Science.gov

Sample records for design basis threat

  1. The neural basis of intergroup threat effect on social attention

    PubMed Central

    Chen, Yujie; Zhao, Yufang; Song, Hongwen; Guan, Lili; Wu, Xin

    2017-01-01

    Previous gaze-cuing studies found that intergroup threat is one of the modulators of gaze cuing. These findings indicate that intergroup threat would gate social attention by activating a network resembling that is thought to be involved in drawing or/and holding attention. The present study tested this hypothesis using a gaze-cuing task in which a particular in-group participants observed threatening out-group and nonthreatening out-group gazes, while undergoing functional magnetic resonance imaging. As expected, greater gaze cuing effect only emerged for threatening out-group when the in-group participants only felt inergroup threat from that out-group. Behaviorally, we found intergroup threatening out-group gazes did not draw attention faster than nonthreatening in-group gazes does. However, participants took more time to suppress the influence of the gaze direction of threatening out-group gazes, compared to nonthreatening in-group gazes, in the incongruent condition, which means intergroup threatening gaze holds attention longer than nonthreatening gaze does. Imaging results demonstrated that threatening cues recruited a fronto-parietal network, previously implicated in holding attention and execution functions. Our results, therefore, suggest that the mechanisms underpinning gaze cuing evolved to be sensitive to intergroup threatening stimuli, possibly because it is hard to disengage from such intergroup threatening cues once they are detected. PMID:28120864

  2. Experimental Design and Some Threats to Experimental Validity: A Primer

    ERIC Educational Resources Information Center

    Skidmore, Susan

    2008-01-01

    Experimental designs are distinguished as the best method to respond to questions involving causality. The purpose of the present paper is to explicate the logic of experimental design and why it is so vital to questions that demand causal conclusions. In addition, types of internal and external validity threats are discussed. To emphasize the…

  3. PRELIMINARY SELECTION OF MGR DESIGN BASIS EVENTS

    SciTech Connect

    J.A. Kappes

    1999-09-16

    The purpose of this analysis is to identify the preliminary design basis events (DBEs) for consideration in the design of the Monitored Geologic Repository (MGR). For external events and natural phenomena (e.g., earthquake), the objective is to identify those initiating events that the MGR will be designed to withstand. Design criteria will ensure that radiological release scenarios resulting from these initiating events are beyond design basis (i.e., have a scenario frequency less than once per million years). For internal (i.e., human-induced and random equipment failures) events, the objective is to identify credible event sequences that result in bounding radiological releases. These sequences will be used to establish the design basis criteria for MGR structures, systems, and components (SSCs) design basis criteria in order to prevent or mitigate radiological releases. The safety strategy presented in this analysis for preventing or mitigating DBEs is based on the preclosure safety strategy outlined in ''Strategy to Mitigate Preclosure Offsite Exposure'' (CRWMS M&O 1998f). DBE analysis is necessary to provide feedback and requirements to the design process, and also to demonstrate compliance with proposed 10 CFR 63 (Dyer 1999b) requirements. DBE analysis is also required to identify and classify the SSCs that are important to safety (ITS).

  4. Pattern-Based Design of Insider Threat Programs

    DTIC Science & Technology

    2014-12-01

    Insider Threat Mitigation Pattern Language 2 3 Using the Insider Threat Mitigation Pattern...Language 5 4 Conclusion 10 Appendix A: Simple Insider Threat Mitigation Pattern Domain Ontology 11 Appendix B: Insider Threat Mitigation Pattern...Thumbnail Sketches 13 References/Bibliography 18 CMU/SEI-2014-TN-024 | ii List of Figures Figure 1: Preliminary Insider Threat Mitigation

  5. Performance-Based Design for Arson Threats: Policy Analysis of the Physical Security for Federal Facilities Standard

    DTIC Science & Technology

    2013-09-01

    deaths are attributable to smoke inhalation alone, while the combined effect of smoke inhalation and burns is about 74%. Most fire deaths (85...on developing permanent countermeasures to 31 diverse threat scenarios described in the Design-Basis Threat. To assess the effectiveness of the...federal property protection from arson attacks. Computerized fire effects modeling is used to compare outcomes in non-military and non-postal federal

  6. System Design and the Safety Basis

    SciTech Connect

    Ellingson, Darrel

    2008-05-06

    The objective of this paper is to present the Bechtel Jacobs Company, LLC (BJC) Lessons Learned for system design as it relates to safety basis documentation. BJC has had to reconcile incomplete or outdated system description information with current facility safety basis for a number of situations in recent months. This paper has relevance in multiple topical areas including documented safety analysis, decontamination & decommissioning (D&D), safety basis (SB) implementation, safety and design integration, potential inadequacy of the safety analysis (PISA), technical safety requirements (TSR), and unreviewed safety questions. BJC learned that nuclear safety compliance relies on adequate and well documented system design information. A number of PIS As and TSR violations occurred due to inadequate or erroneous system design information. As a corrective action, BJC assessed the occurrences caused by systems design-safety basis interface problems. Safety systems reviewed included the Molten Salt Reactor Experiment (MSRE) Fluorination System, K-1065 fire alarm system, and the K-25 Radiation Criticality Accident Alarm System. The conclusion was that an inadequate knowledge of system design could result in continuous non-compliance issues relating to nuclear safety. This was especially true with older facilities that lacked current as-built drawings coupled with the loss of 'historical knowledge' as personnel retired or moved on in their careers. Walkdown of systems and the updating of drawings are imperative for nuclear safety compliance. System design integration with safety basis has relevance in the Department of Energy (DOE) complex. This paper presents the BJC Lessons Learned in this area. It will be of benefit to DOE contractors that manage and operate an aging population of nuclear facilities.

  7. Configuration management after design basis reconstitution

    SciTech Connect

    Purcell, J.J. ); Livingston, B.R. )

    1991-01-01

    Over the last few years, Fort Calhoun station (FCS) has implemented a number of programs to enhance plant operability and readiness. The design basis document (DBD) reconstitution project was the cornerstone of this effort. Vendor manual upgrade, operating procedures upgrade, plant equipment data-base verification, equipment labeling, and warehousing improvements were also implemented as part of this improvement program. With the completion of these programs, plant documentation was current to the baselines established by each program, and a configuration management program (CMP) was established to maintain this level of accuracy throughout the remaining life of FCS. Change control throughout the organization has been reviewed and upgraded to ensure that all changes are evaluated for impact to the design bases.

  8. Factors influencing IUCN threat levels to orchids across Europe on the basis of national red lists.

    PubMed

    Kull, Tiiu; Selgis, Ulvi; Peciña, Miguel Villoslada; Metsare, Mirjam; Ilves, Aigi; Tali, Kadri; Sepp, Kalev; Kull, Kalevi; Shefferson, Richard P

    2016-09-01

    The red list has become a ubiquitous tool in the conservation of species. We analyzed contemporary trends in the threat levels of European orchids, in total 166 species characterized in 27 national red lists, in relation to their reproductive biology and growth form, distribution area, and land cover where they occur. We found that species in central Europe are more threatened than those in the northern, southern, or Atlantic parts of Europe, while species were least threatened in southern Europe. Nectarless and tuberous species are significantly more threatened than nectariferous and rhizomatous taxa. Land cover (ratios of artificial land cover, area of pastures and grasslands, forests and inland wetlands) also significantly impacted the threat level. A bigger share of artificial land cover increases threat, and a bigger share of pasture and grassland lowers it. Unexpectedly, a bigger share of inland wetland area in a country increased threat level, which we believe may be due to the threatened nature of wetlands themselves relative to other natural land cover types. Finally, species occurring in multiple countries are on average less threatened. We believe that large-scale analysis of current IUCN national red lists as based on their specific categories and criteria may particularly inform the development of coordinated regional or larger-scale management strategies. In this case, we advocate for a coordinated EU protection and restoration strategy particularly aimed at central European orchids and those occurring in wetland area.

  9. 10 CFR 72.92 - Design basis external natural events.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Design basis external natural events. 72.92 Section 72.92... Evaluation Factors § 72.92 Design basis external natural events. (a) Natural phenomena that may exist or that... must be adopted for evaluating the design basis external natural events based on the characteristics...

  10. 10 CFR 72.92 - Design basis external natural events.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Design basis external natural events. 72.92 Section 72.92... Evaluation Factors § 72.92 Design basis external natural events. (a) Natural phenomena that may exist or that... must be adopted for evaluating the design basis external natural events based on the characteristics...

  11. 10 CFR 72.92 - Design basis external natural events.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Design basis external natural events. 72.92 Section 72.92... Evaluation Factors § 72.92 Design basis external natural events. (a) Natural phenomena that may exist or that... must be adopted for evaluating the design basis external natural events based on the characteristics...

  12. 10 CFR 72.92 - Design basis external natural events.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Design basis external natural events. 72.92 Section 72.92... Evaluation Factors § 72.92 Design basis external natural events. (a) Natural phenomena that may exist or that... must be adopted for evaluating the design basis external natural events based on the characteristics...

  13. 10 CFR 72.92 - Design basis external natural events.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Design basis external natural events. 72.92 Section 72.92... Evaluation Factors § 72.92 Design basis external natural events. (a) Natural phenomena that may exist or that... must be adopted for evaluating the design basis external natural events based on the characteristics...

  14. System requirements and design description for the document basis database interface (DocBasis)

    SciTech Connect

    Lehman, W.J.

    1997-09-30

    This document describes system requirements and the design description for the Document Basis Database Interface (DocBasis). The DocBasis application is used to manage procedures used within the tank farms. The application maintains information in a small database to track the document basis for a procedure, as well as the current version/modification level and the basis for the procedure. The basis for each procedure is substantiated by Administrative, Technical, Procedural, and Regulatory requirements. The DocBasis user interface was developed by Science Applications International Corporation (SAIC).

  15. Design basis for the NRC Operations Center

    SciTech Connect

    Lindell, M.K.; Wise, J.A.; Griffin, B.N.; Desrosiers, A.E.; Meitzler, W.D.

    1983-05-01

    This report documents the development of a design for a new NRC Operations Center (NRCOC). The project was conducted in two phases: organizational analysis and facility design. In order to control the amount of traffic, congestion and noise within the facility, it is recommended that information flow in the new NRCOC be accomplished by means of an electronic Status Information Management System. Functional requirements and a conceptual design for this system are described. An idealized architectural design and a detailed design program are presented that provide the appropriate amount of space for operations, equipment and circulation within team areas. The overall layout provides controlled access to the facility and, through the use of a zoning concept, provides each team within the NRCOC the appropriate balance of ready access and privacy determined from the organizational analyses conducted during the initial phase of the project.

  16. Science Underpinning TBC Design to Overcome the CMAS Threat to Progress in Gas Turbine Technology

    DTIC Science & Technology

    2015-09-30

    Science Underpinning TBC Design to Overcome the CMAS Threat to Progress in Gas Turbine Technology Sb. GRANT NUMBER NOOO 14-08-1-0522 Sc. PROGRAM ELEMENT...degradation in current and future gas turbine engines with expected material temperatures :::=:: 1300°C. The overarching goal was to elucidate the...Z39.1t Final Report on ONR Grant No. N00014-08-1-0522 SCIENCE UNDERPINNING TBC DESIGN TO OVERCOME THE CMAS THREAT TO PROGRESS IN GAS TURBINE

  17. A Basis for Determining the Adequacy of Evaluation Designs

    ERIC Educational Resources Information Center

    Sanders, James R.; Nafziger, Dean N.

    2011-01-01

    The purpose of this paper is to provide a basis for judging the adequacy of evaluation plans or, as they are commonly called, evaluation designs. The authors assume that using the procedures suggested in this paper to determine the adequacy of evaluation designs in advance of actually conducting evaluations will lead to better evaluation designs,…

  18. Experimental Control and Threats to Internal Validity of Concurrent and Nonconcurrent Multiple Baseline Designs

    ERIC Educational Resources Information Center

    Christ, Theodore J.

    2007-01-01

    Single-case research designs are often applied within school psychology. This article provides a critical review of the scientific merit of both concurrent and nonconcurrent multiple baseline (MB) designs, relative to their capacity to assess threats of internal validity and establish experimental control. Distinctions are established between AB…

  19. The Functional Requirements and Design Basis for Information Barriers

    SciTech Connect

    Fuller, James L.

    2012-05-01

    This report summarizes the results of the Information Barrier Working Group workshop held at Sandia National Laboratory in Albuquerque, NM, February 2-4, 1999. This workshop was convened to establish the functional requirements associated with warhead radiation signature information barriers, to identify the major design elements of any such system or approach, and to identify a design basis for each of these major elements. Such information forms the general design basis to be used in designing, fabricating, and evaluating the complete integrated systems developed for specific purposes.

  20. F-106 data summary and model results relative to threat criteria and protection design analysis

    NASA Technical Reports Server (NTRS)

    Pitts, F. L.; Finelli, G. B.; Perala, R. A.; Rudolph, T. H.

    1986-01-01

    The NASA F-106 has acquired considerable data on the rates-of-change of electromagnetic parameters on the aircraft surface during 690 direct lightning strikes while penetrating thunderstorms at altitudes ranging from 15,000 to 40,000 feet. These in-situ measurements have provided the basis for the first statistical quantification of the lightning electromagnetic threat to aircrat appropriate for determining lightning indirect effects on aircraft. The data are presently being used in updating previous lightning criteria and standards developed over the years from ground-based measurements. The new lightning standards will, therefore, be the first which reflect actual aircraft responses measured at flight altitudes. The modeling technique developed to interpret and understand the direct strike electromagnetic data acquired on the F-106 provides a means to model the interaction of the lightning channel with the F-106. The reasonable results obtained with the model, compared to measured responses, yield confidence that the model may be credibly applied to other aircraft types and uses in the prediction of internal coupling effects in the design of lightning protection for new aircraft.

  1. SAFETY BASIS DESIGN DEVELOPMENT CHALLENGES IMECE2007-42747

    SciTech Connect

    RYAN GW

    2007-09-24

    'Designing in Safety' is a desired part of the development of any new potentially hazardous system, process, or facility. It is a required part of nuclear safety activities as specified in the U.S. Department of Energy (DOE) Order 420.B, Facility Safety. This order addresses the design of nuclear related facilities developed under federal regulation IOCFR830, Nuclear Safety Management. IOCFR830 requires that safety basis documentation be provided to identify how nuclear safety is being adequately addressed as a condition for system operation (e.g., the safety basis). To support the development of the safety basis, a safety analysis is performed. Although the concept of developing a design that addresses 'Safety is simple, the execution can be complex and challenging. This paper addresses those complexities and challenges for the design activity of a system to treat sludge, a corrosion product of spent nuclear fuel, at DOE's Hanford Site in Washington State. The system being developed is referred to as the Sludge Treatment Project (STP). This paper describes the portion of the safety analysis that addresses the selection of design basis events using the experience gained from the STP and the development of design requirements for safety features associated with those events. Specifically, the paper describes the safety design process and the application of the process for two types of potential design basis accidents associated with the operation of the system, (1) flashing spray leaks and (2) splash and splatter leaks. Also presented are the technical challenges that are being addressed to develop effective safety features to deal with these design basis accidents.

  2. `Intelligent Design' Poses ContinuedThreat to Science

    NASA Astrophysics Data System (ADS)

    Geissman, John W.

    2006-01-01

    Science education in the United States has been the subject of more than usual attention, especially since 1 August 2005 when President George W. Bush stoked the fire by responding to a reporter's question about the teaching of `intelligent design' (ID) in science classrooms by saying that ``both sides ought to be properly taught. . . so people can understand what the debate is about.'' Prior to the 20 December 2005 ruling against the teaching of ID in public schools, by U.S. District Judge John E. Jones III in the Pennsylvania case Kitzmiller v. Dover Area School District, anti-evolutionists and ID proponents seemed to be enjoying a new momentum in the aftermath of President Bush's statements. William Dembski, senior fellow with the Discovery Institute's Center for the Renewal of Science and Culture in Seattle, Wash., a group that supports intelligent design, wrote on 4 August 2005 at http://www.designinference.com that President Bush ``is to be commended for his courage, wisdom, and foresight'' for supporting the teaching of ID alongside evolution.

  3. A Design Basis for Spacecraft Cabin Trace Contaminant Control

    NASA Technical Reports Server (NTRS)

    Perry, Jay L.

    2009-01-01

    Successful trace chemical contamination control is one of the components necessary for achieving good cabin atmospheric quality. While employing seemingly simple process technologies, sizing the active contamination control equipment must employ a reliable design basis for the trace chemical load in the cabin atmosphere. A simplified design basis that draws on experience gained from the International Space Station program is presented. The trace chemical contamination control design load refines generation source magnitudes and includes key chemical functional groups representing both engineering and toxicology challenges.

  4. Solar Power Tower Design Basis Document, Revision 0

    SciTech Connect

    ZAVOICO,ALEXIS B.

    2001-07-01

    This report contains the design basis for a generic molten-salt solar power tower. A solar power tower uses a field of tracking mirrors (heliostats) that redirect sunlight on to a centrally located receiver mounted on top a tower, which absorbs the concentrated sunlight. Molten nitrate salt, pumped from a tank at ground level, absorbs the sunlight, heating it up to 565 C. The heated salt flows back to ground level into another tank where it is stored, then pumped through a steam generator to produce steam and make electricity. This report establishes a set of criteria upon which the next generation of solar power towers will be designed. The report contains detailed criteria for each of the major systems: Collector System, Receiver System, Thermal Storage System, Steam Generator System, Master Control System, and Electric Heat Tracing System. The Electric Power Generation System and Balance of Plant discussions are limited to interface requirements. This design basis builds on the extensive experience gained from the Solar Two project and includes potential design innovations that will improve reliability and lower technical risk. This design basis document is a living document and contains several areas that require trade-studies and design analysis to fully complete the design basis. Project- and site-specific conditions and requirements will also resolve open To Be Determined issues.

  5. Participatory action research designs in applied disability and rehabilitation science: protecting against threats to social validity.

    PubMed

    Seekins, Tom; White, Glen W

    2013-01-01

    Researchers and disability advocates have been debating consumer involvement in disability and rehabilitation science since at least 1972. Despite the length of this debate, much confusion remains. Consumer involvement may represent a spirit of democracy or even empowerment, but as a tool of science, it is necessary to understand how to judge its application. To realize consumer involvement as a design element in science, researchers need a framework for understanding how it can contribute to the scientific process. The thesis of this article is that a primary scientific function of consumer involvement is to reduce threats to the social validity of research, the extent to which those expected to use or benefit from research products judge them as useful and actually use them. Social validity has traditionally not been treated with the same rigor as concerns for internal and external validity. This article presents a framework that describes 7 threats to social validity and explains how 15 forms of consumer involvement protect against those threats. We also suggest procedures for reporting and reviewing consumer involvement in proposals and manuscripts. This framework offers tools familiar to all scientists for identifying threats to the quality of research, and for judging the effectiveness of strategies for protecting against those threats. It may also enhance the standing of consumer involvement strategies as tools for protecting research quality by organizing them in a way that allows for systematic criticism of their effectiveness and subsequent improvement.

  6. A Simulation Study of Threats to Validity in Quasi-Experimental Designs: Interrelationship between Design, Measurement, and Analysis

    PubMed Central

    Holgado-Tello, Fco. P.; Chacón-Moscoso, Salvador; Sanduvete-Chaves, Susana; Pérez-Gil, José A.

    2016-01-01

    The Campbellian tradition provides a conceptual framework to assess threats to validity. On the other hand, different models of causal analysis have been developed to control estimation biases in different research designs. However, the link between design features, measurement issues, and concrete impact estimation analyses is weak. In order to provide an empirical solution to this problem, we use Structural Equation Modeling (SEM) as a first approximation to operationalize the analytical implications of threats to validity in quasi-experimental designs. Based on the analogies established between the Classical Test Theory (CTT) and causal analysis, we describe an empirical study based on SEM in which range restriction and statistical power have been simulated in two different models: (1) A multistate model in the control condition (pre-test); and (2) A single-trait-multistate model in the control condition (post-test), adding a new mediator latent exogenous (independent) variable that represents a threat to validity. Results show, empirically, how the differences between both the models could be partially or totally attributed to these threats. Therefore, SEM provides a useful tool to analyze the influence of potential threats to validity. PMID:27378991

  7. A Simulation Study of Threats to Validity in Quasi-Experimental Designs: Interrelationship between Design, Measurement, and Analysis.

    PubMed

    Holgado-Tello, Fco P; Chacón-Moscoso, Salvador; Sanduvete-Chaves, Susana; Pérez-Gil, José A

    2016-01-01

    The Campbellian tradition provides a conceptual framework to assess threats to validity. On the other hand, different models of causal analysis have been developed to control estimation biases in different research designs. However, the link between design features, measurement issues, and concrete impact estimation analyses is weak. In order to provide an empirical solution to this problem, we use Structural Equation Modeling (SEM) as a first approximation to operationalize the analytical implications of threats to validity in quasi-experimental designs. Based on the analogies established between the Classical Test Theory (CTT) and causal analysis, we describe an empirical study based on SEM in which range restriction and statistical power have been simulated in two different models: (1) A multistate model in the control condition (pre-test); and (2) A single-trait-multistate model in the control condition (post-test), adding a new mediator latent exogenous (independent) variable that represents a threat to validity. Results show, empirically, how the differences between both the models could be partially or totally attributed to these threats. Therefore, SEM provides a useful tool to analyze the influence of potential threats to validity.

  8. Cold Vacuum Drying (CVD) Facility Design Basis Accident Analysis Documentation

    SciTech Connect

    PIEPHO, M.G.

    1999-10-20

    This document provides the detailed accident analysis to support HNF-3553, Annex B, Spent Nuclear Fuel Project Final Safety Analysis Report, ''Cold Vacuum Drying Facility Final Safety Analysis Report (FSAR).'' All assumptions, parameters and models used to provide the analysis of the design basis accidents are documented to support the conclusions in the FSAR.

  9. Canister Storage Building (CSB) Design Basis Accident Analysis Documentation

    SciTech Connect

    CROWE, R.D.

