible in UCAV three-dimension path planning than the basic CS model.
NASA Astrophysics Data System (ADS)
Duquet, Jean Remi; Bergeron, Pierre; Blodgett, Dale E.; Couture, Jean; Macieszczak, Maciej; Mayrand, Michel; Chalmers, Bruce A.; Paradis, Stephane
1998-03-01
The Research and Development group at Lockheed Martin Canada, in collaboration with the Defence Research Establishment Valcartier, has undertaken a research project in order to capture and analyze the real-time and functional requirements of a next generation Command and Control System (CCS) for the Canadian Patrol Frigates, integrating Multi- Sensor Data Fusion (MSDF), Situation and Threat Assessment (STA) and Resource Management (RM). One important aspect of the project is to define how the use of Artificial Intelligence may optimize the performance of an integrated, real-time MSDF/STA/RM system. A closed-loop simulation environment is being developed to facilitate the evaluation of MSDF/STA/RM concepts, algorithms and architectures. This environment comprises (1) a scenario generator, (2) complex sensor, hardkill and softkill weapon models, (3) a real-time monitoring tool, (4) a distributed Knowledge-Base System (KBS) shell. The latter is being completely redesigned and implemented in-house since no commercial KBS shell could adequately satisfy all the project requirements. The closed- loop capability of the simulation environment, together with its `simulated real-time' capability, allows the interaction between the MSDF/STA/RM system and the environment targets during the execution of a scenario. This capability is essential to measure the performance of many STA and RM functionalities. Some benchmark scenarios have been selected to demonstrate quantitatively the capabilities of the selected MSDF/STA/RM algorithms. The paper describes the simulation environment and discusses the MSDF/STA/RM functionalities currently implemented and their performance as an automatic CCS.
Recycling of Na in advanced life support: strategies based on crop production systems.
Guntur, S V; Mackowiak, C; Wheeler, R M
1999-01-01
Sodium is an essential dietary requirement in human nutrition, but seldom holds much importance as a nutritional element for crop plants. In Advanced Life Support (ALS) systems, recycling of gases, nutrients, and water loops is required to improve system closure. If plants are to play a significant role in recycling of human wastes, Na will need to accumulate in edible tissues for return to the crew diet. If crops fail to accumulate the incoming Na into edible tissues, Na could become a threat to the hydroponic food production system by increasing the nutrient solution salinity. Vegetable crops of Chenopodiaceae such as spinach, table beet, and chard may have a high potential to supply Na to the human diet, as Na can substitute for K to a large extent in metabolic processes of these crops. Various strategies are outlined that include both genetic and environmental management aspects to optimize the Na recovery from waste streams and their resupply through the human diet in ALS.
Thakkar, Shraddha; Nanaware-Kharade, Nisha; Celikel, Reha; Peterson, Eric C.; Varughese, Kottayil I.
2014-01-01
Methamphetamine (METH) abuse is a worldwide threat, without any FDA approved medications. Anti-METH IgGs and single chain fragments (scFvs) have shown efficacy in preclinical studies. Here we report affinity enhancement of an anti-METH scFv for METH and its active metabolite amphetamine (AMP), through the introduction of point mutations, rationally designed to optimize the shape and hydrophobicity of the antibody binding pocket. The binding affinity was measured using saturation binding technique. The mutant scFv-S93T showed 3.1 fold enhancement in affinity for METH and 26 fold for AMP. The scFv-I37M and scFv-Y34M mutants showed enhancement of 94, and 8 fold for AMP, respectively. Structural analysis of scFv-S93T:METH revealed that the substitution of Ser residue by Thr caused the expulsion of a water molecule from the cavity, creating a more hydrophobic environment for the binding that dramatically increases the affinities for METH and AMP. PMID:24419156
Property-Guided Synthesis of Aza-Tricyclic Indolines: Development of Gold Catalysis En Route.
Barbour, Patrick M; Wang, Wei; Chang, Le; Pickard, Kasey L; Rais, Rana; Slusher, Barbara S; Wang, Xiang
2016-04-28
Antibiotic resistance is a worldwide public health threat that needs to be addressed by improved antibiotic stewardship and continuing development of new chemical entities to treat resistant bacterial infections. Compounds that work alongside known antibiotics as combination therapies offer an efficient and sustainable approach to counteract antibiotic resistance in bacteria. Guided by property-based analysis, a series of aza-tricyclic indolines (ATIs) were synthesized to optimize their physiochemical properties as novel combination therapies with β-lactams to treat methicillin-resistant S. aureus (MRSA) infections. A novel and highly efficient gold-catalyzed tandem cyclization was developed to facilitate the synthesis of these ATIs. One guanidine-containing ATI was discovered to possess both improved anti-MRSA activity and lower mammalian toxicity both in vitro and in vivo. In addition, it also showed significantly enhanced aqueous solubility and metabolic stability. These results indicated that the ATIs are a novel class of anti-MRSA agents suitable for further evaluations as adjuvant therapy in animal model studies.
NASA Astrophysics Data System (ADS)
Yuan, Jindou; Xu, Jinliang; Wang, Yaodong
2018-03-01
Energy saving and emission reduction have become targets for modern society due to the potential energy crisis and the threat of climate change. A distributed hybrid renewable energy system (HRES) consists of photovoltaic (PV) arrays, a wood-syngas combined heat and power generator (CHP) and back-up batteries is designed to power a typical semi-detached rural house in China which aims to meet the energy demand of a house and to reduce greenhouse gas emissions from the use of fossil fuels. Based on the annual load information of the house and the local meteorological data including solar radiation, air temperature, etc., a system model is set up using HOMER software and is used to simulate all practical configurations to carry out technical and economic evaluations. The performance of the whole HRES system and each component under different configurations are evaluated. The optimized configuration of the system is found
Seymour, Ben; Yoshida, Wako; Dolan, Ray
2009-01-01
The origin of altruism remains one of the most enduring puzzles of human behaviour. Indeed, true altruism is often thought either not to exist, or to arise merely as a miscalculation of otherwise selfish behaviour. In this paper, we argue that altruism emerges directly from the way in which distinct human decision-making systems learn about rewards. Using insights provided by neurobiological accounts of human decision-making, we suggest that reinforcement learning in game-theoretic social interactions (habitisation over either individuals or games) and observational learning (either imitative of inference based) lead to altruistic behaviour. This arises not only as a result of computational efficiency in the face of processing complexity, but as a direct consequence of optimal inference in the face of uncertainty. Critically, we argue that the fact that evolutionary pressure acts not over the object of learning ('what' is learned), but over the learning systems themselves ('how' things are learned), enables the evolution of altruism despite the direct threat posed by free-riders.
NASA Astrophysics Data System (ADS)
Yu, Shichao; Park, Jewn Giew; Kahn, Jennifer Nielsen; Tumer, Nilgun E.; Pang, Yuan-Ping
2013-12-01
We reported previously (+/-)-2-(5-methylthiophen-2-yl)-3-phenyl-2,3-dihydroquinazolin-4(1H)-one [(+/-)-Retro-2cycl] as the chemical structure of Retro-2 that showed mouse protection against ricin, a notorious ribosome inactivating protein (RIP). Herein we report our chemical resolution of (+/-)-Retro-2cycl, analog synthesis, and cell-based evaluation showing that the two optically pure enantiomers and their achiral analog have nearly the same degree of cell protection against ricin as (+/-)-Retro-2cycl. We also report our computational studies explaining the lack of stereo preference and revealing a common pharmacophore of structurally distinct inhibitors of intracellular retrograde trafficking of RIPs. This pharmacophore comprises a central aromatic ring o-substituted by an aromatic ring and a moiety bearing an O or S atom attached to sp2 C atom(s). These results offer new insights into lead identification and optimization for RIP antidote development to minimize the global health threat caused by ribosome-inactivating proteins.
Microbial degradation of microcystin in Florida’s freshwaters
Ramani, A.; Rein, K.; Shetty, K. G.
2012-01-01
Presence of microcystin (MC), a predominant freshwater algal toxin and a suspected liver carcinogen, in Florida’s freshwaters poses serious health threat to humans and aquatic species. Being recalcitrant to conventional physical and chemical water treatment methods, biological methods of MC removal is widely researched. Water samples collected from five sites of Lake Okeechobee (LO) frequently exposed to toxic Microcystis blooms were used as inoculum for enrichment with microcystin LR (MC-LR) supplied as sole C and N source. After 20 days incubation, MC levels were analyzed using high performance liquid chromatography (HPLC). A bacterial consortium consisting of two isolates DC7 and DC8 from the Indian Prairie Canal sample showed over 74% toxin degradation at the end of day 20. Optimal temperature requirement for biodegradation was identified and phosphorus levels did not affect the MC biodegradation. Based on 16S rRNA sequence similarity the isolate DC8 was found to have a match with Microbacterium sp. and the DC7 isolate with Rhizobium gallicum (AY972457). PMID:21611743
Risk and Vulnerability Analysis of Satellites Due to MM/SD with PIRAT
NASA Astrophysics Data System (ADS)
Kempf, Scott; Schafer, Frank Rudolph, Martin; Welty, Nathan; Donath, Therese; Destefanis, Roberto; Grassi, Lilith; Janovsky, Rolf; Evans, Leanne; Winterboer, Arne
2013-08-01
Until recently, the state-of-the-art assessment of the threat posed to spacecraft by micrometeoroids and space debris was limited to the application of ballistic limit equations to the outer hull of a spacecraft. The probability of no penetration (PNP) is acceptable for assessing the risk and vulnerability of manned space mission, however, for unmanned missions, whereby penetrations of the spacecraft exterior do not necessarily constitute satellite or mission failure, these values are overly conservative. The newly developed software tool PIRAT (Particle Impact Risk and Vulnerability Analysis Tool) has been developed based on the Schäfer-Ryan-Lambert (SRL) triple-wall ballistic limit equation (BLE), applicable for various satellite components. As a result, it has become possible to assess the individual failure rates of satellite components. This paper demonstrates the modeling of an example satellite, the performance of a PIRAT analysis and the potential for subsequent design optimizations with respect of micrometeoroid and space debris (MM/SD) impact risk.
Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M
As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signalsmore » are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.« less
Play and optimal welfare: Does play indicate the presence of positive affective states?
Ahloy-Dallaire, Jamie; Espinosa, Julia; Mason, Georgia
2017-11-16
Play is commonly used to assess affective states in both humans and non-human animals. Play appears to be most common when animals are well-fed and not under any direct threats to fitness. Could play and playfulness therefore indicate pre-existing positive emotions, and thence optimal animal welfare? We examine this question by surveying the internal and external conditions that promote or suppress play in a variety of species, starting with humans. We find that negative affective states and poor welfare usually do suppress play (although there are notable exceptions where the opposite occurs). Furthermore, research in children suggests that beyond the frequency or total duration of play, poor welfare may additionally be reflected in qualitative aspects of this heterogeneous behaviour (e.g. display of solitary over social play; and the 'fragmentation' of play bouts) that are often overlooked in animals. There are surprisingly few studies of play in subjects with pre-existing optimal welfare or in unambiguously highly positive affective states, making it currently impossible to determine whether play can distinguish optimal or good welfare from merely neutral welfare. This therefore represents an important and exciting area for future research. Copyright © 2017 Elsevier B.V. All rights reserved.