    1999-09-09

    This document provides the detailed accident analysis to support ''HNF-3553, Spent Nuclear Fuel Project Final Safety, Analysis Report, Annex A,'' ''Canister Storage Building Final Safety Analysis Report.'' All assumptions, parameters, and models used to provide the analysis of the design basis accidents are documented to support the conclusions in the Canister Storage Building Final Safety Analysis Report.

  10. Canister Storage Building (CSB) Design Basis Accident Analysis Documentation

    SciTech Connect

    CROWE, R.D.; PIEPHO, M.G.

    2000-03-23

    This document provided the detailed accident analysis to support HNF-3553, Spent Nuclear Fuel Project Final Safety Analysis Report, Annex A, ''Canister Storage Building Final Safety Analysis Report''. All assumptions, parameters, and models used to provide the analysis of the design basis accidents are documented to support the conclusions in the Canister Storage Building Final Safety Analysis Report.

  11. Canister storage building design basis accident analysis documentation

    SciTech Connect

    KOPELIC, S.D.

    1999-02-25

    This document provides the detailed accident analysis to support HNF-3553, Spent Nuclear Fuel Project Final Safety Analysis Report, Annex A, ''Canister Storage Building Final Safety Analysis Report.'' All assumptions, parameters, and models used to provide the analysis of the design basis accidents are documented to support the conclusions in the Canister Storage Building Final Safety Analysis Report.

  12. Basis for NGNP Reactor Design Down-Selection

    SciTech Connect

    L.E. Demick

    2010-08-01

    The purpose of this paper is to identify the extent of technology development, design and licensing maturity anticipated to be required to credibly identify differences that could make a technical choice practical between the prismatic and pebble bed reactor designs. This paper does not address a business decision based on the economics, business model and resulting business case since these will vary based on the reactor application. The selection of the type of reactor, the module ratings, the number of modules, the configuration of the balance of plant and other design selections will be made on the basis of optimizing the Business Case for the application. These are not decisions that can be made on a generic basis.

  13. Design-Load Basis for LANL Structures, Systems, and Components

    SciTech Connect

    I. Cuesta

    2004-09-01

    This document supports the recommendations in the Los Alamos National Laboratory (LANL) Engineering Standard Manual (ESM), Chapter 5--Structural providing the basis for the loads, analysis procedures, and codes to be used in the ESM. It also provides the justification for eliminating the loads to be considered in design, and evidence that the design basis loads are appropriate and consistent with the graded approach required by the Department of Energy (DOE) Code of Federal Regulation Nuclear Safety Management, 10, Part 830. This document focuses on (1) the primary and secondary natural phenomena hazards listed in DOE-G-420.1-2, Appendix C, (2) additional loads not related to natural phenomena hazards, and (3) the design loads on structures during construction.

  14. Basis for NGNP Reactor Design Down-Selection

    SciTech Connect

    L.E. Demick

    2011-11-01

    The purpose of this paper is to identify the extent of technology development, design and licensing maturity anticipated to be required to credibly identify differences that could make a technical choice practical between the prismatic and pebble bed reactor designs. This paper does not address a business decision based on the economics, business model and resulting business case since these will vary based on the reactor application. The selection of the type of reactor, the module ratings, the number of modules, the configuration of the balance of plant and other design selections will be made on the basis of optimizing the Business Case for the application. These are not decisions that can be made on a generic basis.

  15. The influence of military threats on the design and use of the Royal Naval Hospital Haslar.

    PubMed

    Buxton, P J

    2008-01-01

    The twin demands of the medical and security requirements influenced the original design of RNH Haslar. Over time the structure was altered to accommodate changes in the military threat and these changes can be identified from original plans and the extant structures. The use of spatial analysis, through the use of justified access graphs, can provide insights into the way the building was used and how it influenced the relationships between the staff and the patients.

  16. AN APPROACH TO SAFETY DESIGN BASIS DOCUMENTATION CHANGE CONTROL

    SciTech Connect

    RYAN GW

    2008-05-15

    This paper describes a safety design basis documentation change control process. The process identifies elements that can be used to manage the project/facility configuration during design evolution through the Initiation, Definition, and Execution project phases. The project phases addressed by the process are defined in US Department of Energy (DOE) Order (O) 413.3A, Program and Project Management for the Acquisition of Capital Assets, in support of DOE project Critical Decisions (CD). This approach has been developed for application to two Hanford Site projects in their early CD phases and is considered to be a key element of safety and design integration. As described in the work that has been performed, the purpose of change control is to maintain consistency among design requirements, the physical configuration, related facility documentation, and the nuclear safety basis during the evolution of the design. The process developed (1) ensures an appropriate level of rigor is applied at each project phase and (2) is considered to implement the requirements and guidance provided in DOE-STD-1189-2008, Integration of Safety into the Design Process. Presentation of this work is expected to benefit others in the DOE Complex that may be implementing DOE-STD-1189-2008 or managing nuclear safety documentation in support of projects in-process.

  17. Advances in the physics basis for the European DEMO design

    NASA Astrophysics Data System (ADS)

    Wenninger, R.; Arbeiter, F.; Aubert, J.; Aho-Mantila, L.; Albanese, R.; Ambrosino, R.; Angioni, C.; Artaud, J.-F.; Bernert, M.; Fable, E.; Fasoli, A.; Federici, G.; Garcia, J.; Giruzzi, G.; Jenko, F.; Maget, P.; Mattei, M.; Maviglia, F.; Poli, E.; Ramogida, G.; Reux, C.; Schneider, M.; Sieglin, B.; Villone, F.; Wischmeier, M.; Zohm, H.

    2015-06-01

    In the European fusion roadmap, ITER is followed by a demonstration fusion power reactor (DEMO), for which a conceptual design is under development. This paper reports the first results of a coherent effort to develop the relevant physics knowledge for that (DEMO Physics Basis), carried out by European experts. The program currently includes investigations in the areas of scenario modeling, transport, MHD, heating & current drive, fast particles, plasma wall interaction and disruptions.

  18. The neural basis of self-face recognition after self-concept threat and comparison with important others.

    PubMed

    Guan, Lili; Qi, Mingming; Zhang, Qinglin; Yang, Juan

    2014-01-01

    The implicit positive association (IPA) theory attributed self-face advantage to the IPA with self-concept. Previous behavioral study has found that self-concept threat (SCT) could eliminate the self-advantage in face recognition over familiar-face, without taking levels of facial familiarity into account. The current event-related potential study aimed to investigate whether SCT could eliminate the self-face advantage over stranger-face. Fifteen participants completed a "self-friend" comparison task in which participants identified the face orientation of self-face and friend-face after SCT and non-self-concept threat (NSCT) priming, and a "self-stranger" comparison task was also completed in which participants identified the face orientation of self-face and stranger-face after SCT and NSCT priming. The results showed that the N2 amplitudes were more negative for processing friend-face than self-face after NSCT priming, but there was no significant difference between them after SCT priming. Moreover, the N2 amplitudes were more negative for processing stranger-face than self-face both after SCT priming and after NSCT priming. Furthermore, SCT manipulated the N2 amplitudes of friend-face rather than self-face. Overall, the present study made a supplementary to the current IPA theory and further indicated that SCT would only eliminate this self-face recognition advantage when comparing with important others.

  19. Archaeological data as a basis for repository marker design

    SciTech Connect

    Kaplan, M.F.

    1982-10-01

    This report concerns the development of a marking system for a nuclear waste repository which is very likely to survive for 10,000 years. In order to provide a background on the subject, and for the preliminary design presented in this report, a discussion is presented about the issues involved in human interference with the repository system and the communication of information. A separate chapter summarizes six ancient man-made monuments including: materials, effects of associated textual information on our understanding of the monument, and other features of the ancient monument relevant to marking a repository site. The information presented in the two chapters is used to provide the basis and rationale for a preliminary marker system design presented in a final chapter. 86 refs., 22 figs., 1 tab.

  20. Cold Vacuum Drying facility design basis accident analysis documentation

    SciTech Connect

    CROWE, R.D.

    2000-08-08

    This document provides the detailed accident analysis to support HNF-3553, Annex B, Spent Nuclear Fuel Project Final Safety Analysis Report (FSAR), ''Cold Vacuum Drying Facility Final Safety Analysis Report.'' All assumptions, parameters, and models used to provide the analysis of the design basis accidents are documented to support the conclusions in the FSAR. The calculations in this document address the design basis accidents (DBAs) selected for analysis in HNF-3553, ''Spent Nuclear Fuel Project Final Safety Analysis Report'', Annex B, ''Cold Vacuum Drying Facility Final Safety Analysis Report.'' The objective is to determine the quantity of radioactive particulate available for release at any point during processing at the Cold Vacuum Drying Facility (CVDF) and to use that quantity to determine the amount of radioactive material released during the DBAs. The radioactive material released is used to determine dose consequences to receptors at four locations, and the dose consequences are compared with the appropriate evaluation guidelines and release limits to ascertain the need for preventive and mitigative controls.

  1. A parametric design of ceramic faced composite armor subject to air weapon threats

    NASA Astrophysics Data System (ADS)

    Guo, Y. N.; Sun, Q.

    2015-12-01

    By taking into consideration the two categories of military projectile threats to aircraft structures, an optimal layer configuration of ceramic faced composite armor was designed in this paper. Using numerical simulations and the same layer arrangement of ceramic, UHMWPE, and carbon fiber laminates, a parametric finite element model using LS-DYNA code was built. Several thickness combinations were analyzed in order to determine the final lightest configuration that is capable of supporting a high-speed impact load and HEI blast wave load, which implements a high anti-penetration design for aircraft armor. This configuration can be used to improve the anti-impact ability of aircraft structures as well as achieve a structure/function integration design that considers a lighter weight.

  2. Exploring Operational Safeguards, Safety, and Security by Design to Address Real Time Threats in Nuclear Facilities

    SciTech Connect

    Schanfein, Mark J.; Mladineo, Stephen V.

    2015-07-07

    Over the last few years, significant attention has been paid to both encourage application and provide domestic and international guidance for designing in safeguards and security in new facilities.1,2,3 However, once a facility is operational, safeguards, security, and safety often operate as separate entities that support facility operations. This separation is potentially a serious weakness should insider or outsider threats become a reality.Situations may arise where safeguards detects a possible loss of material in a facility. Will they notify security so they can, for example, check perimeter doors for tampering? Not doing so might give the advantage to an insider who has already, or is about to, move nuclear material outside the facility building. If outsiders break into a facility, the availability of any information to coordinate the facility’s response through segregated alarm stations or a failure to include all available radiation sensors, such as safety’s criticality monitors can give the advantage to the adversary who might know to disable camera systems, but would most likely be unaware of other highly relevant sensors in a nuclear facility.This paper will briefly explore operational safeguards, safety, and security by design (3S) at a high level for domestic and State facilities, identify possible weaknesses, and propose future administrative and technical methods, to strengthen the facility system’s response to threats.

  3. Safety Design Requirements for Active Hazard Mitigation Device (AHMD) Employed to Address Fast and Slow Cook-off Thermal Threats

    DTIC Science & Technology

    2014-12-18

    Hazard Mitigation Device (AHMD) Employed to Address Fast and Slow Cook-off Thermal Threats 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM...environments. 15. SUBJECT TERMS Active Hazard Mitigation Device insensitive munitions fast cook-off slow...DESIGN REQUIREMENTS FOR ACTIVE HAZARD MITIGATION DEVICE (AHMD) EMPLOYED TO ADDRESS FAST AND SLOW COOK-OFF THERMAL THREATS DOD Fuze Engineering

  4. Systems thinking as the basis for an ecological design education

    SciTech Connect

    DeKay, M.

    1996-10-01

    Design education is built on a combination of historical models that have little to do with ecological design or contemporary understandings of whole systems. In order to educate designers for ecologically and socially responsible practice, design schools will need to be radically redesigned in their structure, content, and methods. This paper uses a model from the natural sciences, Systems Theory, as a potential model for a foundational framework of design education. Basic tenets of systems thinking are outlined, along with principles of ecosystem function and organization. A series of fifteen suggested shifts in design education, eight as implications of ecosystem principles and seven derived from principles of ecosystem organization, are proposed.

  5. Towards a Basis for Designing Backwater and Side Channel Restorations

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Design criteria for river channel restoration is becoming highly developed with several handbooks and guidance documents available, despite notable differences among various schools of thought. Basic principles of stable channel design and riverine habitat simulation undergird channel reconstructio...

  6. Severe burn injuries caused by bioethanol-design fireplaces-an overview on recreational fire threats.

    PubMed

    Kraemer, Robert; Knobloch, Karsten; Lorenzen, Johan; Breuing, Karl H; Koennecker, Soeren; Rennekampff, Hans-Oliver; Vogt, Peter M

    2011-01-01

    Commercially available bioethanol-fueled fireplaces have become increasingly popular additions for interior home decoration in Europe and more recently in the United States. These fireplaces are advertised as smokeless, ecologically friendly, and do not require professional installation, formal gas lines, or venting. Although manufacturers and businesses promote their safety, recent presentations of injuries have alerted the authors to the relevant danger bioethanol fireplaces can pose for the incautious user. Are bioethanol fireplaces going to become the future threat in domestic burn accidents beside common barbeque burns? A Medline literature search on barbeque and domestic fireplace accidents was performed to compare and stratify the injury patterns reported and to identify a risk profile for contemporary bioethanol-fueled fireplaces. To exemplify, two representative clinical cases of severe burn accidents caused by bioethanol-fueled fireplaces, both treated in the burn unit of the authors, are being presented. Design fireplaces are being recognized as an increasing source of fuel and fire-related danger in the home. This risk may be underestimated by the uninformed customer, resulting in severe burn injuries. Because bioethanol-fueled fireplaces have become more commonplace, they may overtake barbecue-related injury as the most common domestic burn injury.

  7. Modern Prototyping as a Basis for Industrial Design

    NASA Astrophysics Data System (ADS)

    Chekardovskaya, I. A.; Bakanovskaya, L. N.

    2016-10-01

    The paper presents methodological bases for designing object-oriented processes as applied to industrial design via the targeted activity and system approach to make production efficient for the petroleum industry. Possibilities of introducing scientific advancements into practice have been overviewed.

  8. 10 CFR 72.94 - Design basis external man-induced events.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Design basis external man-induced events. 72.94 Section 72... WASTE Siting Evaluation Factors § 72.94 Design basis external man-induced events. (a) The region must be... ISFSI or MRS. The important potential man-induced events that affect the ISFSI or MRS design must...

  9. 10 CFR 72.94 - Design basis external man-induced events.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Design basis external man-induced events. 72.94 Section 72... WASTE Siting Evaluation Factors § 72.94 Design basis external man-induced events. (a) The region must be... ISFSI or MRS. The important potential man-induced events that affect the ISFSI or MRS design must...

  10. 10 CFR 72.94 - Design basis external man-induced events.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Design basis external man-induced events. 72.94 Section 72... WASTE Siting Evaluation Factors § 72.94 Design basis external man-induced events. (a) The region must be... ISFSI or MRS. The important potential man-induced events that affect the ISFSI or MRS design must...

  11. 10 CFR 72.94 - Design basis external man-induced events.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Design basis external man-induced events. 72.94 Section 72... WASTE Siting Evaluation Factors § 72.94 Design basis external man-induced events. (a) The region must be... ISFSI or MRS. The important potential man-induced events that affect the ISFSI or MRS design must...

  12. 10 CFR 72.94 - Design basis external man-induced events.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Design basis external man-induced events. 72.94 Section 72... WASTE Siting Evaluation Factors § 72.94 Design basis external man-induced events. (a) The region must be... ISFSI or MRS. The important potential man-induced events that affect the ISFSI or MRS design must...

  13. 76 FR 50275 - Guidance for the Assessment of Beyond-Design-Basis Aircraft Impacts

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-12

    ... for Performing Aircraft Impact Assessments for New Plant Designs,'' Revision 8, issued April 2011. The... COMMISSION Guidance for the Assessment of Beyond-Design-Basis Aircraft Impacts AGENCY: Nuclear Regulatory...-Design-Basis Aircraft Impacts.'' This guide describes a method that the staff of NRC considers...

  14. Theoretical Basis for the Design of a DWPF Evacuated Canister

    SciTech Connect

    Routt, K.R.

    2001-09-17

    This report provides the theoretical bases for use of an evacuated canister for draining a glass melter. Design recommendations are also presented to ensure satisfactory performance in future tests of the concept.

  15. Reduced Design Load Basis for Ultimate Blade Loads Estimation in Multidisciplinary Design Optimization Frameworks

    NASA Astrophysics Data System (ADS)

    Pavese, Christian; Tibaldi, Carlo; Larsen, Torben J.; Kim, Taeseong; Thomsen, Kenneth

    2016-09-01

    The aim is to provide a fast and reliable approach to estimate ultimate blade loads for a multidisciplinary design optimization (MDO) framework. For blade design purposes, the standards require a large amount of computationally expensive simulations, which cannot be efficiently run each cost function evaluation of an MDO process. This work describes a method that allows integrating the calculation of the blade load envelopes inside an MDO loop. Ultimate blade load envelopes are calculated for a baseline design and a design obtained after an iteration of an MDO. These envelopes are computed for a full standard design load basis (DLB) and a deterministic reduced DLB. Ultimate loads extracted from the two DLBs with the two blade designs each are compared and analyzed. Although the reduced DLB supplies ultimate loads of different magnitude, the shape of the estimated envelopes are similar to the one computed using the full DLB. This observation is used to propose a scheme that is computationally cheap, and that can be integrated inside an MDO framework, providing a sufficiently reliable estimation of the blade ultimate loading. The latter aspect is of key importance when design variables implementing passive control methodologies are included in the formulation of the optimization problem. An MDO of a 10 MW wind turbine blade is presented as an applied case study to show the efficacy of the reduced DLB concept.

  16. Designing community surveys to provide a basis for noise policy

    NASA Technical Reports Server (NTRS)

    Fields, J. M.

    1980-01-01

    After examining reports from a large number of social surveys, two areas were identified where methodological improvements in the surveys would be especially useful for public policy. The two study areas are: the definition of noise indexes and the assessment of noise impact. Improvements in the designs of surveys are recommended which would increase the validity and reliability of the noise indexes. Changes in interview questions and sample designs are proposed which would enable surveys to provide measures of noise impact which are directly relevant for public policy.

  17. Dialogue as a Basis for the Design of Environmental Pedagogies

    ERIC Educational Resources Information Center

    De Andrade, Daniel Fonseca; Sorrentino, Marcos

    2014-01-01

    Colonizing processes take many forms. Although they are generally related to the use of force, they may also happen through subtler means such as education, and subconsciously, whenever educational proposals are designed to suit a wide variety of contexts. This essay suggests that environmental pedagogies should be based on a dialogical mindset…

  18. Simulant Basis for the Standard High Solids Vessel Design

    SciTech Connect

    Peterson, Reid A.; Fiskum, Sandra K.; Suffield, Sarah R.; Daniel, Richard C.; Gauglitz, Phillip A.; Wells, Beric E.

    2016-09-01

    This document provides the requirements for a test simulant suitable for demonstrating the mixing requirements for the Single High Solids Vessel Design (SHSVD). This simulant has not been evaluated for other purposes such as gas retention and release or erosion. The objective of this work is to provide an underpinning for the simulant properties based on actual waste characterization.

  19. A BASIS FOR MODIFYING THE TANK 12 COMPOSITE SAMPLING DESIGN

    SciTech Connect

    Shine, G.

    2014-11-25

    The SRR sampling campaign to obtain residual solids material from the Savannah River Site (SRS) Tank Farm Tank 12 primary vessel resulted in obtaining appreciable material in all 6 planned source samples from the mound strata but only in 5 of the 6 planned source samples from the floor stratum. Consequently, the design of the compositing scheme presented in the Tank 12 Sampling and Analysis Plan, Pavletich (2014a), must be revised. Analytical Development of SRNL statistically evaluated the sampling uncertainty associated with using various compositing arrays and splitting one or more samples for compositing. The variance of the simple mean of composite sample concentrations is a reasonable standard to investigate the impact of the following sampling options. Composite Sample Design Option (a). Assign only 1 source sample from the floor stratum and 1 source sample from each of the mound strata to each of the composite samples. Each source sample contributes material to only 1 composite sample. Two source samples from the floor stratum would not be used. Composite Sample Design Option (b). Assign 2 source samples from the floor stratum and 1 source sample from each of the mound strata to each composite sample. This infers that one source sample from the floor must be used twice, with 2 composite samples sharing material from this particular source sample. All five source samples from the floor would be used. Composite Sample Design Option (c). Assign 3 source samples from the floor stratum and 1 source sample from each of the mound strata to each composite sample. This infers that several of the source samples from the floor stratum must be assigned to more than one composite sample. All 5 source samples from the floor would be used. Using fewer than 12 source samples will increase the sampling variability over that of the Basic Composite Sample Design, Pavletich (2013). Considering the impact to the variance of the simple mean of the composite sample concentrations

  20. A concise colorimetric and fluorimetric probe for sarin related threats designed via the "covalent-assembly" approach.

    PubMed

    Lei, Zuhai; Yang, Youjun

    2014-05-07

    A turn-on signal from zero background allows sensitive detection of a weak signal and is highly desired. The "covalent-assembly" probe design principle is powerful in this regard. Herein, we report an embodiment of this principle (NA570) for detection of Sarin related threats, based on a phenylogous Vilsmeier-Haack reaction. NA570 bears a concise molecular construct, exhibits a colorimetric and a fluorimetric signal, and has potential for real applications.

  1. 76 FR 63541 - Design-Basis Hurricane and Hurricane Missiles for Nuclear Power Plants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-13

    ...-2010-0288] Design-Basis Hurricane and Hurricane Missiles for Nuclear Power Plants AGENCY: Nuclear... (NRC or the Commission) is issuing a new regulatory guide, (RG) 1.221, ``Design-Basis Hurricane and Hurricane Missiles for Nuclear Power Plants.'' This regulatory guide provides licensees and applicants...