Shu, Guowei; Shi, Xiaoyu; Chen, He; Ji, Zhe; Meng, Jiangpeng
2018-03-23
Hypertension is a serious threat to human health and food-derived angiotensin converting enzyme (ACE; EC 3.4.15.1) inhibitory peptides can be used to regulate high blood pressure without side effects. The composition of the nutrient medium for the production of these peptides by fermenting goat milk with Lactobacillus bulgaricus LB6 was optimized to increase the ACE inhibitory activity by Box-Behnken design (BBD) of response surface methodology (RSM) in the present study. Soybean peptone, glucose, and casein had significant effects on both ACE inhibition rate and viable counts of L. bulgaricus LB6 during incubation. The results showed that the maximum values of ACE inhibition rate and viable counts for L. bulgaricus LB6 were reaching to 86.37 ± 0.53% and 8.06 × 10 7 under the optimal conditions, which were 0.35% (w/w) soybean peptone, 1.2% (w/w) glucose, and 0.15% (w/w) casein. The results were in close agreement with the model prediction. The optimal values of the medium component concentrations can be a good reference for obtaining ACE inhibitory peptides from goat milk.
Performance estimation for threat detection in CT systems
NASA Astrophysics Data System (ADS)
Montgomery, Trent; Karl, W. Clem; Castañón, David A.
2017-05-01
Detecting the presence of hazardous materials in suitcases and carry-on luggage is an important problem in aviation security. As the set of threats is expanding, there is a corresponding need to increase the capabilities of explosive detection systems to address these threats. However, there is a lack of principled tools for predicting the performance of alternative designs for detection systems. In this paper, we describe an approach for computing bounds on the achievable classification performance of material discrimination systems based on empirical statistics that estimate the f-divergence of the underlying features. Our approach can be used to examine alternative physical observation modalities and measurement configurations, as well as variations in reconstruction and feature extraction algorithms.
Land-use threats and protected areas: a scenario-based, landscape level approach
Wilson, Tamara S.; Sleeter, Benjamin M.; Sleeter, Rachel R.; Soulard, Christopher E.
2014-01-01
Anthropogenic land use will likely present a greater challenge to biodiversity than climate change this century in the Pacific Northwest, USA. Even if species are equipped with the adaptive capacity to migrate in the face of a changing climate, they will likely encounter a human-dominated landscape as a major dispersal obstacle. Our goal was to identify, at the ecoregion-level, protected areas in close proximity to lands with a higher likelihood of future land-use conversion. Using a state-and-transition simulation model, we modeled spatially explicit (1 km2) land use from 2000 to 2100 under seven alternative land-use and emission scenarios for ecoregions in the Pacific Northwest. We analyzed scenario-based land-use conversion threats from logging, agriculture, and development near existing protected areas. A conversion threat index (CTI) was created to identify ecoregions with highest projected land-use conversion potential within closest proximity to existing protected areas. Our analysis indicated nearly 22% of land area in the Coast Range, over 16% of land area in the Puget Lowland, and nearly 11% of the Cascades had very high CTI values. Broader regional-scale land-use change is projected to impact nearly 40% of the Coast Range, 30% of the Puget Lowland, and 24% of the Cascades (i.e., two highest CTI classes). A landscape level, scenario-based approach to modeling future land use helps identify ecoregions with existing protected areas at greater risk from regional land-use threats and can help prioritize future conservation efforts.
Innovative Approaches to Improve Anti-Infective Vaccine Efficacy.
Yeaman, Michael R; Hennessey, John P
2017-01-06
Safe and efficacious vaccines are arguably the most successful medical interventions of all time. Yet the ongoing discovery of new pathogens, along with emergence of antibiotic-resistant pathogens and a burgeoning population at risk of such infections, imposes unprecedented public health challenges. To meet these challenges, innovative strategies to discover and develop new or improved anti-infective vaccines are necessary. These approaches must intersect the most meaningful insights into protective immunity and advanced technologies with capabilities to deliver immunogens for optimal immune protection. This goal is considered through several recent advances in host-pathogen relationships, conceptual strides in vaccinology, and emerging technologies. Given a clear and growing risk of pandemic disease should the threat of infection go unmet, developing vaccines that optimize protective immunity against high-priority and antibiotic-resistant pathogens represents an urgent and unifying imperative.
Sea Swat: A Littoral Combat Ship for Sea Base Defense
2003-12-01
183 a) DEFINITION... 183 b) THREAT TO SEA BASE........................................................................... 183 c...AND AFFF SYSTEM LOOPS........................................................... 126 FIGURE 69. FIREMAIN AND AFFF SYSTEM NOTIONAL LAYOUT
NASA Astrophysics Data System (ADS)
Smith, William L., Jr.
The threat for aircraft icing in clouds is a significant hazard that routinely impacts aviation operations. Accurate diagnoses and forecasts of aircraft icing conditions requires identifying the location and vertical distribution of clouds with super-cooled liquid water (SLW) droplets, as well as the characteristics of the droplet size distribution. Traditional forecasting methods rely on guidance from numerical models and conventional observations, neither of which currently resolve cloud properties adequately on the optimal scales needed for aviation. Satellite imagers provide measurements over large areas with high spatial resolution that can be interpreted to identify the locations and characteristics of clouds, including features associated with adverse weather and storms. This thesis develops new techniques for interpreting cloud products derived from satellite data to infer the flight icing threat to aircraft in a wide range of cloud conditions. For unobscured low clouds, the icing threat is determined using empirical relationships developed from correlations between satellite imager retrievals of liquid water path and droplet size with icing conditions reported by pilots (PIREPS). For deep ice over water cloud systems, ice and liquid water content profiles are derived by using the imager cloud properties to constrain climatological information on cloud vertical structure and water phase obtained apriori from radar and lidar observations, and from cloud model analyses. Retrievals of the SLW content embedded within overlapping clouds are mapped to the icing threat using guidance from an airfoil modeling study. Compared to PIREPS, the satellite icing detection and intensity accuracies are found to be about 90% and 70%, respectively. Mean differences between the imager IWC retrievals with those from CloudSat and Calipso are less than 30%. This level of closure in the cloud water budget can only be achieved by correcting for errors in the imager retrievals due to the simplifying but poor assumption that deep optically thick clouds are single-phase and vertically homogeneous. When applied to geostationary satellite data, the profiling method provides a real-time characterization of clouds in 4-D. This research should improve the utility of satellite imager data for quantitatively diagnosing and predicting clouds and their effects in weather and climate applications.
ERIC Educational Resources Information Center
Modzeleski, William; Randazzo, Marisa Reddy
2018-01-01
This article provides a brief history of the development of the federal model of school threat assessment, which was created by the U.S. Secret Service and U.S. Department of Education based upon findings from their empirical research on school shootings across the USA. The article reviews the major findings from that behavioral research, which…
2014-10-01
considering new approaches. According to Air Force Space Command, U.S. space systems face intentional and unintentional threats , which have increased...life cycle costs • Demand for more satellites may stimulate new entrants and competition to lower acquisition costs. • Smaller, less complex...Fiscal constraints and growing threats to space systems have led DOD to consider alternatives for acquiring space-based capabilities, including
2002-01-01
catastrophic health consequences , resulting from potential exposures to industrial chemicals (Armed Forces Medical Intelligence Center, 1998). These...susceptible to damage from a toxic industrial material release. For this second component, the Consequence Assessment Tools Set (CATS) (Defense Threat...accidental toxic industrial material release, the severity of the release, and any associated consequences that might occur. These are based on estimated
Change-based threat detection in urban environments with a forward-looking camera
NASA Astrophysics Data System (ADS)
Morton, Kenneth, Jr.; Ratto, Christopher; Malof, Jordan; Gunter, Michael; Collins, Leslie; Torrione, Peter
2012-06-01
Roadside explosive threats continue to pose a significant risk to soldiers and civilians in conflict areas around the world. These objects are easy to manufacture and procure, but due to their ad hoc nature, they are difficult to reliably detect using standard sensing technologies. Although large roadside explosive hazards may be difficult to conceal in rural environments, urban settings provide a much more complicated background where seemingly innocuous objects (e.g., piles of trash, roadside debris) may be used to obscure threats. Since direct detection of all innocuous objects would flag too many objects to be of use, techniques must be employed to reduce the number of alarms generated and highlight only a limited subset of possibly threatening regions for the user. In this work, change detection techniques are used to reduce false alarm rates and increase detection capabilities for possible threat identification in urban environments. The proposed model leverages data from multiple video streams collected over the same regions by first applying video aligning and then using various distance metrics to detect changes based on image keypoints in the video streams. Data collected at an urban warfare simulation range at an Eastern US test site was used to evaluate the proposed approach, and significant reductions in false alarm rates compared to simpler techniques are illustrated.
NASA Astrophysics Data System (ADS)
Singh, Sarvesh Kumar; Turbelin, Gregory; Issartel, Jean-Pierre; Kumar, Pramod; Feiz, Amir Ali
2015-04-01
The fast growing urbanization, industrialization and military developments increase the risk towards the human environment and ecology. This is realized in several past mortality incidents, for instance, Chernobyl nuclear explosion (Ukraine), Bhopal gas leak (India), Fukushima-Daichi radionuclide release (Japan), etc. To reduce the threat and exposure to the hazardous contaminants, a fast and preliminary identification of unknown releases is required by the responsible authorities for the emergency preparedness and air quality analysis. Often, an early detection of such contaminants is pursued by a distributed sensor network. However, identifying the origin and strength of unknown releases following the sensor reported concentrations is a challenging task. This requires an optimal strategy to integrate the measured concentrations with the predictions given by the atmospheric dispersion models. This is an inverse problem. The measured concentrations are insufficient and atmospheric dispersion models suffer from inaccuracy due to the lack of process understanding, turbulence uncertainties, etc. These lead to a loss of information in the reconstruction process and thus, affect the resolution, stability and uniqueness of the retrieved source. An additional well known issue is the numerical artifact arisen at the measurement locations due to the strong concentration gradient and dissipative nature of the concentration. Thus, assimilation techniques are desired which can lead to an optimal retrieval of the unknown releases. In general, this is facilitated within the Bayesian inference and optimization framework with a suitable choice of a priori information, regularization constraints, measurement and background error statistics. An inversion technique is introduced here for an optimal reconstruction of unknown releases using limited concentration measurements. This is based on adjoint representation of the source-receptor relationship and utilization of a weight function which exhibits a priori information about the unknown releases apparent to the monitoring network. The properties of the weight function provide an optimal data resolution and model resolution to the retrieved source estimates. The retrieved source estimates are proved theoretically to be stable against the random measurement errors and their reliability can be interpreted in terms of the distribution of the weight functions. Further, the same framework can be extended for the identification of the point type releases by utilizing the maximum of the retrieved source estimates. The inversion technique has been evaluated with the several diffusion experiments, like, Idaho low wind diffusion experiment (1974), IIT Delhi tracer experiment (1991), European Tracer Experiment (1994), Fusion Field Trials (2007), etc. In case of point release experiments, the source parameters are mostly retrieved close to the true source parameters with least error. Primarily, the proposed technique overcomes two major difficulties incurred in the source reconstruction: (i) The initialization of the source parameters as required by the optimization based techniques. The converged solution depends on their initialization. (ii) The statistical knowledge about the measurement and background errors as required by the Bayesian inference based techniques. These are hypothetically assumed in case of no prior knowledge.
Alignment of threat, effort, and perceived success in North American conservation translocations.