  2. 40 CFR 228.15 - Dumping sites designated on a final basis.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Dumping sites designated on a final basis. 228.15 Section 228.15 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) OCEAN DUMPING CRITERIA FOR THE MANAGEMENT OF DISPOSAL SITES FOR OCEAN DUMPING § 228.15 Dumping sites designated on a final basis. (a)(1) The...

  3. 40 CFR 228.15 - Dumping sites designated on a final basis.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 26 2013-07-01 2013-07-01 false Dumping sites designated on a final basis. 228.15 Section 228.15 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) OCEAN DUMPING CRITERIA FOR THE MANAGEMENT OF DISPOSAL SITES FOR OCEAN DUMPING § 228.15 Dumping sites designated on a final basis. (a)(1) The...

  4. 40 CFR 228.15 - Dumping sites designated on a final basis.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 25 2011-07-01 2011-07-01 false Dumping sites designated on a final basis. 228.15 Section 228.15 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) OCEAN DUMPING CRITERIA FOR THE MANAGEMENT OF DISPOSAL SITES FOR OCEAN DUMPING § 228.15 Dumping sites designated on a final basis. (a)(1) The...

  5. 40 CFR 228.15 - Dumping sites designated on a final basis.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 26 2012-07-01 2011-07-01 true Dumping sites designated on a final basis. 228.15 Section 228.15 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) OCEAN DUMPING CRITERIA FOR THE MANAGEMENT OF DISPOSAL SITES FOR OCEAN DUMPING § 228.15 Dumping sites designated on a final basis. (a)(1) The...

  6. 40 CFR 228.15 - Dumping sites designated on a final basis.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 25 2014-07-01 2014-07-01 false Dumping sites designated on a final basis. 228.15 Section 228.15 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) OCEAN DUMPING CRITERIA FOR THE MANAGEMENT OF DISPOSAL SITES FOR OCEAN DUMPING § 228.15 Dumping sites designated on a final basis. (a)(1) The...

  7. 46 CFR 177.310 - Satisfactory service as a design basis.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Satisfactory service as a design basis. 177.310 Section... (UNDER 100 GROSS TONS) CONSTRUCTION AND ARRANGEMENT Hull Structure § 177.310 Satisfactory service as a design basis. When scantlings for the hull, deckhouse, and frames of the vessel differ from...

  8. Implications of the high-power microwave weapon threat in electronic system design

    NASA Astrophysics Data System (ADS)

    van Keuren, E.; Knighten, J.

    The current status of high-power microwave (HPM) weapon is discussed with particular attention given to threats, sources, and possible protective techniques. Due to the GHz band frequencies involved, HPM is capable of penetrating not only radio front ends, but also the most minute shielding penetrations throughout the equipment.

  9. Laser design basis for the National Ignition Facility

    SciTech Connect

    Hunt, J.T.; Manes, K.R.; Murray, J.R.; Renard, P.A.; Sawicki, R.; Trenholme, J.B.; Williams, W.

    1994-06-01

    Controlled nuclear fusion initiated by highly intense laser beams has been the subject of experiment for many years. The National Ignition Facility (NIF) represents the culmination of design efforts to provide a laser facility that will successfully demonstrate fusion ignition in the laboratory. In this so-called inertial confinement approach, energetic driver beams (laser, X-ray, or charged particle) heat the outer surface of a spherical capsule containing deuterium and tritium (DT) fuel. As the capsule surface explosively evaporates, reaction pressure compresses the DT fuel causing the central core of the fuel to reach extreme density and temperature. When the central temperature is high enough, DT fusion reactions occur. The energy released from these reactions further heats the compressed fuel, and fusion burn propagates outward through the colder regions of the capsule much more rapidly than the inertially confined capsule can expand. The resulting fusion reactions yield many times more energy than was absorbed from the driver beams.

  10. Laser design basis for the National Ignition Facility

    SciTech Connect

    Hunt, J.T.; Manes, K.R.; Murray, J.R.; Renard, P.A.; Sawicki, R.; Trenholme, J.B.; Williams, W.

    1994-11-01

    Controlled nuclear fusion initiated by highly intense laser beams has been the subject of experiment for many years. The National Ignition Facility (NIF) represents the culmination of design efforts to provide a laser facility that will successfully demonstrate fusion ignition in the laboratory. In this so-called inertial confinement approach, energetic driver beams (laser, X ray, or charged particle) heat the outer surface of a spherical capsule containing deuterium and tritium (DT) fuel. As the capsule surface explosively evaporates, reaction pressure compresses the DT fuel causing the central core of the fuel to reach extreme density and temperature. When the central temperature is high enough, DT fusion reactions occur. The energy released from these reactions further heats the compressed fuel, and fusion burn propagates outward through the colder regions of the capsule much more rapidly than the inertially confined capsule can expand. The resulting fusion reactions yield many times more energy than was absorbed from the driver beams.

  11. Breckinridge Project, initial effort. Report II. Breckinridge Project design basis

    SciTech Connect

    1982-01-01

    The Breckinridge Project is a pioneer endeavor involving the engineering, construction, and operation of a commercial facility that will convert 23,000 tons per day of run-of-mine, high-sulfur coal into 50,000 barrels per day of liquid hydrocarbons equivalent to those produced from crude oil. The Initial Effort, now complete, was executed under Cooperative Agreement No. DE-FC05-80OR20717 between the Department of Energy and the Participants, Ashland Synthetic Fuels, Inc., and Airco Energy Company, Inc. The Initial Effort produced a preliminary design, capital estimate, and economic analysis of the commercial plant, as well as a plan for the design, construction, and operation of that plant. The extensive and rigorous attention given to environmental, socioeconomic, safety, and health considerations is indicative of the high priority these issues will continue to receive throughout the life of the project. The Breckinridge Energy Company, a partnership of several major corporations, is being formed to finance, own, and manage the Breckinridge Project. Report II is intended for the reader who is primarily interested in less detailed discussion of the coal liquefaction process and Breckinridge facility than presented in the eleven volumes of Reports IV and V. The overview section describes the project goals and briefly introduces the coal liquefaction process. The report continues with a discussion of the history of the project and the H-COAL process from its concept to the proposed commercialization technology. The report describes the site, the Breckinridge Facility, and concludes with a summary of the eleven reports that contain the deliverable documentation of the Initial Effort or Development Phase of the project.

  12. Design of Multi-Parameter Steerable Functions Using Cascade Basis Reduction

    NASA Technical Reports Server (NTRS)

    Teo, P.; Hel-Or, Y.; Null, Cynthia H. (Technical Monitor)

    1996-01-01

    A new cascade basis reduction method of computing the optimal least-squares set of basis functions steering a given function is presented. The method combines the Lie group-theoretic and the singular value decomposition approaches in such a way that their respective strengths complement each other. Since the Lie group-theoretic approach is used, the set of basis and steering functions computed can be expressed analytically. Because the singular value decomposition method is used, this set of basis and steering functions is optimal in the least-squares sense. Furthermore, the computational complexity in designing basis functions for transformation groups with large numbers of parameters is significantly reduced. The efficiency of the cascade basis reduction method is demonstrated by designing a set of basis functions that steers a Gabor function under the four-parameter linear transformation group.

  13. Structural design and analysis of a mixer pump for beyond-design- basis load

    SciTech Connect

    Rezvani, M.A.; Strehlow, J.P.; Baliga, R.; Kok, S.B.

    1994-03-01

    This paper presents the results of the structural evaluation of a mixer pump for a postulated drop accident. The mixer pump will be installed in a double-shell tank at the Hanford Site, near Richland, Washington. This tank has a 1,000,000-gallon (3,785,000 liter) capacity and is used to store radioactive waste before final disposal. The beyond-design-basis load case presented here is a postmulated drop of the pump during installation or removal. It is assumed that the pump assembly might be dropped approximateely 140 ft (15 m) from a height at which the bottom of the pump assembly is slightly above the top of the access riser to the bottom of the tank. The acceptance criterion for this load case is that the pump assembly shall not penetrate the primary tank liner. To ensure the integrity of the liner, the kinetic energy (developed in the pump drop) must be absorbed by some means to limit the impact force on the tank dome and thereby keep the pump from contacting the bottom of the tank. The limited clearance near the mounting assembly warranted an innovative two-step design of the energy absorbing system to limit the impact force on the tank dome to an acceptable value. This innovative design incorporates two energy absorbers in a unique series arrangement, one with the pump assembly and tile other in the pump pit.

  14. Drain Tank Information for Developing Design Basis of the Preliminary Design - R00

    SciTech Connect

    Ferrada, Juan J

    2011-01-01

    Tokamak Cooling Water System (TCWS) drain tanks (DTs) serve two functions: normal operation and safety operation. Normal DTs are used for regular maintenance operations when draining is necessary. Safety DTs are used to receive the water leaked into the Vacuum Vessel (VV) after an in-vessel loss of cooling accident (LOCA) event. The preliminary design of the DTs shall be based on the information provided by this document. The capacity of the normal DTs is estimated based on the internal volume of in-vessel components [e.g., First Wall/Blanket (FW/BLK) and Divertor (DIV)], Neutral Beam Injector (NBI) components, and TCWS piping, heat exchangers, electric heaters, pump casing, pressurizers, and valves. Water volumes have been updated based on 2004 design information, changes adopted because of approved Project Change Requests (PCRs), and data verification by U.S. ITER. Two tanks will store water from normal draining operations of the FW/BLK and DIV Primary Heat Transfer Systems (PHTSs). One tank will store water from normal draining operations of the NBI PHTS. The capacity of the safety DTs is based on analysis of a design-basis accident:1 a large leak from in-vessel components. There are two safety DTs that will receive water from a VV LOCA event and drainage from the VV, as needed. In addition, there is one sump tank for the DIV that will be used for collecting drain water from the draining and drying processes and specifically for draining the DIV system as the DIV cassettes lines are at a lower elevation than the DT connection point. Information documented in this report must be refined and verified during the preliminary design of the DTs, and there are several aspects to be considered to complete the preliminary design. Input to these design considerations is discussed in this report and includes, but is not limited to, water inventory; operating procedures/maintenance; Failure Modes and Effects Analysis (FMEA); tank layout anddimensions, including design

  15. Drain Tank Information for Developing Design Basis of the Preliminary Design

    SciTech Connect

    Ferrada, Juan J

    2012-02-01

    Tokamak Cooling Water System (TCWS) drain tanks (DTs) serve two functions: normal operation and safety operation. Normal DTs are used for regular maintenance operations when draining is necessary. Safety DTs are used to receive the water leaked into the Vacuum Vessel (VV) after an in-vessel loss of coolant accident (LOCA) event. The preliminary design of the DTs shall be based on the information provided by this document. The capacity of the normal DTs is estimated based on the internal volume of in-vessel components [e.g., First Wall/Blanket (FW/BLK) and Divertor (DIV)]; Neutral Beam Injector (NBI) components; and TCWS piping, heat exchangers, electric heaters, pump casing, pressurizers, and valves. Water volumes have been updated based on 2004-design information, changes adopted because of approved Project Change Requests (PCRs), and data verification by US ITER and AREVA Federal Services, the US ITER A and E Company. Two tanks will store water from normal draining operations of the FW/BLK and DIV Primary Heat Transfer Systems (PHTSs). One tank will store water from normal draining operations of the NBI PHTS. The capacity of the safety DTs is based on analysis of a design basis accident: a large leak from in-vessel components. There are two safety DTs that will receive water from a VV LOCA event and drainage from the VV, as needed. In addition, there is one sump tank for the DIV that will be used for collecting drain water from the draining and drying processes and specifically for draining the DIV system as the DIV cassette lines are at a lower elevation than the DT connection point. Information documented in this report must be refined and verified during the preliminary design of the DTs, and there are several aspects to be considered to complete the preliminary design. Input to these design considerations is discussed in this report and includes, but is not limited to, water inventory; operating procedures/maintenance; Failure Modes and Effects Analysis (FMEA

  16. Threats to Validity in the Design and Conduct of Preclinical Efficacy Studies: A Systematic Review of Guidelines for In Vivo Animal Experiments

    PubMed Central

    Henderson, Valerie C.; Kimmelman, Jonathan; Fergusson, Dean; Grimshaw, Jeremy M.; Hackam, Dan G.

    2013-01-01

    Background The vast majority of medical interventions introduced into clinical development prove unsafe or ineffective. One prominent explanation for the dismal success rate is flawed preclinical research. We conducted a systematic review of preclinical research guidelines and organized recommendations according to the type of validity threat (internal, construct, or external) or programmatic research activity they primarily address. Methods and Findings We searched MEDLINE, Google Scholar, Google, and the EQUATOR Network website for all preclinical guideline documents published up to April 9, 2013 that addressed the design and conduct of in vivo animal experiments aimed at supporting clinical translation. To be eligible, documents had to provide guidance on the design or execution of preclinical animal experiments and represent the aggregated consensus of four or more investigators. Data from included guidelines were independently extracted by two individuals for discrete recommendations on the design and implementation of preclinical efficacy studies. These recommendations were then organized according to the type of validity threat they addressed. A total of 2,029 citations were identified through our search strategy. From these, we identified 26 guidelines that met our eligibility criteria—most of which were directed at neurological or cerebrovascular drug development. Together, these guidelines offered 55 different recommendations. Some of the most common recommendations included performance of a power calculation to determine sample size, randomized treatment allocation, and characterization of disease phenotype in the animal model prior to experimentation. Conclusions By identifying the most recurrent recommendations among preclinical guidelines, we provide a starting point for developing preclinical guidelines in other disease domains. We also provide a basis for the study and evaluation of preclinical research practice. Please see later in the article

  17. Operational Design and Convergent Threats: A Comparison Case Study of Plan Colombia and Afghanistan Aimed to Enhance the Fight Against Narcotic-Funded Insurgencies

    DTIC Science & Technology

    2012-05-17

    Monograph JUN 2011- MAY 2012 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Operational Design and Convergent Threats: A Comparison Case Study of...in the strength government that enforces the law , provides services, and uphold the social contract established by people and their government. The...Operational Design and Convergent Threats: A Comparison Case Study of Plan Colombia and Afghanistan Aimed to Enhance the Fight against Narcotic

  18. The Mixed Waste Management Facility. Design basis integrated operations plan (Title I design)

    SciTech Connect

    1994-12-01

    The Mixed Waste Management Facility (MWMF) will be a fully integrated, pilotscale facility for the demonstration of low-level, organic-matrix mixed waste treatment technologies. It will provide the bridge from bench-scale demonstrated technologies to the deployment and operation of full-scale treatment facilities. The MWMF is a key element in reducing the risk in deployment of effective and environmentally acceptable treatment processes for organic mixed-waste streams. The MWMF will provide the engineering test data, formal evaluation, and operating experience that will be required for these demonstration systems to become accepted by EPA and deployable in waste treatment facilities. The deployment will also demonstrate how to approach the permitting process with the regulatory agencies and how to operate and maintain the processes in a safe manner. This document describes, at a high level, how the facility will be designed and operated to achieve this mission. It frequently refers the reader to additional documentation that provides more detail in specific areas. Effective evaluation of a technology consists of a variety of informal and formal demonstrations involving individual technology systems or subsystems, integrated technology system combinations, or complete integrated treatment trains. Informal demonstrations will typically be used to gather general operating information and to establish a basis for development of formal demonstration plans. Formal demonstrations consist of a specific series of tests that are used to rigorously demonstrate the operation or performance of a specific system configuration.

  19. An algorithm to design finite field multipliers using a self-dual normal basis

    NASA Technical Reports Server (NTRS)

    Wang, C. C.

    1987-01-01

    Finite field multiplication is central in the implementation of some error-correcting coders. Massey and Omura have presented a revolutionary design for multiplication in a finite field. In their design, a normal base is utilized to represent the elements of the field. The concept of using a self-dual normal basis to design the Massey-Omura finite field multiplier is presented. Presented first is an algorithm to locate a self-dual normal basis for GF(2 sup m) for odd m. Then a method to construct the product function for designing the Massey-Omura multiplier is developed. It is shown that the construction of the product function base on a self-dual basis is simpler than that based on an arbitrary normal base.

  20. 77 FR 64564 - Implementation of Regulatory Guide 1.221 on Design-Basis Hurricane and Hurricane Missiles

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-22

    ... COMMISSION Implementation of Regulatory Guide 1.221 on Design-Basis Hurricane and Hurricane Missiles AGENCY....221 on Design-Basis Hurricane and Hurricane Missiles.'' The purpose of this ISG is to supplement the guidance regarding the application of Regulatory Guide 1.221, ``Design-Basis Hurricane and...

  1. 75 FR 54918 - Draft Regulatory Guide, DG-1247, “Design-Basis Hurricane and Hurricane Missiles for Nuclear Power...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-09

    ... COMMISSION Draft Regulatory Guide, DG-1247, ``Design-Basis Hurricane and Hurricane Missiles for Nuclear Power... issuance and availability of Draft Regulatory Guide (DG)--1247, ``Design-Basis Hurricane and Hurricane... permits and licenses. The draft regulatory guide (DG), entitled, ``Design-Basis Hurricane and...

  2. 78 FR 31614 - Implementation of Regulatory Guide 1.221 on Design-Basis Hurricane and Hurricane Missiles

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ....221 on Design-Basis Hurricane and Hurricane Missiles AGENCY: Nuclear Regulatory Commission. ACTION... guidance regarding the application of Regulatory Guide (RG) 1.221, ``Design-Basis Hurricane and Hurricane... ML13015A688 Interim Staff Guidance-024 on Implementation of Regulatory Guide 1.221 on Design-Basis...

  3. Stereotype Threat.

    PubMed

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  4. Design-Basis Flood Estimation for Site Characterization at Nuclear Power Plants in the United States of America

    SciTech Connect

    Prasad, Rajiv; Hibler, Lyle F.; Coleman, Andre M.; Ward, Duane L.

    2011-11-01

    The purpose of this document is to describe approaches and methods for estimation of the design-basis flood at nuclear power plant sites. Chapter 1 defines the design-basis flood and lists the U.S. Nuclear Regulatory Commission's (NRC) regulations that require estimation of the design-basis flood. For comparison, the design-basis flood estimation methods used by other Federal agencies are also described. A brief discussion of the recommendations of the International Atomic Energy Agency for estimation of the design-basis floods in its member States is also included.

  5. Reconfigurable Flight Control Design using a Robust Servo LQR and Radial Basis Function Neural Networks

    NASA Technical Reports Server (NTRS)

    Burken, John J.

    2005-01-01

    This viewgraph presentation reviews the use of a Robust Servo Linear Quadratic Regulator (LQR) and a Radial Basis Function (RBF) Neural Network in reconfigurable flight control designs in adaptation to a aircraft part failure. The method uses a robust LQR servomechanism design with model Reference adaptive control, and RBF neural networks. During the failure the LQR servomechanism behaved well, and using the neural networks improved the tracking.

  6. The power of simplification: Operator interface with the AP1000{sup R} during design-basis and beyond design-basis events

    SciTech Connect

    Williams, M. G.; Mouser, M. R.; Simon, J. B.

    2012-07-01

    The AP1000{sup R} plant is an 1100-MWe pressurized water reactor with passive safety features and extensive plant simplifications that enhance construction, operation, maintenance, safety and cost. The passive safety features are designed to function without safety-grade support systems such as component cooling water, service water, compressed air or HVAC. The AP1000 passive safety features achieve and maintain safe shutdown in case of a design-basis accident for 72 hours without need for operator action, meeting the expectations provided in the European Utility Requirements and the Utility Requirement Document for passive plants. Limited operator actions may be required to maintain safe conditions in the spent fuel pool (SFP) via passive means. This safety approach therefore minimizes the reliance on operator action for accident mitigation, and this paper examines the operator interaction with the Human-System Interface (HSI) as the severity of an accident increases from an anticipated transient to a design basis accident and finally, to a beyond-design-basis event. The AP1000 Control Room design provides an extremely effective environment for addressing the first 72 hours of design-basis events and transients, providing ease of information dissemination and minimal reliance upon operator actions. Symptom-based procedures including Emergency Operating Procedures (EOPs), Abnormal Operating Procedures (AOPs) and Alarm Response Procedures (ARPs) are used to mitigate design basis transients and accidents. Use of the Computerized Procedure System (CPS) aids the operators during mitigation of the event. The CPS provides cues and direction to the operators as the event progresses. If the event becomes progressively worse or lasts longer than 72 hours, and depending upon the nature of failures that may have occurred, minimal operator actions may be required outside of the control room in areas that have been designed to be accessible using components that have been

  7. NDARC-NASA Design and Analysis of Rotorcraft Theoretical Basis and Architecture

    NASA Technical Reports Server (NTRS)

    Johnson, Wayne

    2010-01-01

    The theoretical basis and architecture of the conceptual design tool NDARC (NASA Design and Analysis of Rotorcraft) are described. The principal tasks of NDARC are to design (or size) a rotorcraft to satisfy specified design conditions and missions, and then analyze the performance of the aircraft for a set of off-design missions and point operating conditions. The aircraft consists of a set of components, including fuselage, rotors, wings, tails, and propulsion. For each component, attributes such as performance, drag, and weight can be calculated. The aircraft attributes are obtained from the sum of the component attributes. NDARC provides a capability to model general rotorcraft configurations, and estimate the performance and attributes of advanced rotor concepts. The software has been implemented with low-fidelity models, typical of the conceptual design environment. Incorporation of higher-fidelity models will be possible, as the architecture of the code accommodates configuration flexibility, a hierarchy of models, and ultimately multidisciplinary design, analysis and optimization.

  8. Design, Development, and Innovation of an Interactive Multimedia Training Simulator for Responding to Air Transportation Bomb Threats

    NASA Technical Reports Server (NTRS)

    Chung, Christopher A.; Marwaha, Shweta

    2005-01-01

    This paper describes an interactive multimedia simulator for air transportation bomb threat training. The objective of this project is to improve the air transportation sector s capability to respond to bomb threats received by commercial airports and aircraft. The simulator provides realistic training on receiving and responding to a variety of bomb threats that might not otherwise be possible due to time, cost, or operational constraints. Validation analysis indicates that the use of the simulator resulted in statistically significant increases in individual ability to respond to these types of bomb threats.

  9. An Inventory Designed To Measure the Impact of the Threat of Nuclear War on Adolescents: Dimensions of Fear, Futurelessness, and Powerlessness.

    ERIC Educational Resources Information Center

    Hanley, C. Patricia; Christie, Daniel J.

    This document reports on the history of social and behavioral research studies concerning nuclear war since 1945, highlighting those studies that focused on adolescents and their feelings of fear, hopelessness, powerlessness, and denial. A study, designed to assess the reactions of adolescents in grades six to eight to the threat of nuclear war is…

  10. Comparison of CRBR design-basis events with those of foreign LMFBR plants

    SciTech Connect

    Agrawal, A.K.

    1983-04-01

    As part of the Construction Permit (CP) review of the Clinch River Breeder Reactor Plant (CRBR), the Brookhaven National Laboratory was asked to compare the Design Basis Accidents that are considered in CRBR Preliminary Safety Analysis Report with those of the foreign contemporary plants (PHENIX, SUPER-PHENIX, SNR-300, PFR, and MONJU). A brief introductory review of any special or unusual characteristics of these plants is given. This is followed by discussions of the design basis accidents and their acceptance criteria. In spite of some discrepancies due either to semantics or to licensing decisions, there appears to be a considerable degree of unanimity in the selection (definition) of DBAs in all of these plants.

  11. Ground motion following selection of SRS design basis earthquake and associated deterministic approach

    SciTech Connect

    Not Available

    1991-03-01

    This report summarizes the results of a deterministic assessment of earthquake ground motions at the Savannah River Site (SRS). The purpose of this study is to assist the Environmental Sciences Section of the Savannah River Laboratory in reevaluating the design basis earthquake (DBE) ground motion at SRS during approaches defined in Appendix A to 10 CFR Part 100. This work is in support of the Seismic Engineering Section's Seismic Qualification Program for reactor restart.

  12. Advanced Information Systems Design: Technical Basis and Human Factors Review Guidance

    DTIC Science & Technology

    2000-03-01

    H^ NUREG /CR-6633 BNL- NUREG -52563 Advanced Information Systems Design: Technical Basis and Human Factors Review Guidance Brookhaven National...AVAILABILITY NOTICE Availability of Reference Materials Cited in NRC Publications NRC publications in the NUREG series, NRC regu- lations, and Title...Information Service Springfield, VA 22161 -0002 <http://www.ntis.gov> 1 -800-553-6847 or locally 703-605-6000 The NUREG series comprises (1) brochures

  13. Reducing Uncertainty in the Seismic Design Basis for the Waste Treatment Plant, Hanford, Washington

    SciTech Connect

    Brouns, T.M.; Rohay, A.C.; Reidel, S.P.; Gardner, M.G.

    2007-07-01

    The seismic design basis for the Waste Treatment Plant (WTP) at the Department of Energy's (DOE) Hanford Site near Richland was re-evaluated in 2005, resulting in an increase by up to 40% in the seismic design basis. The original seismic design basis for the WTP was established in 1999 based on a probabilistic seismic hazard analysis completed in 1996. The 2005 analysis was performed to address questions raised by the Defense Nuclear Facilities Safety Board (DNFSB) about the assumptions used in developing the original seismic criteria and adequacy of the site geotechnical surveys. The updated seismic response analysis used existing and newly acquired seismic velocity data, statistical analysis, expert elicitation, and ground motion simulation to develop interim design ground motion response spectra which enveloped the remaining uncertainties. The uncertainties in these response spectra were enveloped at approximately the 84. percentile to produce conservative design spectra, which contributed significantly to the increase in the seismic design basis. A key uncertainty identified in the 2005 analysis was the velocity contrasts between the basalt flows and sedimentary interbeds below the WTP. The velocity structure of the upper four basalt flows (Saddle Mountains Basalt) and the inter-layered sedimentary interbeds (Ellensburg Formation) produces strong reductions in modeled earthquake ground motions propagating through them. Uncertainty in the strength of velocity contrasts between these basalts and interbeds primarily resulted from an absence of measured shear wave velocities (Vs) in the interbeds. For this study, Vs in the interbeds was estimated from older, limited compressional wave velocity (Vp) data using estimated ranges for the ratio of the two velocities (Vp/Vs) based on analogues in similar materials. A range of possible Vs for the interbeds and basalts was used and produced additional uncertainty in the resulting response spectra. Because of the

  14. Game Theoretic Evaluation of Threat Detection Problems-The Central Role of the Adversary

    SciTech Connect

    Heasler, Patrick G.; Wood, Thomas W.; Reichmuth, Barbara A.

    2007-01-01

    A wide variety of security problems hinge on the detection of threats and discrimination of threats from innocuous objects. The theory that frames these problems is common among medical diagnostics, radar and sonar imaging, and detection of radiological, chemical, and biological agents. In many of these problems, the nature of the threat is subject to control by a malicious adversary, and the choice of a reference (or "design basis") threat is a very diffcult, and often intractable, aspect of the problem. It is this class of problems that this report considers.

  15. Design of a Threat-Based Gunnery Performance Test: Issues and Procedures for Crew and Platoon Tank Gunnery

    DTIC Science & Technology

    1990-06-01

    the primary threat. The driver performs random evasive maneuvers while moving to the nearest covered concealed position. The gunner engages the enemy...The crew effectively avoids 1 2 3 4 5 NO anti-tank fires by evasive maneuver and/or the use of smoke. B-9 Crew CONTACT REPORTS Contact reports are...accurately reports threat by evasive maneuvers . data. ___-rew accurately reports location CONTACT REPORTS. (within 200 meters). Crew immediately reports

  16. Demonstrating Structural Adequacy of Nuclear Power Plant Containment Structures for Beyond Design-Basis Pressure Loadings

    SciTech Connect

    Braverman, J.I.; Morante, R.

    2010-07-18

    ABSTRACT Demonstrating the structural integrity of U.S. nuclear power plant (NPP) containment structures, for beyond design-basis internal pressure loadings, is necessary to satisfy Nuclear Regulatory Commission (NRC) requirements and performance goals. This paper discusses methods for demonstrating the structural adequacy of the containment for beyond design-basis pressure loadings. Three distinct evaluations are addressed: (1) estimating the ultimate pressure capacity of the containment structure (10 CFR 50 and US NRC Standard Review Plan, Section 3.8) ; (2) demonstrating the structural adequacy of the containment subjected to pressure loadings associated with combustible gas generation (10 CFR 52 and 10 CFR 50); and (3) demonstrating the containment structural integrity for severe accidents (10 CFR 52 as well as SECY 90-016, SECY 93-087, and related NRC staff requirements memoranda (SRMs)). The paper describes the technical basis for specific aspects of the methods presented. It also presents examples of past issues identified in licensing activities related to these evaluations.

  17. Heterogeneous minimal surface porous scaffold design using the distance field and radial basis functions.

    PubMed

    Yoo, Dongjin

    2012-06-01

    This paper presented an effective method for the 3D heterogeneous porous scaffold design of human tissue using triply periodic minimal surface (TPMS) internal pore architectures. First, an implicit solid representing the smooth 3D scalar field for the porosity distribution was reconstructed by interpolating the geometric positions of control points and porosity values defined at those points using an implicit interpolation algorithm based on the thin-plate radial basis function. After generating the implicit solid representing the smooth 3D scalar field for the porosity distribution, a functionally graded tissue scaffold with accurately controlled porosity distribution was designed using the TPMS-based unit cell libraries. Numerical results showed that the proposed scaffold design method has the potential benefits for accurately controlling the spatial porosity distribution within an arbitrarily shaped scaffold while keeping the advantage of the TPMS-based unit cell libraries.

  18. Breckinridge Project, initial effort. Report XI, Volume V. Critical review of the design basis. [Critical review

    SciTech Connect

    1982-01-01

    Report XI, Technical Audit, is a compendium of research material used during the Initial Effort in making engineering comparisons and decisions. Volumes 4 and 5 of Report XI present those studies which provide a Critical Review of the Design Basis. The Critical Review Report, prepared by Intercontinental Econergy Associates, Inc., summarizes findings from an extensive review of the data base for the H-Coal process design. Volume 4 presents this review and assessment, and includes supporting material; specifically, Design Data Tabulation (Appendix A), Process Flow Sheets (Appendix B), and References (Appendix C). Volume 5 is a continuation of the references of Appendix C. Studies of a proprietary nature are noted and referenced, but are not included in these volumes. They are included in the Limited Access versions of these reports and may be reviewed by properly cleared personnel in the offices of Ashland Synthetic Fuels, Inc.

  19. Breckinridge Project, initial effort. Report XI, Volume IV. Critical review of the design basis. [Critical review

    SciTech Connect

    1981-05-01

    Report XI, Technical Audit, is a compendium of research material used during the Initial Effort in making engineering comparisons and decisions. Volumes 4 and 5 of Report XI present those studies which provide a Critical Review of the Design Basis. The Critical Review Report, prepared by Intercontinental Econergy Associates, Inc., summarizes findings from an extensive review of the data base for the H-Coal process design. Volume 4 presents this review and assessment, and includes supporting material; specifically, Design Data Tabulation (Appendix A), Process Flow Sheets (Appendix B), and References (Appendix C). Volume 5 is a continuation of the references of Appendix C. Studies of a proprietary nature are noted and referenced, but are not included in these volumes. They are included in the Limited Access versions of these reports and may be reviewed by properly cleared personnel in the offices of Ashland Synthetic Fuels, Inc.

  20. Laser Threat Analysis System (LTAS)

    NASA Astrophysics Data System (ADS)

    Pfaltz, John M.; Richardson, Christina E.; Ruiz, Abel; Barsalou, Norman; Thomas, Robert J.

    2002-11-01

    LTAS is a totally integrated modeling and simulation environment designed for the purpose of ascertaining the susceptibility of Air Force pilots and air crews to optical radiation threats. Using LTAS, mission planners can assess the operational impact of optically directed energy weapons and countermeasures. Through various scenarios, threat analysts are able to determine the capability of laser threats and their impact on operational missions including the air crew's ability to complete their mission effectively. Additionally, LTAS allows the risk of laser use on training ranges and the requirement for laser protection to be evaluated. LTAS gives mission planners and threat analysts complete control of the threat environment including threat parameter control and placement, terrain mapping (line-of-site), atmospheric conditions, and laser eye protection (LEP) selection. This report summarizes the design of the final version of LTAS, and the modeling methodologies implemented to accomplish analysis.

  1. Development of Probabilistic Design Basis Earthquake (DBE) Parameters for Moderate and High Hazard Facilities at INEEL

    SciTech Connect

    S. M. Payne; V. W. Gorman; S. A. Jensen; M. E. Nitzel; M. J. Russell; R. P. Smith

    2000-03-01

    Design Basis Earthquake (DBE) horizontal and vertical response spectra are developed for moderate and high hazard facilities or Performance Categories (PC) 3 and 4, respectively, at the Idaho National Engineering and Environmental Laboratory (INEEL). The probabilistic DBE response spectra will replace the deterministic DBE response spectra currently in the U.S. Department of Energy Idaho Operations Office (DOE-ID) Architectural Engineering Standards that govern seismic design criteria for several facility areas at the INEEL. Probabilistic DBE response spectra are recommended to DOE Naval Reactors for use at the Naval Reactor Facility at INEEL. The site-specific Uniform Hazard Spectra (UHS) developed by URS Greiner Woodward Clyde Federal Services are used as the basis for developing the DBE response spectra. In 1999, the UHS for all INEEL facility areas were recomputed using more appropriate attenuation relationships for the Basin and Range province. The revised UHS have lower ground motions than those produced in the 1996 INEEL site-wide probabilistic ground motion study. The DBE response spectra were developed by incorporating smoothed broadened regions of the peak accelerations, velocities, and displacements defined by the site-specific UHS. Portions of the DBE response spectra were adjusted to ensure conservatism for the structural design process.

  2. Structural basis for specific single-stranded RNA recognition by designer pentatricopeptide repeat proteins

    PubMed Central

    Shen, Cuicui; Zhang, Delin; Guan, Zeyuan; Liu, Yexing; Yang, Zhao; Yang, Yan; Wang, Xiang; Wang, Qiang; Zhang, QunXia; Fan, Shilong; Zou, Tingting; Yin, Ping

    2016-01-01

    As a large family of RNA-binding proteins, pentatricopeptide repeat (PPR) proteins mediate multiple aspects of RNA metabolism in eukaryotes. Binding to their target single-stranded RNAs (ssRNAs) in a modular and base-specific fashion, PPR proteins can serve as designable modules for gene manipulation. However, the structural basis for nucleotide-specific recognition by designer PPR (dPPR) proteins remains to be elucidated. Here, we report four crystal structures of dPPR proteins in complex with their respective ssRNA targets. The dPPR repeats are assembled into a right-handed superhelical spiral shell that embraces the ssRNA. Interactions between different PPR codes and RNA bases are observed at the atomic level, revealing the molecular basis for the modular and specific recognition patterns of the RNA bases U, C, A and G. These structures not only provide insights into the functional study of PPR proteins but also open a path towards the potential design of synthetic sequence-specific RNA-binding proteins. PMID:27088764

  3. Threat processing: models and mechanisms.

    PubMed

    Bentz, Dorothée; Schiller, Daniela

    2015-01-01

    The experience of fear is closely linked to the survival of species. Fear can be conceptualized as a brain state that orchestrates defense reactions to threats. To avoid harm, an organism must be equipped with neural circuits that allow learning, detecting, and rapidly responding to threats. Past experience with threat can transform neutral stimuli present at the time of experience into learned threat-related stimuli via associative learning. Pavlovian threat conditioning is the central experimental paradigm to study associative learning. Once learned, these stimulus-response associations are not always expressed depending on context or new experiences with the conditioned stimuli. Neural circuits mediating threat learning have the inherent plasticity to adapt to changing environmental threats. Encounters devoid of danger pave the way for extinction or reconsolidation to occur. Extinction and reconsolidation can both lead to changes in the expression of threat-induced defense responses, but differ in stability and have a different neural basis. This review presents the behavioral models and the system-level neural mechanisms in animals and humans of threat learning and modulation.

  4. Design of chemical space networks on the basis of Tversky similarity.

    PubMed

    Wu, Mengjun; Vogt, Martin; Maggiora, Gerald M; Bajorath, Jürgen

    2016-01-01

    Chemical space networks (CSNs) have been introduced as a coordinate-free representation of chemical space. In CSNs, nodes represent compounds and edges pairwise similarity relationships. These network representations are mostly used to navigate sections of biologically relevant chemical space. Different types of CSNs have been designed on the basis of alternative similarity measures including continuous numerical similarity values or substructure-based similarity criteria. CSNs can be characterized and compared on the basis of statistical concepts from network science. Herein, a new CSN design is introduced that is based upon asymmetric similarity assessment using the Tversky coefficient and termed TV-CSN. Compared to other CSNs, TV-CSNs have unique features. While CSNs typically contain separate compound communities and exhibit small world character, many TV-CSNs are also scale-free in nature and contain hubs, i.e., extensively connected central compounds. Compared to other CSNs, these hubs are a characteristic of TV-CSN topology. Hub-containing compound communities are of particular interest for the exploration of structure-activity relationships.

  5. Design of chemical space networks on the basis of Tversky similarity

    NASA Astrophysics Data System (ADS)

    Wu, Mengjun; Vogt, Martin; Maggiora, Gerald M.; Bajorath, Jürgen

    2016-01-01

    Chemical space networks (CSNs) have been introduced as a coordinate-free representation of chemical space. In CSNs, nodes represent compounds and edges pairwise similarity relationships. These network representations are mostly used to navigate sections of biologically relevant chemical space. Different types of CSNs have been designed on the basis of alternative similarity measures including continuous numerical similarity values or substructure-based similarity criteria. CSNs can be characterized and compared on the basis of statistical concepts from network science. Herein, a new CSN design is introduced that is based upon asymmetric similarity assessment using the Tversky coefficient and termed TV-CSN. Compared to other CSNs, TV-CSNs have unique features. While CSNs typically contain separate compound communities and exhibit small world character, many TV-CSNs are also scale-free in nature and contain hubs, i.e., extensively connected central compounds. Compared to other CSNs, these hubs are a characteristic of TV-CSN topology. Hub-containing compound communities are of particular interest for the exploration of structure-activity relationships.

  6. Adaptive critic autopilot design of bank-to-turn missiles using fuzzy basis function networks.

    PubMed

    Lin, Chuan-Kai

    2005-04-01

    A new adaptive critic autopilot design for bank-to-turn missiles is presented. In this paper, the architecture of adaptive critic learning scheme contains a fuzzy-basis-function-network based associative search element (ASE), which is employed to approximate nonlinear and complex functions of bank-to-turn missiles, and an adaptive critic element (ACE) generating the reinforcement signal to tune the associative search element. In the design of the adaptive critic autopilot, the control law receives signals from a fixed gain controller, an ASE and an adaptive robust element, which can eliminate approximation errors and disturbances. Traditional adaptive critic reinforcement learning is the problem faced by an agent that must learn behavior through trial-and-error interactions with a dynamic environment, however, the proposed tuning algorithm can significantly shorten the learning time by online tuning all parameters of fuzzy basis functions and weights of ASE and ACE. Moreover, the weight updating law derived from the Lyapunov stability theory is capable of guaranteeing both tracking performance and stability. Computer simulation results confirm the effectiveness of the proposed adaptive critic autopilot.

  7. Threat expert system technology advisor

    NASA Technical Reports Server (NTRS)

    Kurrasch, E. R.; Tripp, L. R.

    1987-01-01

    A prototype expert system was developed to determine the feasibility of using expert system technology to enhance the performance and survivability of helicopter pilots in a combat threat environment while flying NOE (Nap of the Earth) missions. The basis for the concept is the potential of using an Expert System Advisor to reduce the extreme overloading of the pilot who flies NOE mission below treetop level at approximately 40 knots while performing several other functions. The ultimate goal is to develop a Threat Expert System Advisor which provides threat information and advice that are better than even a highly experienced copilot. The results clearly show that the NOE pilot needs all the help in decision aiding and threat situation awareness that he can get. It clearly shows that heuristics are important and that an expert system for combat NOE helicopter missions can be of great help to the pilot in complex threat situations and in making decisions.

  8. Post Test Analysis of a PCCV Model Dynamically Tested Under Simulated Design-Basis Earthquakes

    SciTech Connect

    Cherry, J.; Chokshi, N.; James, R.J.; Rashid, Y.R.; Tsurumaki, S.; Zhang, L.

    1998-11-09

    In a collaborative program between the United States Nuclear Regulatory Commission (USNRC) and the Nuclear Power Engineering Corporation (NUPEC) of Japan under sponsorship of the Ministry of International Trade and Ihdustry, the seismic behavior of Prestressed Concrete Containment Vessels (PCCV) is being investigated. A 1:10 scale PCCV model has been constructed by NUPEC and subjected to seismic simulation tests using the high performance shaking table at the Tadotsu Engineering Laboratory. A primary objective of the testing program is to demonstrate the capability of the PCCV to withstand design basis earthquakes with a significant safety margin against major damage or failure. As part of the collaborative program, Sandia National Laboratories (SNL) is conducting research in state-of-the-art analytical methods for predicting the seismic behavior of PCCV structures, with the eventual goal of understanding, validating, and improving calculations dated to containment structure performance under design and severe seismic events. With the increased emphasis on risk-informed- regulatory focus, more accurate ch&@erization (less uncertainty) of containment structural and functional integri~ is desirable. This paper presents results of post-test calculations conducted at ANATECH to simulate the design level scale model tests.

  9. Design Methodology of a New Wavelet Basis Function for Fetal Phonocardiographic Signals

    PubMed Central

    Chourasia, Vijay S.; Tiwari, Anil Kumar

    2013-01-01

    Fetal phonocardiography (fPCG) based antenatal care system is economical and has a potential to use for long-term monitoring due to noninvasive nature of the system. The main limitation of this technique is that noise gets superimposed on the useful signal during its acquisition and transmission. Conventional filtering may result into loss of valuable diagnostic information from these signals. This calls for a robust, versatile, and adaptable denoising method applicable in different operative circumstances. In this work, a novel algorithm based on wavelet transform has been developed for denoising of fPCG signals. Successful implementation of wavelet theory in denoising is heavily dependent on selection of suitable wavelet basis function. This work introduces a new mother wavelet basis function for denoising of fPCG signals. The performance of newly developed wavelet is found to be better when compared with the existing wavelets. For this purpose, a two-channel filter bank, based on characteristics of fPCG signal, is designed. The resultant denoised fPCG signals retain the important diagnostic information contained in the original fPCG signal. PMID:23766693

  10. Categorizing threat : building and using a generic threat matrix.

    SciTech Connect

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  11. Criteria for calculating the efficiency of HEPA filters during and after design basis accidents

    SciTech Connect

    Bergman, W.; First, M.W.; Anderson, W.L.; Gilbert, H.; Jacox, J.W.

    1994-12-01

    We have reviewed the literature on the performance of high efficiency particulate air (HEPA) filters under normal and abnormal conditions to establish criteria for calculating the efficiency of HEPA filters in a DOE nonreactor nuclear facility during and after a Design Basis Accident (DBA). The literature review included the performance of new filters and parameters that may cause deterioration in the filter performance such as filter age, radiation, corrosive chemicals, seismic and rough handling, high temperature, moisture, particle clogging, high air flow and pressure pulses. The deterioration of the filter efficiency depends on the exposure parameters; in severe exposure conditions the filter will be structurally damaged and have a residual efficiency of 0%. Despite the many studies on HEPA filter performance under adverse conditions, there are large gaps and limitations in the data that introduce significant error in the estimates of HEPA filter efficiencies under DBA conditions. Because of this limitation, conservative values of filter efficiency were chosen when there was insufficient data.

  12. Maximal design basis accident of fusion neutron source DEMO-TIN

    SciTech Connect

    Kolbasov, B. N.