Brichieri-Colombi, Typhenn A; Moehrenschlager, Axel
2016-12-01
The use of conservation translocations to mitigate human effects on biodiversity is increasing, but how these efforts are allocated remains unclear. Based on a comprehensive literature review and online author survey, we sought to determine the goals of translocation efforts, whether they focus on species and regions with high threat and likelihood of perceived success, and how success might be improved. We systematically searched the ISI Web of Knowledge and Academic Search Complete databases to determine the species and regions of conservation translocations and found 1863 articles on conservation translocations in the United States, Canada, Mexico, Central America, and Caribbean published from 1974 to 2013. We questioned 330 relevant authors to determine the motivation for translocations, how translocations were evaluated, and obstacles encountered. Conservation translocations in North America were geographically widespread (in 21 countries), increased in frequency over time for all animal classes (from 1 in 1974 to 84 in 2013), and included 279 different species. Reintroductions and reinforcements were more common in the United States than in Canada and Mexico, Central America, or the Caribbean, and their prevalence was correlated with the number of species at risk at national and state or provincial levels. Translocated species had a higher threat status at state and provincial levels than globally (International Union for Conservation of Nature Red List categorization), suggesting that translocations may have been motivated by regional priorities rather than global risk. Our survey of authors was consistent with these results; most translocations were requested, supported, or funded by government agencies and downlisting species at national or state or provincial levels was the main goal. Nonetheless, downlisting was the least reported measure of success, whereas survival and reproduction of translocated individuals were the most reported. Reported barriers to success included biological factors such as animal mortality and nonbiological factors, such as financial constraints, which were less often considered in the selection of release sites. Our review thus highlights discrepancies between project goals and evaluation criteria and between risk factors considered and obstacles encountered, indicating room to further optimize translocation projects. © 2016 The Authors. Conservation Biology published by Wiley Periodicals, Inc. on behalf of Society for Conservation Biology.
Debunking Health IT Usability Myths
Staggers, N.; Xiao, Y.; Chapman, L.
2013-01-01
Poor usability is a threat to patient safety and linked to productivity loss, workflow disruption, user frustration, sub-optimal product use and system de-installations. Although usability is receiving more attention nationally and internationally, myths about usability persist. This editorial debunks five common myths about usability (1) usability only concerns the look and feel of a product and is, therefore, only a minor concern, (2) usability is not measurable, (3) usability stifles innovation, (4) vendors are solely responsible for product usability, and (5) usability methods are not practical for use in healthcare. PMID:23874361
Evolving Complexity in Hemophilia Management.
Croteau, Stacy E
2018-06-01
Rapid expansion of therapeutic options have increased the complexity of hemophilia care. Previously, on-demand therapy aimed to reduce morbidity and early mortality; however, now aggressive prophylaxis, particularly in children, encourages an active lifestyle. Accurate diagnosis, recognition of early threats to musculoskeletal health, and optimization of therapy are critical for both males and females affected by hemophilia. The diversity of emerging hemophilia therapies, from modified factor protein concentrates, to gene therapy, to nonfactor hemostatic strategies, provide an exciting opportunity to target unmet needs in the bleeding disorder community. Copyright © 2018 Elsevier Inc. All rights reserved.
Use of High-Resolution WRF Simulations to Forecast Lightning Threat
NASA Technical Reports Server (NTRS)
McCaul, E. W., Jr.; LaCasse, K.; Goodman, S. J.; Cecil, D. J.
2008-01-01
Recent observational studies have confirmed the existence of a robust statistical relationship between lightning flash rates and the amount of large precipitating ice hydrometeors aloft in storms. This relationship is exploited, in conjunction with the capabilities of cloud-resolving forecast models such as WRF, to forecast explicitly the threat of lightning from convective storms using selected output fields from the model forecasts. The simulated vertical flux of graupel at -15C and the shape of the simulated reflectivity profile are tested in this study as proxies for charge separation processes and their associated lightning risk. Our lightning forecast method differs from others in that it is entirely based on high-resolution simulation output, without reliance on any climatological data. short [6-8 h) simulations are conducted for a number of case studies for which three-dmmensional lightning validation data from the North Alabama Lightning Mapping Array are available. Experiments indicate that initialization of the WRF model on a 2 km grid using Eta boundary conditions, Doppler radar radial velocity fields, and METAR and ACARS data y&eld satisfactory simulations. __nalyses of the lightning threat fields suggests that both the graupel flux and reflectivity profile approaches, when properly calibrated, can yield reasonable lightning threat forecasts, although an ensemble approach is probably desirable in order to reduce the tendency for misplacement of modeled storms to hurt the accuracy of the forecasts. Our lightning threat forecasts are also compared to other more traditional means of forecasting thunderstorms, such as those based on inspection of the convective available potential energy field.