    2015-12-15

    When analyzing the safety of nuclear (including fusion) facilities, the maximal design basis accident at which the largest release of activity is expected must certainly be considered. Such an accident is usually the failure of cooling systems of the most thermally stressed components of a reactor (for a fusion facility, it is the divertor or the first wall). The analysis of safety of the ITER reactor and fusion power facilities (including hybrid fission–fusion facilities) shows that the initial event of such a design basis accident is a large-scale break of a pipe in the cooling system of divertor or the first wall outside the vacuum vessel of the facility. The greatest concern is caused by the possibility of hydrogen formation and the inrush of air into the vacuum chamber (VC) with the formation of a detonating mixture and a subsequent detonation explosion. To prevent such an explosion, the emergency forced termination of the fusion reaction, the mounting of shutoff valves in the cooling systems of the divertor and the first wall or blanket for reducing to a minimum the amount of water and air rushing into the VC, the injection of nitrogen or inert gas into the VC for decreasing the hydrogen and oxygen concentration, and other measures are recommended. Owing to a continuous feed-out of the molten-salt fuel mixture from the DEMO-TIN blanket with the removal period of 10 days, the radioactivity release at the accident will mainly be determined by tritium (up to 360 PBq). The activity of fission products in the facility will be up to 50 PBq.

  13. Maximal design basis accident of fusion neutron source DEMO-TIN

    NASA Astrophysics Data System (ADS)

    Kolbasov, B. N.

    2015-12-01

    When analyzing the safety of nuclear (including fusion) facilities, the maximal design basis accident at which the largest release of activity is expected must certainly be considered. Such an accident is usually the failure of cooling systems of the most thermally stressed components of a reactor (for a fusion facility, it is the divertor or the first wall). The analysis of safety of the ITER reactor and fusion power facilities (including hybrid fission-fusion facilities) shows that the initial event of such a design basis accident is a large-scale break of a pipe in the cooling system of divertor or the first wall outside the vacuum vessel of the facility. The greatest concern is caused by the possibility of hydrogen formation and the inrush of air into the vacuum chamber (VC) with the formation of a detonating mixture and a subsequent detonation explosion. To prevent such an explosion, the emergency forced termination of the fusion reaction, the mounting of shutoff valves in the cooling systems of the divertor and the first wall or blanket for reducing to a minimum the amount of water and air rushing into the VC, the injection of nitrogen or inert gas into the VC for decreasing the hydrogen and oxygen concentration, and other measures are recommended. Owing to a continuous feed-out of the molten-salt fuel mixture from the DEMO-TIN blanket with the removal period of 10 days, the radioactivity release at the accident will mainly be determined by tritium (up to 360 PBq). The activity of fission products in the facility will be up to 50 PBq.

  14. Application of the MELCOR code to design basis PWR large dry containment analysis.

    SciTech Connect

    Phillips, Jesse; Notafrancesco, Allen; Tills, Jack Lee

    2009-05-01

    The MELCOR computer code has been developed by Sandia National Laboratories under USNRC sponsorship to provide capability for independently auditing analyses submitted by reactor manufactures and utilities. MELCOR is a fully integrated code (encompassing the reactor coolant system and the containment building) that models the progression of postulated accidents in light water reactor power plants. To assess the adequacy of containment thermal-hydraulic modeling incorporated in the MELCOR code for application to PWR large dry containments, several selected demonstration designs were analyzed. This report documents MELCOR code demonstration calculations performed for postulated design basis accident (DBA) analysis (LOCA and MSLB) inside containment, which are compared to other code results. The key processes when analyzing the containment loads inside PWR large dry containments are (1) expansion and transport of high mass/energy releases, (2) heat and mass transfer to structural passive heat sinks, and (3) containment pressure reduction due to engineered safety features. A code-to-code benchmarking for DBA events showed that MELCOR predictions of maximum containment loads were equivalent to similar predictions using a qualified containment code known as CONTAIN. This equivalency was found to apply for both single- and multi-cell containment models.

  15. Design and utilisation of protocols to characterise dynamic PET uptake of two tracers using basis pursuit.

    PubMed

    Bell, Christopher Michael; Puttick, Simon; Rose, Stephen; Smith, Jye; Thomas, Paul; Dowson, Nicholas

    2017-04-04

    Imaging using more than one biological process using PET could be of great utility, but despite previously proposed approaches to dual-tracer imaging, it is seldom performed. The alternative of performing multiple scans is often infeasible for clinical practice or even in research studies. Dual-tracer PET scanning allows for multiple PET radiotracers to be imaged within the same imaging session. In this paper we describe our approach to utilise the basis pursuit method to aid in the R2.9 design of dual-tracer PET imaging experiments, and later in separation of the signals. The advantage of this approach is that it does not require a compartment model architecture to be specified or even that both signals are distinguishable in all cases. This means the R2.16 method for separating dual-tracer signals can be used for many feasible and useful combinations of biology or radiotracer, once an appropriate scanning protocol has been decided upon. Following a demonstration in separating the signals from two consecutively injected radionuclides in a controlled experiment, phantom and list-mode mouse experiments demonstrated the ability to test the R2.13feasibility of dual-tracer imaging protocols for multiple injection delays. Increases in variances predicted for kinetic macro-parameters VD and KI in brain and tumoral tissue were obtained when R2.14 separating the synthetically combined data. R2.2 These experiments confirmed previous work using other approaches that injections delays of 10-20 minutes ensured increases in variance were kept minimal for the test tracers used. On this basis, an actual dual-tracer experiment using a 20-minute delay was performed using these radio tracers, with the kinetic parameters (VD and KI) extracted for each tracer in agreement with the literature. This R2.4, 2.8 study supports previous work that dual-tracer PET imaging can be accomplished provided certain constraints are adhered to. The utilisation of basis pursuit techniques, with its

  16. SRS BEDROCK PROBABILISTIC SEISMIC HAZARD ANALYSIS (PSHA) DESIGN BASIS JUSTIFICATION (U)

    SciTech Connect

    , R

    2005-12-14

    This represents an assessment of the available Savannah River Site (SRS) hard-rock probabilistic seismic hazard assessments (PSHAs), including PSHAs recently completed, for incorporation in the SRS seismic hazard update. The prior assessment of the SRS seismic design basis (WSRC, 1997) incorporated the results from two PSHAs that were published in 1988 and 1993. Because of the vintage of these studies, an assessment is necessary to establish the value of these PSHAs considering more recently collected data affecting seismic hazards and the availability of more recent PSHAs. This task is consistent with the Department of Energy (DOE) order, DOE O 420.1B and DOE guidance document DOE G 420.1-2. Following DOE guidance, the National Map Hazard was reviewed and incorporated in this assessment. In addition to the National Map hazard, alternative ground motion attenuation models (GMAMs) are used with the National Map source model to produce alternate hazard assessments for the SRS. These hazard assessments are the basis for the updated hard-rock hazard recommendation made in this report. The development and comparison of hazard based on the National Map models and PSHAs completed using alternate GMAMs provides increased confidence in this hazard recommendation. The alternate GMAMs are the EPRI (2004), USGS (2002) and a regional specific model (Silva et al., 2004). Weights of 0.6, 0.3 and 0.1 are recommended for EPRI (2004), USGS (2002) and Silva et al. (2004) respectively. This weighting gives cluster weights of .39, .29, .15, .17 for the 1-corner, 2-corner, hybrid, and Greens-function models, respectively. This assessment is judged to be conservative as compared to WSRC (1997) and incorporates the range of prevailing expert opinion pertinent to the development of seismic hazard at the SRS. The corresponding SRS hard-rock uniform hazard spectra are greater than the design spectra developed in WSRC (1997) that were based on the LLNL (1993) and EPRI (1988) PSHAs. The

  17. Simulation of a beyond design-basis-accident with RELAP5/MOD3.1

    SciTech Connect

    Banati, J.

    1995-09-01

    This paper summarizes the results of analyses, parametric and sensitivity studies, performed using the RELAP5/MOD3.1 computer code for the 4th IAEA Standard Problem Exercise (SPE-4). The test, conducted on the PMK-2 facility in Budapest, involved simulation of a Small Break Loss Of Coolant Accident (SBLOCA) with a 7.4% break in the cold leg of a VVER-440 type pressurized water reactor. According to the scenario, the unavailability of the high pressure injection system led to a beyond design basis accident. For prevention of core damage, secondary side bleed-and-feed accident management measures were applied. A brief description of the PMK-2 integral type test facility is presented, together with the profile and some key phenomenological aspects of this particular experiment. Emphasis is placed on the ability of the code to predict the main trends observed in the test and thus, an assessment is given for the code capabilities to represent the system transient.

  18. Design of radial basis function neural network classifier realized with the aid of data preprocessing techniques: design and analysis

    NASA Astrophysics Data System (ADS)

    Oh, Sung-Kwun; Kim, Wook-Dong; Pedrycz, Witold

    2016-05-01

    In this paper, we introduce a new architecture of optimized Radial Basis Function neural network classifier developed with the aid of fuzzy clustering and data preprocessing techniques and discuss its comprehensive design methodology. In the preprocessing part, the Linear Discriminant Analysis (LDA) or Principal Component Analysis (PCA) algorithm forms a front end of the network. The transformed data produced here are used as the inputs of the network. In the premise part, the Fuzzy C-Means (FCM) algorithm determines the receptive field associated with the condition part of the rules. The connection weights of the classifier are of functional nature and come as polynomial functions forming the consequent part. The Particle Swarm Optimization algorithm optimizes a number of essential parameters needed to improve the accuracy of the classifier. Those optimized parameters include the type of data preprocessing, the dimensionality of the feature vectors produced by the LDA (or PCA), the number of clusters (rules), the fuzzification coefficient used in the FCM algorithm and the orders of the polynomials of networks. The performance of the proposed classifier is reported for several benchmarking data-sets and is compared with the performance of other classifiers reported in the previous studies.

  19. Performance of NACA Eight-Stage Axial-Flow Compressor Designed on the Basis of Airfoil Theory

    DTIC Science & Technology

    1944-08-01

    TEE BASIS OF AIRFOIL THEORY By John T. Slnnette, Jr., Oscar W. Schey, and J. Austin King Aircraft Engine Research Laboratory Cleveland, Ohio FILE...efficiency can he designed by the proper application of airfoil theory. Aircraft Engine Research laboratory, Hational Advisory Committee for Aeronautlos...Basis of Airfoil Theory AUTHORS): Sinnette, John T.; Schey, Oscar W.; and others ORIGINATING AGENCY: Aircraft Engine Research Laboratory, Cleveland

  20. Threat driven modeling framework using petri nets for e-learning system.

    PubMed

    Khamparia, Aditya; Pandey, Babita

    2016-01-01

    Vulnerabilities at various levels are main cause of security risks in e-learning system. This paper presents a modified threat driven modeling framework, to identify the threats after risk assessment which requires mitigation and how to mitigate those threats. To model those threat mitigations aspects oriented stochastic petri nets are used. This paper included security metrics based on vulnerabilities present in e-learning system. The Common Vulnerability Scoring System designed to provide a normalized method for rating vulnerabilities which will be used as basis in metric definitions and calculations. A case study has been also proposed which shows the need and feasibility of using aspect oriented stochastic petri net models for threat modeling which improves reliability, consistency and robustness of the e-learning system.

  1. Benchmarks of improved complete basis set extrapolation schemes designed for standard CCSD(T) atomization energies.

    PubMed

    Feller, David

    2013-02-21

    Simple modifications of complete basis set extrapolation formulas chosen from the literature are examined with respect to their abilities to reproduce a diverse set of 183 reference atomization energies derived primarily from very large basis set standard, frozen core coupled-cluster singles, doubles plus perturbative triples (CCSD(T)) with the aug-cc-pVnZ basis sets. This reference set was augmented with a few larger chemical systems treated with explicitly correlated CCSD(T)-F12b using a quadruple zeta quality basis set followed by extrapolation to complete basis set limit. Tuning the extrapolation formula parameters for the present reference set resulted in substantial reductions in the error metrics. In the case of the best performing approach, the aVnZ extrapolated results are equivalent to or better than results obtained from raw aV(n + 3)Z basis set calculations. To the extent this behavior holds for molecules outside the reference set, it represents an improvement of at least one basis set level over the original formulations and a further significant reduction in the amount of computer time needed to accurately approximate the basis set limit.

  2. 28 CFR 35.139 - Direct threat.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Direct threat. 35.139 Section 35.139 Judicial Administration DEPARTMENT OF JUSTICE NONDISCRIMINATION ON THE BASIS OF DISABILITY IN STATE AND LOCAL GOVERNMENT SERVICES General Requirements § 35.139 Direct threat. (a) This part does not require...

  3. 28 CFR 35.139 - Direct threat.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Direct threat. 35.139 Section 35.139 Judicial Administration DEPARTMENT OF JUSTICE NONDISCRIMINATION ON THE BASIS OF DISABILITY IN STATE AND LOCAL GOVERNMENT SERVICES General Requirements § 35.139 Direct threat. (a) This part does not require...

  4. Implementation of an Industrial-Based Case Study as the Basis for a Design Project in an Introduction to Mechanical Design Course

    ERIC Educational Resources Information Center

    Lackey, Ellen

    2011-01-01

    The purpose of this paper is to discuss the implementation of an industrial-based case study as the basis for a design project for the Spring 2009 Introduction to Mechanical Design Course at the University of Mississippi. Course surveys documented the lack of student exposure in classes to the types of projects typically experienced by engineers…

  5. Airborne Particulate Threat Assessment

    SciTech Connect

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    findings and APICD Gen II subsystems for automated collection, deposition and detection of ambient particulate matter. Key findings from the APTA Program include: Ambient biological PM taxonomy; Demonstration of key subsystems needed for autonomous bioaerosol detection; System design; Efficient electrostatic collection; Automated bioagent recognition; Raman analysis performance validating Td<9 sec; Efficient collection surface regeneration; and Development of a quantitative bioaerosol defection model. The objective of the APTA program was to advance the state of our knowledge of ambient background PM composition. Operation of an automated aerosol detection system was enhanced by a more accurate assessment of background variability, especially for sensitive and specific sensing strategies like Raman detection that are background-limited in performance. Based on this improved knowledge of background, the overall threat detection performance of Raman sensors was improved.

  6. When Students Make Threats

    ERIC Educational Resources Information Center

    Kanan, Linda M.

    2010-01-01

    Much has been written about the use of threat assessment. Schools are encouraged to have threat assessment teams and a threat assessment process as part of a comprehensive safe schools effort. Encouraging and enabling all members of the school community to report possible threats in a timely manner is an essential component of an effective threat…

  7. Cyber threat metrics.

    SciTech Connect

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  8. Development of a Threat Assessment Framework Applicable to Dual Use Biotechnology: Results of a Study to Determine the Feasibility, Applicability and Potential Design of a Threat Assessment Framework Concept

    DTIC Science & Technology

    2007-04-01

    Rickettsia prowazeki R4. Rickettsia rickettsii Bacteria B1. Bacillus anthracis B2. Brucella...Clostridium perfringens • Staphylococcus enterotoxin B • Typhus fever ( Rickettsia prowazekii) Food and waterborne pathogens • Bacteria . Diarrheagenic... Rickettsias • Rabies • Severe acute respiratory syndrome-associated coronavirus (SARS-CoV) Threat Assessment Framework APPENDIX I: AUSTRALIA GROUP LIST OF

  9. 105-K Basin material design basis feed description for spent nuclear fuel project facilities

    SciTech Connect

    Praga, A.N.

    1998-01-08

    Revisions 0 and 0A of this document provided estimated chemical and radionuclide inventories of spent nuclear fuel and sludge currently stored within the Hanford Site`s 105-K Basins. This Revision (Rev. 1) incorporates the following changes into Revision 0A: (1) updates the tables to reflect: improved cross section data, a decision to use accountability data as the basis for total Pu, a corrected methodology for selection of the heat generation basis fee, and a revised decay date; (2) adds section 3.3.3.1 to expand the description of the approach used to calculate the inventory values and explain why that approach yields conservative results; (3) changes the pre-irradiation braze beryllium value.

  10. Practical aspects of variable reduction formulations and reduced basis algorithms in multidisciplinary design optimization

    NASA Technical Reports Server (NTRS)

    Lewis, Robert Michael

    1995-01-01

    This paper discusses certain connections between nonlinear programming algorithms and the formulation of optimization problems for systems governed by state constraints. The major points of this paper are the detailed calculation of the sensitivities associated with different formulations of optimization problems and the identification of some useful relationships between different formulations. These relationships have practical consequences; if one uses a reduced basis nonlinear programming algorithm, then the implementations for the different formulations need only differ in a single step.

  11. Design solutions for water treatment plants constructed on the basis of membrane technologies

    NASA Astrophysics Data System (ADS)

    Panteleev, A. A.; Ryabchikov, B. E.; Zhadan, A. V.; Khoruzhii, O. V.

    2012-07-01

    Two process circuits for demineralizing makeup water for power units at thermal power stations are considered. One of them is constructed on the basis of a combined plant comprising reverse-osmosis and ion-exchange apparatuses and the other comprises reverse-osmosis and electric deionization apparatuses. The considered circuits are analyzed by way of comparing them with the traditional chemical water demineralization system. Advantages and drawbacks of the new technologies for treating natural water are pointed out.

  12. Design basis for protection of light water nuclear power plants against effects of postulated pipe rupture

    SciTech Connect

    Not Available

    1981-01-01

    This standard addresses the design bases for light water reactor, nuclear power plant structures and components essential for the protection of public health and safety from the potential adverse effects of pipe whip, jet impingement, pressurization of compartments outside containment, environmental conditions and flooding associated with a postulated pipe rupture. The design bases for missile protection and the design bases for containment pressurization are not within this standard.

  13. Basis of Accreditation for Educational Programs in Designated Health Science Professions.

    ERIC Educational Resources Information Center

    Canadian Medical Association, Ottawa (Ontario).

    Designed as a guide to accreditation for educational programs in designated health science professions in Canada, this report provides educators with guidelines, general requirements, and requirements for specific programs. Following information on the organization, structure, goals, mission, values, philosophy, and terminology of accreditation of…

  14. Probabilistic risk assessment for the Los Alamos Meson Physics Facility worst-case design-basis accident

    SciTech Connect

    Sharirli, M.; Butner, J.M.; Rand, J.L.; Macek, R.J. ); McKinney, S.J. ); Roush, M.L. . Center for Reliability Engineering)

    1992-01-01

    This paper presents results from a Los Alamos National Laboratory Engineering and Safety Analysis Group assessment of the worse-case design-basis accident associated with the Clinton P. Anderson Meson Physics Facility (LAMPF)/Weapons Neutron Research (WNR) Facility. The primary goal of the analysis was to quantify the accident sequences that result in personnel radiation exposure in the WNR Experimental Hall following the worst-case design-basis accident, a complete spill of the LAMPF accelerator 1L beam. This study also provides information regarding the roles of hardware systems and operators in these sequences, and insights regarding the areas where improvements can increase facility-operation safety. Results also include confidence ranges to incorporate combined effects of uncertainties in probability estimates and importance measures to determine how variations in individual events affect the frequencies in accident sequences.

  15. Probabilistic risk assessment for the Los Alamos Meson Physics Facility worst-case design-basis accident

    SciTech Connect

    Sharirli, M.; Butner, J.M.; Rand, J.L.; Macek, R.J.; McKinney, S.J.; Roush, M.L.

    1992-12-01

    This paper presents results from a Los Alamos National Laboratory Engineering and Safety Analysis Group assessment of the worse-case design-basis accident associated with the Clinton P. Anderson Meson Physics Facility (LAMPF)/Weapons Neutron Research (WNR) Facility. The primary goal of the analysis was to quantify the accident sequences that result in personnel radiation exposure in the WNR Experimental Hall following the worst-case design-basis accident, a complete spill of the LAMPF accelerator 1L beam. This study also provides information regarding the roles of hardware systems and operators in these sequences, and insights regarding the areas where improvements can increase facility-operation safety. Results also include confidence ranges to incorporate combined effects of uncertainties in probability estimates and importance measures to determine how variations in individual events affect the frequencies in accident sequences.

  16. Designing an underground car park fire scenarios on a probabilistic basis.

    PubMed

    Jug, Aleš; Petelin, Stojan; Bukovec, Peter

    2010-03-01

    Designing a fire safety measures can be usually achieved in a two ways. One or we should say more conservative way is the use of prescriptive based codes, where all design prerequisites are mainly written in codes. Other or second option is the use of performance based design, where the group of designers, building owners and authorities having jurisdiction are setting up a milestone and design requirements. Simulation of fire and its consequences constitutes a cornerstone of modern fire safety engineering: the simulations enable to examine computationally the adequacy of the design with respect to a wide range of fire safety objectives including safety of life, directly exposed or neighboring property and infrastructure as well as the environment. Each simulation must be based on a realistic fire scenario, which technically formulates social expectation of safety. Designing realistic fire scenarios is even more important when underground car park is chosen as the subject of analysis. Setting the realistic goals and outcomes is a real technical problem that requires realistic and reliable inputs. It is found that fire scenario inputs can be statistical weighted and analyzed.

  17. Somatic mutations in PI3K[alpha]: Structural basis for enzyme activation and drug design

    SciTech Connect

    Gabelli, Sandra B.; Mandelker, Diana; Schmidt-Kittler, Oleg; Vogelstein, Bert; Amzel, L. Mario

    2011-09-06

    The PI3K pathway is a communication hub coordinating critical cell functions including cell survival, cell growth, proliferation, motility and metabolism. Because PI3K{alpha} harbors recurrent somatic mutations resulting in gains of function in human cancers, it has emerged as an important drug target for many types of solid tumors. Various PI3K isoforms are also being evaluated as potential therapeutic targets for inflammation, heart disease, and hematological malignancies. Structural biology is providing insights into the flexibility of the PI3Ks, and providing basis for understanding the effects of mutations, drug resistance and specificity.