Striving for group agency: threat to personal control increases the attractiveness of agentic groups
Stollberg, Janine; Fritsche, Immo; Bäcker, Anna
2015-01-01
When their sense of personal control is threatened people try to restore perceived control through the social self. We propose that it is the perceived agency of ingroups that provides the self with a sense of control. In three experiments, we for the first time tested the hypothesis that threat to personal control increases the attractiveness of being part or joining those groups that are perceived as coherent entities engaging in coordinated group goal pursuit (agentic groups) but not of those groups whose agency is perceived to be low. Consistent with this hypothesis we found in Study 1 (N = 93) that threat to personal control increased ingroup identification only with task groups, but not with less agentic types of ingroups that were made salient simultaneously. Furthermore, personal control threat increased a sense of collective control and support within the task group, mediated through task-group identification (indirect effects). Turning to groups people are not (yet) part of, Study 2 (N = 47) showed that personal control threat increased relative attractiveness ratings of small groups as possible future ingroups only when the relative agency of small groups was perceived to be high. Perceived group homogeneity or social power did not moderate the effect. Study 3 (N = 78) replicated the moderating role of perceived group agency for attractiveness ratings of entitative groups, whereas perceived group status did not moderate the effect. These findings extend previous research on group-based control, showing that perceived agency accounts for group-based responses to threatened control. PMID:26074832
Maxwell, Sean L.; Rhodes, Jonathan R.; Runge, Michael C.; Possingham, Hugh P.; Ng, Chooi Fei; McDonald Madden, Eve
2015-01-01
Conservation decision-makers face a trade-off between spending limited funds on direct management action, or gaining new information in an attempt to improve management performance in the future. Value-of-information analysis can help to resolve this trade-off by evaluating how much management performance could improve if new information was gained. Value-of-information analysis has been used extensively in other disciplines, but there are only a few examples where it has informed conservation planning, none of which have used it to evaluate the financial value of gaining new information. We address this gap by applying value-of-information analysis to the management of a declining koala Phascolarctos cinereuspopulation. Decision-makers responsible for managing this population face uncertainty about survival and fecundity rates, and how habitat cover affects mortality threats. The value of gaining new information about these uncertainties was calculated using a deterministic matrix model of the koala population to find the expected population growth rate if koala mortality threats were optimally managed under alternative model hypotheses, which represented the uncertainties faced by koala managers. Gaining new information about survival and fecundity rates and the effect of habitat cover on mortality threats will do little to improve koala management. Across a range of management budgets, no more than 1·7% of the budget should be spent on resolving these uncertainties. The value of information was low because optimal management decisions were not sensitive to the uncertainties we considered. Decisions were instead driven by a substantial difference in the cost efficiency of management actions. The value of information was up to forty times higher when the cost efficiencies of different koala management actions were similar. Synthesis and applications. This study evaluates the ecological and financial benefits of gaining new information to inform a conservation problem. We also theoretically demonstrate that the value of reducing uncertainty is highest when it is not clear which management action is the most cost efficient. This study will help expand the use of value-of-information analyses in conservation by providing a cost efficiency metric by which to evaluate research or monitoring.
Stereotype threat and racial differences in citizens' experiences of police encounters.
Najdowski, Cynthia J; Bottoms, Bette L; Goff, Phillip Atiba
2015-10-01
We conducted 2 studies to investigate how cultural stereotypes that depict Blacks as criminals affect the way Blacks experience encounters with police officers, expecting that such encounters induce Blacks to feel stereotype threat (i.e., concern about being judged and treated unfairly by police because of the stereotype). In Study 1, we asked Black and White participants to report how they feel when interacting with police officers in general. As predicted, Blacks, but not Whites, reported concern that police officers stereotype them as criminals simply because of their race. In addition, this effect was found for Black men but not Black women. In Study 2, we asked Black and White men to imagine a specific police encounter and assessed potential downstream consequences of stereotype threat. Consistent with Study 1, Black but not White men anticipated feeling stereotype threat in the hypothetical police encounter. Further, racial differences in anticipated threat translated into racial differences in anticipated anxiety, self-regulatory efforts, and behavior that is commonly perceived as suspicious by police officers. By demonstrating that Blacks might expect to be judged and treated unfairly by police because of the negative stereotype of Black criminality, this research extends stereotype threat theory to the new domain of criminal justice encounters. It also has practical implications for understanding how the stereotype could ironically contribute to bias-based policing and racial disparities in the justice system. (c) 2015 APA, all rights reserved).
Conventional and New Ways of Governing Forest Threats: A Study of Stakeholder Coherence in Sweden.
Eriksson, Louise
2018-01-01
Based on a framework for analyzing stakeholder coherence horizontally and vertically, the present study examined the governance of forest threats in Sweden. Opinions of forest risk governance in stakeholder groups with and without a connection to private forestry were compared (n = 2496) and the opinions were analyzed in relation to current governance practices. More specifically, forest threat appraisals, trust in the Swedish Forest Agency (SFA), and the acceptability of forest risk policy measures directed at private forest owners were assessed. Results revealed an overall coherence between different stakeholders in this context. However, the groups differed in, for example, the acceptability of the hypothetical regulative measure aiming to reduce damages threatening the forest long-term (e.g., climate change). Furthermore, an extensive use of advice for a fee may challenge particularly the internal, but also the external, legitimacy of forest risk governance. The forest owner stakeholder group showed lower threat appraisals when evaluating threat to one's own forest rather than to the Swedish forest, except regarding browsing by animals. Regulations were not disapproved of in any of the stakeholder groups, although the forest owner group generally displayed higher acceptability of encouraging measures compared to the general public. Trust in the SFA was furthermore confirmed as an important driver of policy acceptability, and higher threat appraisals of novel threats, such as climate change and fire, resulted in a higher acceptability of measures less central or new in this context. The value of analyzing stakeholder coherence for natural resource management and governance is discussed.
Conventional and New Ways of Governing Forest Threats: A Study of Stakeholder Coherence in Sweden
NASA Astrophysics Data System (ADS)
Eriksson, Louise
2018-01-01
Based on a framework for analyzing stakeholder coherence horizontally and vertically, the present study examined the governance of forest threats in Sweden. Opinions of forest risk governance in stakeholder groups with and without a connection to private forestry were compared ( n = 2496) and the opinions were analyzed in relation to current governance practices. More specifically, forest threat appraisals, trust in the Swedish Forest Agency (SFA), and the acceptability of forest risk policy measures directed at private forest owners were assessed. Results revealed an overall coherence between different stakeholders in this context. However, the groups differed in, for example, the acceptability of the hypothetical regulative measure aiming to reduce damages threatening the forest long-term (e.g., climate change). Furthermore, an extensive use of advice for a fee may challenge particularly the internal, but also the external, legitimacy of forest risk governance. The forest owner stakeholder group showed lower threat appraisals when evaluating threat to one's own forest rather than to the Swedish forest, except regarding browsing by animals. Regulations were not disapproved of in any of the stakeholder groups, although the forest owner group generally displayed higher acceptability of encouraging measures compared to the general public. Trust in the SFA was furthermore confirmed as an important driver of policy acceptability, and higher threat appraisals of novel threats, such as climate change and fire, resulted in a higher acceptability of measures less central or new in this context. The value of analyzing stakeholder coherence for natural resource management and governance is discussed.
Analyzing the threat of unmanned aerial vehicles (UAV) to nuclear facilities
Solodov, Alexander; Williams, Adam; Al Hanaei, Sara; ...
2017-04-18
Unmanned aerial vehicles (UAV) are among the major growing technologies that have many beneficial applications, yet they can also pose a significant threat. Recently, several incidents occurred with UAVs violating privacy of the public and security of sensitive facilities, including several nuclear power plants in France. The threat of UAVs to the security of nuclear facilities is of great importance and is the focus of this work. This paper presents an overview of UAV technology and classification, as well as its applications and potential threats. We show several examples of recent security incidents involving UAVs in France, USA, and Unitedmore » Arab Emirates. Further, the potential threats to nuclear facilities and measures to prevent them are evaluated. The importance of measures for detection, delay, and response (neutralization) of UAVs at nuclear facilities are discussed. An overview of existing technologies along with their strength and weaknesses are shown. Finally, the results of a gap analysis in existing approaches and technologies is presented in the form of potential technological and procedural areas for research and development. Furthermore based on this analysis, directions for future work in the field can be devised and prioritized.« less
Quantifying killing of orangutans and human-orangutan conflict in Kalimantan, Indonesia.
Meijaard, Erik; Buchori, Damayanti; Hadiprakarsa, Yokyok; Utami-Atmoko, Sri Suci; Nurcahyo, Anton; Tjiu, Albertus; Prasetyo, Didik; Nardiyono; Christie, Lenny; Ancrenaz, Marc; Abadi, Firman; Antoni, I Nyoman Gede; Armayadi, Dedy; Dinato, Adi; Ella; Gumelar, Pajar; Indrawan, Tito P; Kussaritano; Munajat, Cecep; Priyono, C Wawan Puji; Purwanto, Yadi; Puspitasari, Dewi; Putra, M Syukur Wahyu; Rahmat, Abdi; Ramadani, Harri; Sammy, Jim; Siswanto, Dedi; Syamsuri, Muhammad; Andayani, Noviar; Wu, Huanhuan; Wells, Jessie Anne; Mengersen, Kerrie
2011-01-01
Human-orangutan conflict and hunting are thought to pose a serious threat to orangutan existence in Kalimantan, the Indonesian part of Borneo. No data existed prior to the present study to substantiate these threats. We investigated the rates, spatial distribution and causes of conflict and hunting through an interview-based survey in the orangutan's range in Kalimantan, Indonesia. Between April 2008 and September 2009, we interviewed 6983 respondents in 687 villages to obtain socio-economic information, assess knowledge of local wildlife in general and orangutan encounters specifically, and to query respondents about their knowledge on orangutan conflicts and killing, and relevant laws. This survey revealed estimated killing rates of between 750 and 1800 animals killed in the last year, and between 1950 and 3100 animals killed per year on average within the lifetime of the survey respondents. These killing rates are higher than previously thought and are high enough to pose a serious threat to the continued existence of orangutans in Kalimantan. Importantly, the study contributes to our understanding of the spatial variation in threats, and the underlying causes of those threats, which can be used to facilitate the development of targeted conservation management.
Quantifying Killing of Orangutans and Human-Orangutan Conflict in Kalimantan, Indonesia
Meijaard, Erik; Buchori, Damayanti; Hadiprakarsa, Yokyok; Utami-Atmoko, Sri Suci; Nurcahyo, Anton; Tjiu, Albertus; Prasetyo, Didik; Nardiyono; Christie, Lenny; Ancrenaz, Marc; Abadi, Firman; Antoni, I Nyoman Gede; Armayadi, Dedy; Dinato, Adi; Ella; Gumelar, Pajar; Indrawan, Tito P.; Kussaritano; Munajat, Cecep; Priyono, C. Wawan Puji; Purwanto, Yadi; Puspitasari, Dewi; Putra, M. Syukur Wahyu; Rahmat, Abdi; Ramadani, Harri; Sammy, Jim; Siswanto, Dedi; Syamsuri, Muhammad; Andayani, Noviar; Wu, Huanhuan; Wells, Jessie Anne; Mengersen, Kerrie
2011-01-01
Human-orangutan conflict and hunting are thought to pose a serious threat to orangutan existence in Kalimantan, the Indonesian part of Borneo. No data existed prior to the present study to substantiate these threats. We investigated the rates, spatial distribution and causes of conflict and hunting through an interview-based survey in the orangutan's range in Kalimantan, Indonesia. Between April 2008 and September 2009, we interviewed 6983 respondents in 687 villages to obtain socio-economic information, assess knowledge of local wildlife in general and orangutan encounters specifically, and to query respondents about their knowledge on orangutan conflicts and killing, and relevant laws. This survey revealed estimated killing rates of between 750 and 1800 animals killed in the last year, and between 1950 and 3100 animals killed per year on average within the lifetime of the survey respondents. These killing rates are higher than previously thought and are high enough to pose a serious threat to the continued existence of orangutans in Kalimantan. Importantly, the study contributes to our understanding of the spatial variation in threats, and the underlying causes of those threats, which can be used to facilitate the development of targeted conservation management. PMID:22096582
Why Don't We Ask? A Complementary Method for Assessing the Status of Great Apes
Meijaard, Erik; Mengersen, Kerrie; Buchori, Damayanti; Nurcahyo, Anton; Ancrenaz, Marc; Wich, Serge; Atmoko, Sri Suci Utami; Tjiu, Albertus; Prasetyo, Didik; Nardiyono; Hadiprakarsa, Yokyok; Christy, Lenny; Wells, Jessie; Albar, Guillaume; Marshall, Andrew J.