  18. Somatic Mutations in PI3Kalpha: Structural Basis for Enzyme Activation and Drug Design

    SciTech Connect

    S Gabelli; D Mandelker; O Schmidt-Kittler; B Vogelstein; L Amzel

    2011-12-31

    The PI3K pathway is a communication hub coordinating critical cell functions including cell survival, cell growth, proliferation, motility and metabolism. Because PI3K{alpha} harbors recurrent somatic mutations resulting in gains of function in human cancers, it has emerged as an important drug target for many types of solid tumors. Various PI3K isoforms are also being evaluated as potential therapeutic targets for inflammation, heart disease, and hematological malignancies. Structural biology is providing insights into the flexibility of the PI3Ks, and providing basis for understanding the effects of mutations, drug resistance and specificity.

  19. The Concept of Fashion Design on the Basis of Color Coordination Using White LED Lighting

    NASA Astrophysics Data System (ADS)

    Mizutani, Yumiko; Taguchi, Tsunemasa

    This thesis focuses on the development of fashion design, especially a dress coordinated with White LED Lighting (=LED). As for the design concept a fusion of the advanced science and local culture was aimed for. For such a reason this development is a very experimental one. Here in particular I handled an Imperial Court dinner dress for the last Japanese First Lady, Mrs. Akie Abe who wore it at the Imperial Court dinner for the Indonesian First Couple held on November 2006 to. This dress made by Prof. T. Taguchi and I open up a new field in the dress design.

  20. Ground motion following selection of SRS design basis earthquake and associated deterministic approach. Final report: Revision 1

    SciTech Connect

    Not Available

    1991-03-01

    This report summarizes the results of a deterministic assessment of earthquake ground motions at the Savannah River Site (SRS). The purpose of this study is to assist the Environmental Sciences Section of the Savannah River Laboratory in reevaluating the design basis earthquake (DBE) ground motion at SRS during approaches defined in Appendix A to 10 CFR Part 100. This work is in support of the Seismic Engineering Section`s Seismic Qualification Program for reactor restart.

  1. Designing Smart Artifacts for Adaptive Mediation of Social Viscosity: Triadic Actor-Network Enactments as a Basis for Interaction Design

    ERIC Educational Resources Information Center

    Salamanca, Juan

    2012-01-01

    With the advent of ubiquitous computing, interaction design has broadened its object of inquiry into how smart computational artifacts inconspicuously act in people's everyday lives. Although user-centered design approaches remains useful for exploring how people cope with interactive systems, they cannot explain how this new breed of…

  2. Physics basis for an axicell design for the end plugs of MFTF-B

    SciTech Connect

    Baldwin, D.E.; Logan, B.G.

    1982-04-21

    The primary motivation for conversion of MFTF-B to an axicell configuration lies in its engineering promise as a reactor geometry based on circular high-magnetic-field coils. In comparing this configuration to the previous A-cell geometry, we find a number of differences that might significantly affect the physics performance. The purpose of the present document is to examine those features and to assess their impact on the performance of the axicell, as compared to the A-cell configuration, for MFTF-B. In so doing, we address only those issues thought to be affected by the change in geometry and refer to the original report Physics Basis for MFTF-B, for discussion of those issues thought not to be affected. In Sec. 1, we summarize these physics issues. In Sec. 2, we describe operating scenarios in the new configuration. In the Appendices, we discuss those physics issues that require more detailed treatment.

  3. Groundwork: Preparing an Effective Basis for Communication and Shared Learning in Design and Technology Education

    ERIC Educational Resources Information Center

    Looijenga, Annemarie; Klapwijk, Remke; de Vries, Marc J.

    2016-01-01

    In Dutch Design and Technology Education the beginning of a process of learning is usually determined by the teacher. In this paper it is argued that a beginning, determined in interaction with the students, is more profitable as the interaction will lead to joined-up exploring, creating and thinking and an increased motivation to learn.…

  4. Biological basis for space-variant sensor design I: parameters of monkey and human spatial vision

    NASA Astrophysics Data System (ADS)

    Rojer, Alan S.; Schwartz, Eric L.

    1991-02-01

    Biological sensor design has long provided inspiration for sensor design in machine vision. However relatively little attention has been paid to the actual design parameters provided by biological systems as opposed to the general nature of biological vision architectures. In the present paper we will provide a review of current knowledge of primate spatial vision design parameters and will present recent experimental and modeling work from our lab which demonstrates that a numerical conformal mapping which is a refinement of our previous complex logarithmic model provides the best current summary of this feature of the primate visual system. In this paper we will review recent work from our laboratory which has characterized some of the spatial architectures of the primate visual system. In particular we will review experimental and modeling studies which indicate that: . The global spatial architecture of primate visual cortex is well summarized by a numerical conformal mapping whose simplest analytic approximation is the complex logarithm function . The columnar sub-structure of primate visual cortex can be well summarized by a model based on a band-pass filtered white noise. We will also refer to ongoing work in our lab which demonstrates that: . The joint columnar/map structure of primate visual cortex can be modeled and summarized in terms of a new algorithm the ''''proto-column'''' algorithm. This work provides a reference-point for current engineering approaches to novel architectures for

  5. Reducing Production Basis Risk through Rainfall Intensity Frequency (RIF) Indexes: Global Sensitivity Analysis' Implication on Policy Design

    NASA Astrophysics Data System (ADS)

    Muneepeerakul, Chitsomanus; Huffaker, Ray; Munoz-Carpena, Rafael

    2016-04-01

    The weather index insurance promises financial resilience to farmers struck by harsh weather conditions with swift compensation at affordable premium thanks to its minimal adverse selection and moral hazard. Despite these advantages, the very nature of indexing causes the presence of "production basis risk" that the selected weather indexes and their thresholds do not correspond to actual damages. To reduce basis risk without additional data collection cost, we propose the use of rain intensity and frequency as indexes as it could offer better protection at the lower premium by avoiding basis risk-strike trade-off inherent in the total rainfall index. We present empirical evidences and modeling results that even under the similar cumulative rainfall and temperature environment, yield can significantly differ especially for drought sensitive crops. We further show that deriving the trigger level and payoff function from regression between historical yield and total rainfall data may pose significant basis risk owing to their non-unique relationship in the insured range of rainfall. Lastly, we discuss the design of index insurance in terms of contract specifications based on the results from global sensitivity analysis.

  6. Environment as a basis for the design of advertising structures by forming

    NASA Astrophysics Data System (ADS)

    Khmelevsky, Y. P.; Seryakov, V. A.; Mamontov, G. Y.; Tsarenko, D. T.

    2017-01-01

    A few different neighbouring styles of architectural forms are quite frequent in the cities of great historical past. As a result, a designer or architect has to solve the complex problem while designing the objects within such environment, i.e. one has to fit them naturally into the existing site development. Often, form making is found to be hard, due to the fact that the existing architectural forms of totally different stylistic execution coexist in the visual proximity. Presently, placement of the advertising bills in urban environment is both an urgent and debatable issue. On the one hand, advertising providers are keen to present their product bigger and brighter, on the other hand, the overall and eye-catching exhibition stands can be disharmonious with the surrounding architectural ensemble of the city. This situation is relevant for every cultural city.

  7. A basis for solid modeling of gear teeth with application in design and manufacture

    NASA Technical Reports Server (NTRS)

    Huston, Ronald L.; Mavriplis, Dimitrios; Oswald, Fred B.; Liu, Yung Sheng

    1992-01-01

    A new approach to modeling gear tooth surfaces is discussed. A computer graphics solid modeling procedure is used to simulate the tooth fabrication process. This procedure is based on the principles of differential geometry that pertain to envelopes of curves and surfaces. The procedure is illustrated with the modeling of spur, helical, bevel, spiral bevel, and hypoid gear teeth. Applications in design and manufacturing are discussed. Extensions to nonstandard tooth forms, to cams, and to rolling element bearings are proposed.

  8. Scientific basis for process and catalyst design in the selective oxidation of methane to formaldehyde.

    PubMed

    Arena, Francesco; Parmaliana, Adolfo

    2003-12-01

    The mechanism and kinetics of the gas-phase selective oxidation of methane to formaldehyde (MPO) are revised in the general context of catalytic oxidations. In agreement with ab initio calculations of the energy barrier for the activation of methane on transition metal oxide complexes, a formal Langmuir-Hinshelwood kinetic model is proposed which accounts for the "steady-state" conditions and activity-selectivity pattern of MPO catalysts, providing an original support to process design and catalyst development.

  9. A Basis for Solid Modeling of Gear Teeth with Application in Design and Manufacture

    DTIC Science & Technology

    1992-04-01

    helical , bevel, spiral bevel, and hypoid gear teeth. Applications in design and manufacturing are discussed. Extensions to nonstandard tooth forms, to...developing models of spur, helical , bevel, spiral bevel, and hypoid gears. This report is divided into five sections, the first of which provides some...have involute teeth cut into its surface. Finally, a similar procedure was used to generate images of helical , bevel, spiral bevel, and hypoid gears

  10. A Basis for Solid Modeling of Gear Teeth with Application in Design and Manufacture

    NASA Technical Reports Server (NTRS)

    Huston, Ronald L.; Mavriplis, Dimitrios; Oswald, Fred B.; Liu, Yung Sheng

    1994-01-01

    This paper discusses a new approach to modeling gear tooth surfaces. A computer graphics solid modeling procedure is used to simulate the tooth fabrication processes. This procedure is based on the principles of differential geometry that pertain to envelopes of curves and surfaces. The procedure is illustrated with the modeling of spur, helical, bevel, spiral bevel and hypoid gear teeth. Applications in design and manufacturing arc discussed. Extensions to nonstandard tooth forms, to cams, and to rolling element hearings are proposed.

  11. Exploratory Shaft Seismic Design Basis Working Group report; Yucca Mountain Project

    SciTech Connect

    Subramanian, C.V.; King, J.L.; Perkins, D.M.; Mudd, R.W.; Richardson, A.M.; Calovini, J.C.; Van Eeckhout, E.; Emerson, D.O.

    1990-08-01

    This report was prepared for the Yucca Mountain Project (YMP), which is managed by the US Department of Energy. The participants in the YMP are investigating the suitability of a site at Yucca Mountain, Nevada, for construction of a repository for high-level radioactive waste. An exploratory shaft facility (ESF) will be constructed to permit site characterization. The major components of the ESF are two shafts that will be used to provide access to the underground test areas for men, utilities, and ventilation. If a repository is constructed at the site, the exploratory shafts will be converted for use as intake ventilation shafts. In the context of both underground nuclear explosions (conducted at the nearby Nevada Test Site) and earthquakes, the report contains discussions of faulting potential at the site, control motions at depth, material properties of the different rock layers relevant to seismic design, the strain tensor for each of the waveforms along the shaft liners, and the method for combining the different strain components along the shaft liners. The report also describes analytic methods, assumptions used to ensure conservatism, and uncertainties in the data. The analyses show that none of the shafts` structures, systems, or components are important to public radiological safety; therefore, the shafts need only be designed to ensure worker safety, and the report recommends seismic design parameters appropriate for this purpose. 31 refs., 5 figs., 6 tabs.

  12. Structural basis for non-competitive product inhibition in human thymidine phosphorylase: implications for drug design.

    PubMed

    El Omari, Kamel; Bronckaers, Annelies; Liekens, Sandra; Pérez-Pérez, Maria-Jésus; Balzarini, Jan; Stammers, David K

    2006-10-15

    HTP (human thymidine phosphorylase), also known as PD-ECGF (platelet-derived endothelial cell growth factor) or gliostatin, has an important role in nucleoside metabolism. HTP is implicated in angiogenesis and apoptosis and therefore is a prime target for drug design, including antitumour therapies. An HTP structure in a closed conformation complexed with an inhibitor has previously been solved. Earlier kinetic studies revealed an ordered release of thymine followed by ribose phosphate and product inhibition by both ligands. We have determined the structure of HTP from crystals grown in the presence of thymidine, which, surprisingly, resulted in bound thymine with HTP in a closed dead-end complex. Thus thymine appears to be able to reassociate with HTP after its initial ordered release before ribose phosphate and induces the closed conformation, hence explaining the mechanism of non-competitive product inhibition. In the active site in one of the four HTP molecules within the crystal asymmetric unit, additional electron density is present. This density has not been previously seen in any pyrimidine nucleoside phosphorylase and it defines a subsite that may be exploitable in drug design. Finally, because our crystals did not require proteolysed HTP to grow, the structure reveals a loop (residues 406-415), disordered in the previous HTP structure. This loop extends across the active-site cleft and appears to stabilize the dimer interface and the closed conformation by hydrogen-bonding. The present study will assist in the design of HTP inhibitors that could lead to drugs for anti-angiogenesis as well as for the potentiation of other nucleoside drugs.

  13. 78 FR 39781 - Consequence Study of a Beyond-Design-Basis Earthquake Affecting the Spent Fuel Pool for a U.S...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-02

    ... COMMISSION Consequence Study of a Beyond-Design-Basis Earthquake Affecting the Spent Fuel Pool for a U.S... comment, titled Consequence Study of a Beyond- Design-Basis Earthquake Affecting the Spent Fuel Pool for a... earthquakes present the dominant risk for spent fuel pools, the draft study evaluated how a potential...

  14. Structural Basis for the Design of Selective Phosphodiesterase 4B Inhibitors

    PubMed Central

    Fox, David; Burgin, Alex B.; Gurney, Mark E.

    2014-01-01

    Phosphodiesterase-4B (PDE4B) regulates the pro-inflammatory Toll Receptor –Tumor Necrosis Factor α (TNFα) pathway in monocytes, macrophages and microglial cells. As such, it is an important, although under-exploited molecular target for anti-inflammatory drugs. This is due in part to the difficulty of developing selective PDE4B inhibitors as the amino acid sequence of the PDE4 active site is identical in all PDE4 subtypes (PDE4A-D). We show that highly selective PDE4B inhibitors can be designed by exploiting sequence differences outside the active site. Specifically, PDE4B selectivity can be achieved by capture of a C-terminal regulatory helix, now termed CR3 (Control Region 3), across the active site in a conformation that closes access by cAMP. PDE4B selectivity is driven by a single amino acid polymorphism in CR3 (Leu674 in PDE4B1 versus Gln594 in PDE4D). The reciprocal mutations in PDE4B and PDE4D cause a 70-80 fold shift in selectivity. Our structural studies show that CR3 is flexible and can adopt multiple orientations and multiple registries in the closed conformation. The new co-crystal structure with bound ligand provides a guide map for the design of PDE4B selective anti-inflammatory drugs. PMID:24361374

  15. Protein structures in Alzheimer's disease: The basis for rationale therapeutic design.

    PubMed

    Montoliu-Gaya, Laia; Villegas, Sandra

    2015-12-15

    Alzheimer's disease (AD) is a neurodegenerative disorder that affects memory, behavior, thinking and emotion. Current therapies to treat AD patients are only capable for temporarily slowing-down the cognitive decline, as they are focused on ameliorating symptoms instead of targeting its underlying causes. The aim of this review is to describe what is known about the protein structures implicated in AD pathogenesis, amyloid cascade members, as well as those structures involved in Aβ clearance. Thus, structural information available for APP, α- β- and γ-secretases, CTFβ and derived Aβ peptides, AICDs, apoE and apoJ, LRP-1 and RAGE, and neprilysin and insulin-degrading enzyme is provided. The recently solved structure for the γ-secretase complex opens the rational design of a new generation of inhibitors, whereas that for Aβ oligomers offers a putative mechanism explaining why monoclonal antibodies targeted to the N-terminus are effective. Then, an overview on therapies targeting some of these molecules presents their benefits and drawbacks. As a general conclusion our knowledge on the protein structures involved in AD has recently substantially advanced, allowing for the rational design of different therapeutic approaches. Hopefully, we are getting closer to finding a strong disease-modifying drug to cure this devastating disease.

  16. Investigation of techniques for the development of seismic design basis using the probabilistic seismic hazard analysis

    SciTech Connect

    Bernreuter, D.L.; Boissonnade, A.C.; Short, C.M.

    1998-04-01

    The Nuclear Regulatory Commission asked Lawrence Livermore National Laboratory to form a group of experts to assist them in revising the seismic and geologic siting criteria for nuclear power plants, Appendix A to 10 CFR Part 100. This document describes a deterministic approach for determining a Safe Shutdown Earthquake (SSE) Ground Motion for a nuclear power plant site. One disadvantage of this approach is the difficulty of integrating differences of opinions and differing interpretations into seismic hazard characterization. In answer to this, probabilistic seismic hazard assessment methodologies incorporate differences of opinion and interpretations among earth science experts. For this reason, probabilistic hazard methods were selected for determining SSEs for the revised regulation, 10 CFR Part 100.23. However, because these methodologies provide a composite analysis of all possible earthquakes that may occur, they do not provide the familiar link between seismic design loading requirements and engineering design practice. Therefore, approaches used to characterize seismic events (magnitude and distance) which best represent the ground motion level determined with the probabilistic hazard analysis were investigated. This report summarizes investigations conducted at 69 nuclear reactor sites in the central and eastern U.S. for determining SSEs using probabilistic analyses. Alternative techniques are presented along with justification for key choices. 16 refs., 32 figs., 60 tabs.

  17. Early Site Permit Demonstration Program: Guidelines for determining design basis ground motions. Volume 1

    SciTech Connect

    Not Available

    1993-03-18

    This report develops and applies a methodology for estimating strong earthquake ground motion. The motivation was to develop a much needed tool for use in developing the seismic requirements for structural designs. An earthquake`s ground motion is a function of the earthquake`s magnitude, and the physical properties of the earth through which the seismic waves travel from the earthquake fault to the site of interest. The emphasis of this study is on ground motion estimation in Eastern North America (east of the Rocky Mountains), with particular emphasis on the Eastern United States and southeastern Canada. Eastern North America is a stable continental region, having sparse earthquake activity with rare occurrences of large earthquakes. While large earthquakes are of interest for assessing seismic hazard, little data exists from the region to empirically quantify their effects. Therefore, empirically based approaches that are used for other regions, such as Western North America, are not appropriate for Eastern North America. Moreover, recent advances in science and technology have now made it possible to combine theoretical and empirical methods to develop new procedures and models for estimating ground motion. The focus of the report is on the attributes of ground motion in Eastern North America that are of interest for the design of facilities such as nuclear power plants. Specifically considered are magnitudes M from 5 to 8, distances from 0 to 500 km, and frequencies from 1 to 35 Hz.

  18. Changing precipitation extremes in a warming climate: A basis for design flood estimation

    NASA Astrophysics Data System (ADS)

    Wasko, Conrad; Sharma, Ashish

    2016-04-01

    The potential for increasing intensity of future rainfall events has significant implications for flooding and the design of infrastructure. However the questions of how precipitation will change in the future, how important these changes are to flooding, and how engineers incorporate these changes into hydrologic design remain as open questions. In the absence of reliable point based estimates of how precipitation will change, many studies investigate the historical relationship between rainfall intensity and temperature as a proxy for what may happen in a warmer climate. Much of the research to date has focussed on changing precipitation intensity, however, temporal and spatial patterns of precipitation are just as important. Here we link higher temperatures to changes in temporal and spatial patterns of extreme precipitation events. We show, using observed high quality precipitation records from Australia covering all major climatic zones, that storms are intensifying in both time and space resulting in a greater potential for flooding especially in urban locales around the world. Given that precipitation and antecedent conditions are changing, and, the impacts to flooding are significant, methods of incorporating these changes in catchment modelling are required. Continuous simulation offers a natural flexibility to incorporate the many correlated changes in precipitation that may occur in a future climate. An argument for such a framework using existing continuous simulation alternatives is articulated in concluding this presentation.

  19. Basis of human factors methodology applied in the Westinghouse AP600 design

    SciTech Connect

    Carrera, J.P.; Easter, J.R. )

    1992-01-01

    The incident at Three Mile Island Unit 2 brought about an awareness that there is a need for a new perspective on nuclear power plant operator performance. It was discerned that besides executing control actions, the operator needs an additional role, that of systems supervisor-someone who considers plant health at the functional level of how all the plant processes are related and how they perform with regard to the high-level operational goals of the plant. Westinghouse has taken the initiative to apply these ideas in dealing with the operator by studying the work of Rasmussen of Denmark's Riso Laboratory, regarding knowledge-based behavior and the requirements for supporting the cognitive processes required of an operator. This has led to the Westinghouse Man-Machine-Interface System (MMIS) design process.

  20. Modeling of the Reactor Core Isolation Cooling Response to Beyond Design Basis Operations - Interim Report

    SciTech Connect

    Ross, Kyle; Cardoni, Jeffrey N.; Wilson, Chisom Shawn; Morrow, Charles; Osborn, Douglas; Gauntt, Randall O.