2011-01-01
Species conservation is difficult. Threats to species are typically high and immediate. Effective solutions for counteracting these threats, however, require synthesis of high quality evidence, appropriately targeted activities, typically costly implementation, and rapid re-evaluation and adaptation. Conservation management can be ineffective if there is insufficient understanding of the complex ecological, political, socio-cultural, and economic factors that underlie conservation threats. When information about these factors is incomplete, conservation managers may be unaware of the most urgent threats or unable to envision all consequences of potential management strategies. Conservation research aims to address the gap between what is known and what knowledge is needed for effective conservation. Such research, however, generally addresses a subset of the factors that underlie conservation threats, producing a limited, simplistic, and often biased view of complex, real world situations. A combination of approaches is required to provide the complete picture necessary to engage in effective conservation. Orangutan conservation (Pongo spp.) offers an example: standard conservation assessments employ survey methods that focus on ecological variables, but do not usually address the socio-cultural factors that underlie threats. Here, we evaluate a complementary survey method based on interviews of nearly 7,000 people in 687 villages in Kalimantan, Indonesia. We address areas of potential methodological weakness in such surveys, including sampling and questionnaire design, respondent biases, statistical analyses, and sensitivity of resultant inferences. We show that interview-based surveys can provide cost-effective and statistically robust methods to better understand poorly known populations of species that are relatively easily identified by local people. Such surveys provide reasonably reliable estimates of relative presence and relative encounter rates of such species, as well as quantifying the main factors that threaten them. We recommend more extensive use of carefully designed and implemented interview surveys, in conjunction with more traditional field methods. PMID:21483859
WindTalker: A P2P-Based Low-Latency Anonymous Communication Network
NASA Astrophysics Data System (ADS)
Zhang, Jia; Duan, Haixin; Liu, Wu; Wu, Jianping
Compared with traditional static anonymous communication networks, the P2P architecture can provide higher anonymity in communication. However, the P2P architecture also leads to more challenges, such as route, stability, trust and so on. In this paper, we present WindTalker, a P2P-based low-latency anonymous communication network. It is a pure decentralized mix network and can provide low-latency services which help users hide their real identity in communication. In order to ensure stability and reliability, WindTalker imports “seed nodes” to help a peer join in the P2P network and the peer nodes can use gossip-based protocol to exchange active information. Moreover, WindTalker uses layer encryption to ensure the information of relayed messages cannot be leaked. In addition, malicious nodes in the network are the major threat to anonymity of P2P anonymous communication, so WindTalker imports a trust mechanism which can help the P2P network exclude malicious nodes and optimize the strategy of peer discovery, tunnel construction, and relaying etc. in anonymous communications. We deploy peer nodes of WindTalker in our campus network to test reliability and analyze anonymity in theory. The network measurement and simulation analysis shows that WindTalker can provide low-latency and reliable anonymous communication services.
Motion-based threat detection using microrods: experiments and numerical simulations.
Ezhilan, Barath; Gao, Wei; Pei, Allen; Rozen, Isaac; Dong, Renfeng; Jurado-Sanchez, Beatriz; Wang, Joseph; Saintillan, David
2015-05-07
Motion-based chemical sensing using microscale particles has attracted considerable recent attention. In this paper, we report on new experiments and Brownian dynamics simulations that cast light on the dynamics of both passive and active microrods (gold wires and gold-platinum micromotors) in a silver ion gradient. We demonstrate that such microrods can be used for threat detection in the form of a silver ion source, allowing for the determination of both the location of the source and concentration of silver. This threat detection strategy relies on the diffusiophoretic motion of both passive and active microrods in the ionic gradient and on the speed acceleration of the Au-Pt micromotors in the presence of silver ions. A Langevin model describing the microrod dynamics and accounting for all of these effects is presented, and key model parameters are extracted from the experimental data, thereby providing a reliable estimate for the full spatiotemporal distribution of the silver ions in the vicinity of the source.
Hunger, Jeffrey M.; Major, Brenda; Blodorn, Alison; Miller, Carol T.
2015-01-01
Weight stigma is pervasive, and a number of scholars argue that this profound stigma contributes to the negative effects of weight on psychological and physical health. Some lay individuals and health professionals assume that stigmatizing weight can actually motivate healthier behaviors and promote weight loss. However, as we review, weight stigma is consistently associated with poorer mental and physical health outcomes. In this article we propose a social identity threat model elucidating how weight stigma contributes to weight gain and poorer mental and physical health among overweight individuals. We propose that weight-based social identity threat increases physiological stress, undermines self-regulation, compromises psychological health, and increases the motivation to avoid stigmatizing domains (e.g., the gym) and escape the stigma by engaging in unhealthy weight loss behaviors. Given the prevalence of overweight and obesity in the US, weight stigma thus has the potential to undermine the health and wellbeing of millions of Americans. PMID:29225670
Schepens, Stacey L; Panzer, Victoria; Goldberg, Allon
2011-01-01
We attempted to determine whether multimedia fall prevention education using different instructional strategies increases older adults' knowledge of fall threats and their fall prevention behaviors. Fifty-three community-dwelling older adults were randomized to iwo educational groups or a control group. Multimedia-based educational interventions to increase fall threats knowledge and encourage fall prevention behaviors had two tailoring strategies: (1) improve content realism for individual learners (authenticity group) and (2) highlight program goals and benefits while using participants' content selections (motivation group). Knowledge was measured at baseline and 1-mo follow-up. Participants recorded prevention behaviors for 1 mo. Intervention group participants showed greater knowledge gains and posttest knowledge than did control group participants. The motivation group engaged in more prevention behaviors over 1 mo than did the other groups. Tailoring fall prevention education by addressing authenticity and motivation successfully improved fall threats knowledge. Combining motivational strategies with multimedia education increased the effectiveness of the intervention in encouraging fall prevention behaviors.