    2015-12-01

    Efforts are being pursued to develop and qualify a system-level model of a reactor core isolation (RCIC) steam-turbine-driven pump. The model is being developed with the intent of employing it to inform the design of experimental configurations for full-scale RCIC testing. The model is expected to be especially valuable in sizing equipment needed in the testing. An additional intent is to use the model in understanding more fully how RCIC apparently managed to operate far removed from its design envelope in the Fukushima Daiichi Unit 2 accident. RCIC modeling is proceeding along two avenues that are expected to complement each other well. The first avenue is the continued development of the system-level RCIC model that will serve in simulating a full reactor system or full experimental configuration of which a RCIC system is part. The model reasonably represents a RCIC system today, especially given design operating conditions, but lacks specifics that are likely important in representing the off-design conditions a RCIC system might experience in an emergency situation such as a loss of all electrical power. A known specific lacking in the system model, for example, is the efficiency at which a flashing slug of water (as opposed to a concentrated jet of steam) could propel the rotating drive wheel of a RCIC turbine. To address this specific, the second avenue is being pursued wherein computational fluid dynamics (CFD) analyses of such a jet are being carried out. The results of the CFD analyses will thus complement and inform the system modeling. The system modeling will, in turn, complement the CFD analysis by providing the system information needed to impose appropriate boundary conditions on the CFD simulations. The system model will be used to inform the selection of configurations and equipment best suitable of supporting planned RCIC experimental testing. Preliminary investigations with the RCIC model indicate that liquid water ingestion by the turbine

  1. Early Site Permit Demonstration Program: Guidelines for determining design basis ground motions. Volume 2, Appendices

    SciTech Connect

    Not Available

    1993-03-18

    This report develops and applies a methodology for estimating strong earthquake ground motion. The motivation was to develop a much needed tool for use in developing the seismic requirements for structural designs. An earthquake`s ground motion is a function of the earthquake`s magnitude, and the physical properties of the earth through which the seismic waves travel from the earthquake fault to the site of interest. The emphasis of this study is on ground motion estimation in Eastern North America (east of the Rocky Mountains), with particular emphasis on the Eastern United States and southeastern Canada. Eastern North America is a stable continental region, having sparse earthquake activity with rare occurrences of large earthquakes. While large earthquakes are of interest for assessing seismic hazard, little data exists from the region to empirically quantify their effects. The focus of the report is on the attributes of ground motion in Eastern North America that are of interest for the design of facilities such as nuclear power plants. This document, Volume II, contains Appendices 2, 3, 5, 6, and 7 covering the following topics: Eastern North American Empirical Ground Motion Data; Examination of Variance of Seismographic Network Data; Soil Amplification and Vertical-to-Horizontal Ratios from Analysis of Strong Motion Data From Active Tectonic Regions; Revision and Calibration of Ou and Herrmann Method; Generalized Ray Procedure for Modeling Ground Motion Attenuation; Crustal Models for Velocity Regionalization; Depth Distribution Models; Development of Generic Site Effects Model; Validation and Comparison of One-Dimensional Site Response Methodologies; Plots of Amplification Factors; Assessment of Coupling Between Vertical & Horizontal Motions in Nonlinear Site Response Analysis; and Modeling of Dynamic Soil Properties.

  2. Characterizing and designing polycation-clay nanocomposites as a basis for imazapyr controlled release formulations.

    PubMed

    Radian, Adi; Mishael, Yael G

    2008-03-01

    A novel controlled release formulation (CRF) of the herbicide imazapyr (IMP) was designed to reduce its leaching,which causes soil and water contamination. The anionic herbicide IMP was bound to polydiallyldimethylammonium-chloride (PDADMAC)-montmorillonite composites. PDADMAC adsorption reached a high loading of polymer, which resulted in charge reversal of the clay and promoted IMP binding. The composites were characterized by Fourier transform infrared, zeta potential, and X-ray diffraction measurements, indicating electrostatic interactions of the polycation with the surface, polycation intercalation in the clay and suggesting a configuration as loops and tails on the surface at high loadings. IMP binding to the composites is affected by polycation loading and flocculation. Upon adding high concentrations of IMP to a composite of 0.16 g/g, we obtained high herbicide loadings (66% active ingredient). IMP release from the CRFs applied on a thin layer of soil was substantially slower than its release from the commercial formulation (Arsenal). Accordingly, soil column bioassays indicated reduced herbicide leaching (nearly 2-fold) upon applying the CRFs while maintaining good herbicidal activity. The new PDADMAC-clay formulations are promising from the environmental and weed control management points of view.

  3. Survey of ethical issues reported by Indian medical students: basis for design of a new curriculum.

    PubMed

    Rose, Anuradha; George, Kuryan; T, Arul Dhas; Pulimood, Anna Benjamin

    2014-01-01

    Education in ethics is now a formal part of the undergraduate medical curriculum. However, most courses are structured around principles and case studies more appropriate to western countries. The cultures and practices of countries like India differ from those of western countries. It is, therefore, essential that our teaching should address the issues which are the most relevant to our setting. An anonymised, questionnaire-based, cross-sectional survey of medical students was carried out to get a picture of the ethical problems faced by students in India. The data were categorised into issues related to professional behaviour and ethical dilemmas. Unprofessional behaviour was among the issues reported as a matter of concern by a majority of the medical students. The survey highlights the need to design the curriculum in a way that reflects the structure of medical education in India, where patients are not always considered socio-culturally equal by students or the medical staff. This perspective must underpin any further efforts to address education in ethics in India.

  4. Extreme load alleviation using industrial implementation of active trailing edge flaps in a full design load basis

    NASA Astrophysics Data System (ADS)

    Barlas, Thanasis; Pettas, Vasilis; Gertz, Drew; Madsen, Helge A.

    2016-09-01

    The application of active trailing edge flaps in an industrial oriented implementation is evaluated in terms of capability of alleviating design extreme loads. A flap system with basic control functionality is implemented and tested in a realistic full Design Load Basis (DLB) for the DTU 10MW Reference Wind Turbine (RWT) model and for an upscaled rotor version in DTU's aeroelastic code HAWC2. The flap system implementation shows considerable potential in reducing extreme loads in components of interest including the blades, main bearing and tower top, with no influence on fatigue loads and power performance. In addition, an individual flap controller for fatigue load reduction in above rated power conditions is also implemented and integrated in the general controller architecture. The system is shown to be a technology enabler for rotor upscaling, by combining extreme and fatigue load reduction.

  5. Structural basis of glycogen branching enzyme deficiency and pharmacologic rescue by rational peptide design

    PubMed Central

    Froese, D. Sean; Michaeli, Amit; McCorvie, Thomas J.; Krojer, Tobias; Sasi, Meitav; Melaev, Esther; Goldblum, Amiram; Zatsepin, Maria; Lossos, Alexander; Álvarez, Rafael; Escribá, Pablo V.; Minassian, Berge A.; von Delft, Frank; Kakhlon, Or; Yue, Wyatt W.

    2015-01-01

    Glycogen branching enzyme 1 (GBE1) plays an essential role in glycogen biosynthesis by generating α-1,6-glucosidic branches from α-1,4-linked glucose chains, to increase solubility of the glycogen polymer. Mutations in the GBE1 gene lead to the heterogeneous early-onset glycogen storage disorder type IV (GSDIV) or the late-onset adult polyglucosan body disease (APBD). To better understand this essential enzyme, we crystallized human GBE1 in the apo form, and in complex with a tetra- or hepta-saccharide. The GBE1 structure reveals a conserved amylase core that houses the active centre for the branching reaction and harbours almost all GSDIV and APBD mutations. A non-catalytic binding cleft, proximal to the site of the common APBD mutation p.Y329S, was found to bind the tetra- and hepta-saccharides and may represent a higher-affinity site employed to anchor the complex glycogen substrate for the branching reaction. Expression of recombinant GBE1-p.Y329S resulted in drastically reduced protein yield and solubility compared with wild type, suggesting this disease allele causes protein misfolding and may be amenable to small molecule stabilization. To explore this, we generated a structural model of GBE1-p.Y329S and designed peptides ab initio to stabilize the mutation. As proof-of-principle, we evaluated treatment of one tetra-peptide, Leu-Thr-Lys-Glu, in APBD patient cells. We demonstrate intracellular transport of this peptide, its binding and stabilization of GBE1-p.Y329S, and 2-fold increased mutant enzymatic activity compared with untreated patient cells. Together, our data provide the rationale and starting point for the screening of small molecule chaperones, which could become novel therapies for this disease. PMID:26199317

  6. Fundamental basis and implementation of shell and tube heat exchanger project design: condenser and evaporator study

    NASA Astrophysics Data System (ADS)

    Dalkilic, A. S.; Acikgoz, O.; Tapan, S.; Wongwises, S.

    2016-12-01

    A shell and tube heat exchanger is used as a condenser and an evaporator in this theoretical study. Parametric performance analyses for various actual refrigerants were performed using well-known correlations in open sources. Condensation and evaporation were occurred in the shell side while the water was flowing in the tube side of heat exchanger. Heat transfer rate from tube side was kept constant for condenser and evaporator design. Condensing temperatures were varied from 35 to 60 °C whereas evaporating temperatures were ranging from -15 to 10 °C for the refrigerants of R12, R22, R134a, R32, R507A, R404A, R502, R407C, R152A, R410A and R1234ZE. Variation of convective heat transfer coefficients of refrigerants, total heat transfer coefficients with Reynolds numbers and saturation temperatures were given as validation process considering not only fouling resistance and omission of it but also staggered (triangular) and line (square) arrangements. The minimum tube lengths and necessary pumping powers were calculated and given as case studies for the investigated refrigerants considering validation criteria. It was understood that refrigerant type, fouling resistance and arrangement type are one of the crucial issues regarding the determination of heat exchanger's size and energy consumption. Consequently, R32 and R152a were found to require the shortest tube length and lowest pumping power in the condenser, whereas R507 and R407C have the same advantages in the evaporator. Their heat transfer coefficients were also determined larger than others as expectedly.

  7. Design and Engineering of a Multi-Target (Multiplex) DNA Simulant to Evaluate Nulceic Acid Based Assays for Detection of Biological Threat Agents

    DTIC Science & Technology

    2006-11-01

    Using the actual bio-threat agents for testing is impractical since producing a number of different threat bacteria and viruses, isolating and...Brucella species are recognized as potential agricultural, civilian, and military bioterrorism agents. Rickettsia are classified into two groups; the...spotted fever group (SFG), which includes R. conorii, R. sibirica, and R. rickettsii , and the typhus group (TG), which includes R. prowazekii and R

  8. Geological and seismological survey for new design-basis earthquake ground motion of Kashiwazaki-Kariwa NPS

    NASA Astrophysics Data System (ADS)

    Takao, M.; Mizutani, H.

    2009-05-01

    At about 10:13 on July 16, 2007, a strong earthquake named 'Niigata-ken Chuetsu-oki Earthquake' of Mj6.8 on Japan Meteorological Agencyfs scale occurred offshore Niigata prefecture in Japan. However, all of the nuclear reactors at Kashiwazaki-Kariwa Nuclear Power Station (KKNPS) in Niigata prefecture operated by Tokyo Electric Power Company shut down safely. In other words, automatic safety function composed of shutdown, cooling and containment worked as designed immediately after the earthquake. During the earthquake, the peak acceleration of the ground motion exceeded the design-basis ground motion (DBGM), but the force due to the earthquake applied to safety-significant facilities was about the same as or less than the design basis taken into account as static seismic force. In order to assess anew the safety of nuclear power plants, we have evaluated a new DBGM after conducting geomorphological, geological, geophysical, seismological survey and analyses. [Geomorphological, Geological and Geophysical survey] In the land area, aerial photograph interpretation was performed at least within the 30km radius to extract geographies that could possibly be tectonic reliefs as a geomorphological survey. After that, geological reconnaissance was conducted to confirm whether the extracted landforms are tectonic reliefs or not. Especially we carefully investigated Nagaoka Plain Western Boundary Fault Zone (NPWBFZ), which consists of Kakuda-Yahiko fault, Kihinomiya fault and Katakai fault, because NPWBFZ is the one of the active faults which have potential of Mj8 class in Japan. In addition to the geological survey, seismic reflection prospecting of approximate 120km in total length was completed to evaluate the geological structure of the faults and to assess the consecutiveness of the component faults of NPWBFZ. As a result of geomorphological, geological and geophysical surveys, we evaluated that the three component faults of NPWBFZ are independent to each other from the

  9. Open literature review of threats including sabotage and theft of fissile material transport in Japan.

    SciTech Connect

    Cochran, John Russell; Furaus, James Phillip; Marincel, Michelle K.

    2005-06-01

    This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically and religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty.

  10. Cyber Intelligence Threat Prioritization

    DTIC Science & Technology

    2014-10-01

    possible direction of their behavior. and determines their interest in targeting the organization. t Intrinsic (personally rewarding) Extrinsic (receive...actors resources. Money People Tools Training Motive Why do threat actors attack? Determining an actor’s motive provides insight into the...platform that allows anyone to make their organization more visible to threat actors. Online Presence Extracurricular Activities Motive Risk

  11. Country Threat File Codebook

    DTIC Science & Technology

    1975-01-01

    are atent threats, national nd or carry out threats ndencles that restrict cal1y and pol 111cal1y rganlzations that might t ion. There are...economic competition, trade deficits , disputed territories, control of waterways, coup d’etats, breaking of diplomatic relations, withdrawal from

  12. Development of Site-Specific Soil Design Basis Earthquake (DBE) Parameters for the Integrated Waste Treatment Unit (IWTU)

    SciTech Connect

    Payne, Suzette

    2008-08-01

    Horizontal and vertical PC 3 (2,500 yr) Soil Design Basis Earthquake (DBE) 5% damped spectra, corresponding time histories, and strain-compatible soil properties were developed for the Integrated Waste Treatment Unit (IWTU). The IWTU is located at the Idaho Nuclear Technology and Engineering Center (INTEC) at the Idaho National Laboratory (INL). Mean and 84th percentile horizontal DBE spectra derived from site-specific site response analyses were evaluated for the IWTU. The horizontal and vertical PC 3 (2,500 yr) Soil DBE 5% damped spectra at the 84th percentile were selected for Soil Structure Interaction (SSI) analyses at IWTU. The site response analyses were performed consistent with applicable Department of Energy (DOE) Standards, recommended guidance of the Nuclear Regulatory Commission (NRC), American Society of Civil Engineers (ASCE) Standards, and recommendations of the Blue Ribbon Panel (BRP) and Defense Nuclear Facilities Safety Board (DNFSB).

  13. After Action Report:Idaho National Laboratory (INL) 2014 Multiple Facility Beyond Design Basis (BDBE) Evaluated Drill October 21, 2014

    SciTech Connect

    Barnes, V. Scott

    2014-12-01

    On October 21, 2014, Idaho National Laboratory (INL), in coordination with local jurisdictions, and Department of Energy (DOE) Idaho Operations Office (DOE ID) conducted an evaluated drill to demonstrate the ability to implement the requirements of DOE O 151.1C, “Comprehensive Emergency Management System” when responding to a beyond design basis event (BDBE) scenario as outlined in the Office of Health, Safety, and Security Operating Experience Level 1 letter (OE-1: 2013-01). The INL contractor, Battelle Energy Alliance, LLC (BEA), in coordination with CH2M-WG Idaho, LLC (CWI), and Idaho Treatment Group LLC (ITG), successfully demonstrated appropriate response measures to mitigate a BDBE event that would impact multiple facilities across the INL while protecting the health and safety of personnel, the environment, and property. Offsite response organizations participated to demonstrate appropriate response measures.

  14. Design of serum-free medium for suspension culture of CHO cells on the basis of general commercial media.

    PubMed

    Miki, Hideo; Takagi, Mutsumi

    2015-08-01

    The design of serum-free media for suspension culture of genetically engineered Chinese hamster ovary (CHO) cells using general commercial media as a basis was investigated. Subcultivation using a commercial serum-free medium containing insulin-like growth factor (IGF)-1 with or without FCS necessitated additives other than IGF-1 to compensate for the lack of FCS and improve cell growth. Suspension culture with media containing several combinations of growth factors suggested the effectiveness of addition of both IGF-1 and the lipid signaling molecule lysophosphatidic acid (LPA) for promoting cell growth. Subcultivation of CHO cells in suspension culture using the commercial serum-free medium EX-CELL™302, which contained an IGF-1 analog, supplemented with LPA resulted in gradually increasing specific growth rate comparable to the serum-containing medium and in almost the same high antibody production regardless of the number of generations. The culture with EX-CELL™302 supplemented with LPA in a jar fermentor with pH control at 6.9 showed an apparently higher cell growth rate than the cultures without pH control and with pH control at 6.8. The cell growth in the medium supplemented with aurintricarboxylic acid (ATA), which was much cheaper than IGF-1, in combination with LPA was synergistically promoted similarly to that in the medium supplemented with IGF-1 and LPA. In conclusion, the serum-free medium designed on the basis of general commercial media could support the growth of CHO cells and antibody production comparable to serum-containing medium in suspension culture. Moreover, the possibility of cost reduction by the substitution of IGF-1 with ATA was also shown.

  15. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    ERIC Educational Resources Information Center

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  16. Design of cognitive engine for cognitive radio based on the rough sets and radial basis function neural network

    NASA Astrophysics Data System (ADS)

    Yang, Yanchao; Jiang, Hong; Liu, Congbin; Lan, Zhongli

    2013-03-01

    Cognitive radio (CR) is an intelligent wireless communication system which can dynamically adjust the parameters to improve system performance depending on the environmental change and quality of service. The core technology for CR is the design of cognitive engine, which introduces reasoning and learning methods in the field of artificial intelligence, to achieve the perception, adaptation and learning capability. Considering the dynamical wireless environment and demands, this paper proposes a design of cognitive engine based on the rough sets (RS) and radial basis function neural network (RBF_NN). The method uses experienced knowledge and environment information processed by RS module to train the RBF_NN, and then the learning model is used to reconfigure communication parameters to allocate resources rationally and improve system performance. After training learning model, the performance is evaluated according to two benchmark functions. The simulation results demonstrate the effectiveness of the model and the proposed cognitive engine can effectively achieve the goal of learning and reconfiguration in cognitive radio.

  17. The compartment bag test (CBT) for enumerating fecal indicator bacteria: Basis for design and interpretation of results.

    PubMed

    Gronewold, Andrew D; Sobsey, Mark D; McMahan, Lanakila

    2017-06-01

    For the past several years, the compartment bag test (CBT) has been employed in water quality monitoring and public health protection around the world. To date, however, the statistical basis for the design and recommended procedures for enumerating fecal indicator bacteria (FIB) concentrations from CBT results have not been formally documented. Here, we provide that documentation following protocols for communicating the evolution of similar water quality testing procedures. We begin with an overview of the statistical theory behind the CBT, followed by a description of how that theory was applied to determine an optimal CBT design. We then provide recommendations for interpreting CBT results, including procedures for estimating quantiles of the FIB concentration probability distribution, and the confidence of compliance with recognized water quality guidelines. We synthesize these values in custom user-oriented 'look-up' tables similar to those developed for other FIB water quality testing methods. Modified versions of our tables are currently distributed commercially as part of the CBT testing kit.

  18. Possible Methods to Estimate Core Location in a Beyond-Design-Basis Accident at a GE BWR with a Mark I Containment Stucture

    SciTech Connect

    Walston, S; Rowland, M; Campbell, K

    2011-07-27

    It is difficult to track to the location of a melted core in a GE BWR with Mark I containment during a beyond-design-basis accident. The Cooper Nuclear Station provided a baseline of normal material distributions and shielding configurations for the GE BWR with Mark I containment. Starting with source terms for a design-basis accident, methods and remote observation points were investigated to allow tracking of a melted core during a beyond-design-basis accident. The design of the GE BWR with Mark-I containment highlights an amazing poverty of expectations regarding a common mode failure of all reactor core cooling systems resulting in a beyond-design-basis accident from the simple loss of electric power. This design is shown in Figure 1. The station blackout accident scenario has been consistently identified as the leading contributor to calculated probabilities for core damage. While NRC-approved models and calculations provide guidance for indirect methods to assess core damage during a beyond-design-basis loss-of-coolant accident (LOCA), there appears to be no established method to track the location of the core directly should the LOCA include a degree of fuel melt. We came to the conclusion that - starting with detailed calculations which estimate the release and movement of gaseous and soluble fission products from the fuel - selected dose readings in specific rooms of the reactor building should allow the location of the core to be verified.

  19. Facing ambiguous threats.

    PubMed

    Roberto, Michael A; Bohmer, Richard M J; Edmondson, Amy C

    2006-11-01

    On February 1, 2003, the world watched in horror as the Columbia space shuttle broke apart while reentering the earth's atmosphere, killing all seven astronauts. Some have argued that NASA's failure to respond with appropriate intensity to the so-called foam strike that led to the accident was evidence of irresponsible or incompetent management. The authors' research, however, suggests that NASA was exhibiting a natural, albeit unfortunate, pattern of behavior common in many organizations. The foam strike is a prime example of what the authors call an ambiguous threat-a signal that may or may not portend future harm. Ambiguous threats differ from threats with obvious causes-say, a fire in the building-for which the response is clear. They also differ from unmistakable threats that may lack straightforward response paths (such as the frightening oxygen-tank explosion aboard Apollo 13). However, when the warning sign is ambiguous and the threat's potential effect is unclear, managers may choose to ignore or discount the risk. Such an approach can be catastrophic. Firms that do a good job of dealing with ambiguous threats do not improvise during a crisis; rather, they apply a rigorous set of detection and response capabilities that they have developed and practiced beforehand. In this article, the authors outline how to put such capabilities in place long before a crisis strikes. First, companies need to hone their teamwork and rapid problem-solving skills through practice. Second, they must learn to recognize weak signals, amplify the threat, and encourage employees to ask disconcerting "what if" questions in a safe environment. Finally, they should explore possible responses to threats through quick, low-cost experimentation.

  20. Poland and Global Threats

    NASA Astrophysics Data System (ADS)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  1. Criteria for calculating the efficiency of deep-pleated HEPA filters with aluminum separators during and after design basis accidents

    SciTech Connect

    Bergman, W.; First, M.W.; Anderson, W.L.

    1995-02-01

    We have reviewed the literature on the performance of HEPA filters under normal and abnormal conditions to establish criteria for calculating the efficiency of HEPA filters in a DOE nonreactor nuclear facility during and after a Design Basis Accident (DBA). This study is only applicable to the standard deep-pleated HEPA filter with aluminum separators as specified in ASME N509[1]. Other HEPA filter designs such as the mini-pleat and separatorless filters are not included in this study. The literature review included the performance of new filters and parameters that may cause deterioration in the filter performance such as filter age, radiation, corrosive chemicals, seismic and rough handling, high temperature, moisture, particle clogging, high air flow and pressure pulses. The deterioration of the filter efficiency depends on the exposure parameters; in severe exposure conditions the filter will be damaged and have a residual efficiency of 0%. There are large gaps and limitations in the data that introduce significant error in the estimates of HEPA filter efficiencies under DBA conditions. Because of this limitation, conservative values of filter efficiency were chosen. The estimation of the efficiency of the HEPA filters under DBA conditions involves three steps: (1) The filter pressure drop and environmental parameters are determined during and after the DBA, (2) Comparing the filter pressure drop to a set of threshold values above which the filter is damaged. There is a different threshold value for each combination of environmental parameters, and (3) Determining the filter efficiency. If the filter pressure drop is greater than the threshold value, the filter is damaged and is assigned 0% efficiency. If the pressure drop is less, then the filter is not damaged and the efficiency is determined from literature values of the efficiency at the environmental conditions.

  2. Insider Threat Specification as a Threat Mitigation Technique

    NASA Astrophysics Data System (ADS)

    Magklaras, George; Furnell, Steven

    Insider threats come in many facets and nuances. This results in two major problems: mining big amounts of data for evidence of an insider attack, and keeping track of different aspects of threats is very cumbersome. To enable techniques that support detection of insider threats as early as possible, one needs mechanisms to automate significant parts of the detection process, and that allow to specify what is meant by insider threat. This chapter describes the Insider Threat Prediction Specification Language (ITPSL), a research effort to address the description of threat factors as a mechanism to mitigate insider threats.

  3. Combatting Insider Threats

    NASA Astrophysics Data System (ADS)

    Neumann, Peter G.

    Risks from insider threats are strongly context dependent, and arise in many ways at different layers of system abstraction for different types of systems. We discuss various basic characteristics of insider threats, and consider approaches to the development and use of computer-related environments that require systems and networking to be trustworthy in spite of insider misuse. We also consider future research that could improve both detectability, prevention, and response. This chapter seeks to cope with insider misuse in a broad range of application domains - for example, critical infrastructures, privacy-preserving database systems, financial systems, and interoperable health-care infrastructures. To illustrate this, we apply the principles considered here to the task of detecting and preventing insider misuse in systems that might be used to facilitate trustworthy elections. This discussion includes an examination of the relevance of the Saltzer-Schroeder-Kaashoek security principles and the Clark-Wilson integrity properties for end-to-end election integrity. Trustworthy system developments must consider insider misuse as merely one set of threats that must be addressed consistently together with many other threats such as penetrations, denials of service, system faults and failures, and other threats to survivability. In addition, insider misuse cannot be realistically addressed unless significant improvements are made in the trustworthiness of component systems and their networking as well as their predictably trustworthy compositions into enterprise solutions - architecturally, developmentally, and operationally.

  4. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    PubMed

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  5. Counter-terrorism threat prediction architecture

    NASA Astrophysics Data System (ADS)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  6. Analysis of main steam isolation valve leakage in design basis accidents using MELCOR 1.8.6 and RADTRAD.

    SciTech Connect

    Salay, Michael; Kalinich, Donald A.; Gauntt, Randall O.; Radel, Tracy E.

    2008-10-01

    Analyses were performed using MELCOR and RADTRAD to investigate main steam isolation valve (MSIV) leakage behavior under design basis accident (DBA) loss-of-coolant (LOCA) conditions that are presumed to have led to a significant core melt accident. Dose to the control room, site boundary and LPZ are examined using both approaches described in current regulatory guidelines as well as analyses based on best estimate source term and system response. At issue is the current practice of using containment airborne aerosol concentrations as a surrogate for the in-vessel aerosol concentration that exists in the near vicinity of the MSIVs. This study finds current practice using the AST-based containment aerosol concentrations for assessing MSIV leakage is non-conservative and conceptually in error. A methodology is proposed that scales the containment aerosol concentration to the expected vessel concentration in order to preserve the simplified use of the AST in assessing containment performance under assumed DBA conditions. This correction is required during the first two hours of the accident while the gap and early in-vessel source terms are present. It is general practice to assume that at {approx}2hrs, recovery actions to reflood the core will have been successful and that further core damage can be avoided. The analyses performed in this study determine that, after two hours, assuming vessel reflooding has taken place, the containment aerosol concentration can then conservatively be used as the effective source to the leaking MSIV's. Recommendations are provided concerning typical aerosol removal coefficients that can be used in the RADTRAD code to predict source attenuation in the steam lines, and on robust methods of predicting MSIV leakage flows based on measured MSIV leakage performance.

  7. Credible threats and promises.

    PubMed

    McNamara, John M; Houston, Alasdair I

    2002-11-29

    We consider various implications of information about the other player in two-player evolutionary games. A simple model of desertion shows that information about the partner's behaviour can be disadvantageous, and highlights the idea of credible threats. We then discuss the general issue of whether the partner can convince the focal player that it will behave in a specific way, i.e. whether the focal player can make credible threats or promises. We show that when desertion decisions depend on reserves, a player can manipulate its reserves so as to create a credible threat of desertion. We then extend previous work on the evolution of trust and commitment, discussing conditions under which it is advantageous to assume that a partner will behave in a certain way even though it is not in its best interest.

  8. Environmental Threats at School

    ERIC Educational Resources Information Center

    Green, Twhanna

    2005-01-01

    Children can be exposed to dangerous chemicals and toxins in the most unlikely of places: Their schools. This brief article describes the types of threats that school environments pose to students' health, including such pollution and chemical exposures as lead, mercury, arsenic, molds, and poor indoor air quality. The article provides tips for…

  9. Proliferation: Threat and response

    SciTech Connect

    1996-04-01

    ;Table of Contents: Section I: The Regional Proliferation Challenge; Northeast Asia; The Middle East and North Africa; The Former Soviet Union: Russia, Ukrane, Kazakstan, And Belarus; South Asia; The International Threat: Dangers from Terrorism, Insurgencies, Civil Wars, And Organized Crime; Section II: Department of Defense Response; Technical Annex: Accessible Technologies; Glossary.

  10. Threat in dreams: an adaptation?

    PubMed

    Malcolm-Smith, Susan; Solms, Mark; Turnbull, Oliver; Tredoux, Colin

    2008-12-01

    Revonsuo's influential Threat Simulation Theory (TST) predicts that people exposed to survival threats will have more threat dreams, and evince enhanced responses to dream threats, compared to those living in relatively safe conditions. Participants in a high crime area (South Africa: n=208) differed significantly from participants in a low crime area (Wales, UK: n=116) in having greater recent exposure to a life-threatening event (chi([1,N=186])(2)=14.84, p<.00012). Contrary to TST's predictions, the SA participants reported significantly fewer threat dreams (chi([1,N=287])(2)=6.11, p<.0134), and did not differ from the Welsh participants in responses to dream threats (Fisher's Exact test, p=.2478). Overall, the incidence of threat in dreams was extremely low-less than 20% of dreams featured realistic survival threats. Escape from dream threats occurred in less than 2% of dreams. We conclude that this evidence contradicts key aspects of TST.

  11. An Information Fusion Framework for Threat Assessment

    SciTech Connect

    Beaver, Justin M; Kerekes, Ryan A; Treadwell, Jim N

    2009-01-01

    Modern enterprises are becoming increasingly sensitive to the potential destructive power of small groups or individuals with malicious intent. In response, significant investments are being made in developing a means to assess the likelihood of certain threats to their enterprises. Threat assessment needs are typically focused in very specific application areas where current processes rely heavily on human analysis to both combine any available data and draw conclusions about the probability of a threat. A generic approach to threat assessment is proposed, including a threat taxonomy and decision-level information fusion framework, that provides a computational means for merging multi-modal data for the purpose of assessing the presence of a threat. The framework is designed for flexibility, and intentionally accounts for the accuracy of each data source, given the environmental conditions, in order to manage the uncertainty associated with any acquired data. The taxonomy and information fusion framework is described, and discussed in the context of real-world applications such as shipping container security and cyber security.

  12. Proliferation: Threat and response

    SciTech Connect

    1996-04-01

    During the height of the Cold War, the Russian physicist Andre Sakharov said, `Reducing the risk of annihilating humanity in a nuclear war carries an absolute priority over all other considerations.` The end of the Cold War has reduced the threat of global nuclear war, but today a new threat is rising from the global spread of nuclear, biological, and chemical weapons. Hostile groups and nations have tried - or have been able - to obtain these weapons, the technology, and homegrown ability to make them or ballistic missiles that can deliver the massive annihilation, poison, and death of these weapons hundreds of miles away. For rogue nations, these weapons are a ticket to power, stature, and confidence in regional war.

  13. Proliferation: Threat and Response

    DTIC Science & Technology

    1997-11-01

    the Gulf and helping to ensure access to a key source of oil - essential to China may choose not to sell certain technologies China’s expanding economy...Korean peninsula, and stability in this region are essential if economic NBC weapons present a significant threat to U.S. relations are to continue to...Organization United States. (KEDO) Arrange for delivery of heavy fuel oil to offset North’s energy loss. Finance and construct two light water reactors by

  14. Not All Threats Are Equal

    ERIC Educational Resources Information Center

    Surface, Jeanne L.

    2011-01-01

    School leaders must be fully prepared to respond to all types of threats that occur. In order to respond to threats most appropriately, the school needs to have a systematic approach that combines education, prevention, intervention, discipline, security, and crisis preparedness measures. All threats must be assessed carefully and swiftly,…

  15. The School Shooter: A Threat Assessment Perspective.

    ERIC Educational Resources Information Center

    O'Toole, Mary Ellen

    This paper presents a systematic procedure for threat assessment and intervention of school shooters. The model is designed to be used by educators, mental-health professionals, and law-enforcement agencies and is intended to help refine and strengthen the efforts of the National Center for the Analysis of Violent Crime. Its fundamental building…

  16. American National Standard: design basis for protection of light water nuclear power plants against effects of postulated pipe rupture

    SciTech Connect

    Not Available

    1980-12-31

    This standard addresses the design bases for light water reactor, nuclear power plant structures and components essential for the protection of public health and safety from the potential adverse effects of pipe whip, jet impingement, pressurization of compartments outside containment, environmental conditions and flooding associated with a postulated pipe rupture. The design bases for missile protection and the design bases for containment pressurization are not within this standard.

  17. A knowledge-based approach to estimating the magnitude and spatial patterns of potential threats to soil biodiversity.

    PubMed

    Orgiazzi, Alberto; Panagos, Panos; Yigini, Yusuf; Dunbar, Martha B; Gardi, Ciro; Montanarella, Luca; Ballabio, Cristiano

    2016-03-01

    Because of the increasing pressures exerted on soil, below-ground life is under threat. Knowledge-based rankings of potential threats to different components of soil biodiversity were developed in order to assess the spatial distribution of threats on a European scale. A list of 13 potential threats to soil biodiversity was proposed to experts with different backgrounds in order to assess the potential for three major components of soil biodiversity: soil microorganisms, fauna, and biological functions. This approach allowed us to obtain knowledge-based rankings of threats. These classifications formed the basis for the development of indices through an additive aggregation model that, along with ad-hoc proxies for each pressure, allowed us to preliminarily assess the spatial patterns of potential threats. Intensive exploitation was identified as the highest pressure. In contrast, the use of genetically modified organisms in agriculture was considered as the threat with least potential. The potential impact of climate change showed the highest uncertainty. Fourteen out of the 27 considered countries have more than 40% of their soils with moderate-high to high potential risk for all three components of soil biodiversity. Arable soils are the most exposed to pressures. Soils within the boreal biogeographic region showed the lowest risk potential. The majority of soils at risk are outside the boundaries of protected areas. First maps of risks to three components of soil biodiversity based on the current scientific knowledge were developed. Despite the intrinsic limits of knowledge-based assessments, a remarkable potential risk to soil biodiversity was observed. Guidelines to preliminarily identify and circumscribe soils potentially at risk are provided. This approach may be used in future research to assess threat at both local and global scale and identify areas of possible risk and, subsequently, design appropriate strategies for monitoring and protection of soil

  18. Investigation, comparison and design of chambers used in centrifugal partition chromatography on the basis of flow pattern and separation experiments.

    PubMed

    Schwienheer, C; Merz, J; Schembecker, G

    2015-04-17

    In centrifugal partition chromatography (CPC) the separation efficiency is mainly influenced by the hydrodynamic of mobile and stationary phase in the chambers. Thus, the hydrodynamic has to be investigated and understood in order to enhance a CPC separation run. Different chamber geometries have been developed in the past and the influence of several phase systems and CPC operating conditions were investigated for these chambers. However, a direct comparison between the different chamber types has not been performed yet. In order to investigate the direct influence of the chamber design on the hydrodynamic, several chamber designs - partially similar in geometry to commercial available designs - are investigated under standardized conditions in the present study. The results show the influence of geometrical aspects of the chamber design on the hydrodynamic and therewith, on the separation efficiency. As a conclusion of the present study, some ideas for an optimal chamber design for laboratory and industrial purpose are proposed.

  19. Coping with threats of terrorism: a protocol for group intervention.

    PubMed

    Ottenstein, Richard J

    2003-01-01

    This article presents a group protocol designed to assist people in coping with direct and ongoing threats of terrorism. The protocol is intended to enable participants to address the psychological issues necessary to cope during periods of extreme threat. A step-by-step description of the protocol is provided.

  20. Satellite Threat Warning and Attack Reporting

    SciTech Connect

    Hilland, D.; Phipps, G.; Jingle, C.; Newton, G.

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  1. Threats to international science

    NASA Astrophysics Data System (ADS)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  2. New global viral threats

    PubMed Central

    Erdem, Hakan; Ünal, Serhat

    2015-01-01

    Infectious diseases have caused great catastrophes in human history, as in the example of the plague, which wiped out half of the population in Europe in the 14th century. Ebola virus and H7N9 avian influenza virus are 2 lethal pathogens that we have encountered in the second decade of the 21st century. Ebola infection is currently being seen in West Africa, and H7N9 avian flu appears to have settled in Southeast Asia. This article focuses on the current situation and the future prospects of these potential infectious threats to mankind. PMID:25828274

  3. Ocean-sized threats

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    Jane Lubchenco, professor of marine biology and zoology at Oregon State University, and president-elect of the International Council for Science, said that scientists can do more than they currently are doing to clearly communicate to the public and to policy-makers those issues associated with the many ecological threats faced by the world's oceans. In doing so, scientists can overcome popularly-held misperceptions about the health of the world's oceans and thus, help protect the seas."Science," Lubchenco said, "has a huge role to play in informing [the public] what is happening and to guide the choice of solutions.

  4. Ocean-sized threats

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    Jane Lubchenco, professor of marine biology and zoology at Oregon State University, and president-elect of the International Council for Science, said that scientists can do more than they currently are doing to clearly communicate to the public and to policy-makers those issues associated with the many ecological threats faced by the world's oceans. In doing so, scientists can overcome popularly-held misperceptions about the health of the world's oceans and thus, help protect the seas.“Science,” Lubchenco said, “has a huge role to play in informing [the public] what is happening and to guide the choice of solutions.

  5. 105-K Basin material design basis feed description for spent nuclear fuel project facilities. Volume 2: Sludge

    SciTech Connect

    Pearce, K.L.

    1998-08-30

    Volume 2 provides the design feed compositions for the baseline K East and K West Basin sludge process streams expected to be generated during Spent Nuclear Fuel (SNF) Project activities. Four types of feeds are required to support evaluation of specific facility and process considerations during the development of new facilities and processes. These four design feeds provide nominal and bounding conditions for design evaluations. Volume 2 includes definition of inventories for: (1) KE and KW Basins sludge locations (pit sludges, floor sludge, canister.sludge, and wash sludge components), (2) nominal feed for each of five process feed streams, (3) shielding design feed, (4) safety/regulatory assessment feed, and (5) criticality assessment feed.

  6. Overview of the Distributed Mission Training Integrated Threat Environment project

    NASA Astrophysics Data System (ADS)

    Stytz, Martin R.; Banks, Sheila B.; Santos, Eugene, Jr.

    1998-08-01

    The Joint Synthetic Battlespace (JSB) envisioned within the Department of Defense modeling and simulation master plan requires a distributed virtual environment (DVE) wide consistent threat environment to achieve a useful mission rehearsal, training, test and evaluation capability. To achieve this objective, all threats in the DVE must appear at compatible levels of fidelity to all the entities operating in the DVE and they must interact with human- operated and computer-controlled entities in a realistic fashion. Achieving this goal is not currently possible for two reasons. First, each primary aircraft simulator training system developer has created their own threat system and made their own modeling decisions to support a specific user for a select few predetermined conditions. This traditional threat simulation approach is expensive and leads to ongoing difficulties in maintaining threat currency as intelligence updates are made, new weapons are introduced and new theaters of operation are identified. Second, the threat system interaction on a distributed network must be coordinated. The individualized nature of current threat systems precludes the possibility of introducing coordinated threats. The Distributed Mission Training Integrated Threat Environment (DMTITE) project is developing an effective solution to these issues. The DMTITE project is identifying the requirements for a distributed threat environment and building a demonstrator DOD High Level Architecture compatible system that can provide realistic threats for pilots to train against. The DMTITE prototype will instantiate a variety of threats for use in distributed training scenarios, including surface threats, air threats, radars, and jamming systems. A key element of the system will be the provision of realistic behaviors for the threat systems. We based DMTITE on a general software design methodology and software architecture for computer-generated forces (CGFs) that naturally supports `variety

  7. Addressing the insider threat

    SciTech Connect

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-05-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  8. Addressing the insider threat

    SciTech Connect

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-01-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  9. Designing and Evaluating Tutoring Feedback Strategies for Digital Learning Environments on the Basis of the Interactive Tutoring Feedback Model

    ERIC Educational Resources Information Center

    Narciss, Susanne

    2013-01-01

    This paper describes the interactive tutoring feedback model (ITF-model; Narciss, 2006; 2008), and how it can be applied to the design and evaluation of feedback strategies for digital learning environments. The ITF-model conceptualizes formative tutoring feedback as a multidimensional instructional activity that aims at contributing to the…

  10. Performance of NACA Eight-stage Axial-flow Compressor Designed on the Basis of Airfoil Theory

    NASA Technical Reports Server (NTRS)

    Sinnette, John T; Schey, Oscar W; King, J Austin

    1943-01-01

    The NACA has conducted an investigation to determine the performance that can be obtained from a multistage axial-flow compressor based on airfoil research. A theory was developed; an eight-stage axial-flow compressor was designed, constructed, and tested. The performance of the compressor was determined for speeds from 5000 to 14,000 r.p.m with varying air flow at each speed. Most of the tests were made with air at room temperature. The performance was determined in accordance with the Committee's recommended procedure for testing superchargers. The expected performance was obtained, showing that a multistage compressor of high efficiency can be designed by the application of airfoil theory.

  11. Pine Flat Dam Fish and Wildlife Habitat Restoration, Fresno, California. Appendix C. Basis of Design and Cost Estimate Office Report

    DTIC Science & Technology

    2001-12-01

    PRODUCT Typo 0t Fuid IREGULAR T"t Cmsitrt- tn Not Wrie~1d Lbik DdhmýnP- u Vivd. tm 1rhwq 00atNarnw W~t epam¶ d T.aGpmfw ൚~ 416-M9 Tow Tank--: 2 Region: w...3 6. Hydraulic D esign...SECTIO N IV - Structural D esign .......................................................................................... 7 13. Structural Design

  12. Solution NMR characterization of apical membrane antigen 1 and small molecule interactions as a basis for designing new antimalarials.

    PubMed

    Krishnarjuna, Bankala; Lim, San Sui; Devine, Shane M; Debono, Cael O; Lam, Raymond; Chandrashekaran, Indu R; Jaipuria, Garima; Yagi, Hiromasa; Atreya, Hanudatta S; Scanlon, Martin J; MacRaild, Christopher A; Scammells, Peter J; Norton, Raymond S

    2016-06-01

    Plasmodium falciparum apical membrane antigen 1 (PfAMA1) plays an important role in the invasion by merozoites of human red blood cells during a malaria infection. A key region of PfAMA1 is a conserved hydrophobic cleft formed by 12 hydrophobic residues. As anti-apical membrane antigen 1 antibodies and other inhibitory molecules that target this hydrophobic cleft are able to block the invasion process, PfAMA1 is an attractive target for the development of strain-transcending antimalarial agents. As solution nuclear magnetic resonance spectroscopy is a valuable technique for the rapid characterization of protein-ligand interactions, we have determined the sequence-specific backbone assignments for PfAMA1 from two P. falciparum strains, FVO and 3D7. Both selective labelling and unlabelling strategies were used to complement triple-resonance experiments in order to facilitate the assignment process. We have then used these assignments for mapping the binding sites for small molecules, including benzimidazoles, pyrazoles and 2-aminothiazoles, which were selected on the basis of their affinities measured from surface plasmon resonance binding experiments. Among the compounds tested, benzimidazoles showed binding to a similar region on both FVO and 3D7 PfAMA1, suggesting that these compounds are promising scaffolds for the development of novel PfAMA1 inhibitors. Copyright © 2016 John Wiley & Sons, Ltd.

  13. Lizard threat display handicaps endurance.

    PubMed Central

    Brandt, Y

    2003-01-01

    Honest-signalling theory asserts that threat displays reliably advertise attributes that influence fighting success. Endurance, as measured by treadmill performance, predicts the outcome of agonistic interactions among lizards. If threat displays in lizards function to advertise endurance capacity then variation in threat displays should correlate with endurance. I tested this prediction for the duration of threat posturing in male side-blotched lizards (Uta stansburiana) and examined whether threat displays act as quality handicaps, reliable signals that expend the attribute that is advertised. Individual variation in the duration of threat posturing correlated with endurance, while an experimental reduction of endurance diminished the duration of threat posturing. As expected of a quality handicap, endurance fell below baseline after display production. A restriction of aerobic metabolism can account for this effect. In threat posturing, lateral compression of the thorax may interfere with respiration or with circulation, limiting aerobic metabolism and causing a compensatory increase in anaerobic metabolism, thereby generating lactate and diminishing locomotor capacity. Concentrations of lactate measured after display production were higher than baseline, consistent with the proposed mechanism. By restricting aerobic metabolism, the threat posture can act as a quality handicap, simultaneously advertising and expending the endurance capacity of displaying lizards. PMID:12803896

  14. Applying Human-performance Models to Designing and Evaluating Nuclear Power Plants: Review Guidance and Technical Basis

    SciTech Connect

    O'Hara, J.M.

    2009-11-30

    Human performance models (HPMs) are simulations of human behavior with which we can predict human performance. Designers use them to support their human factors engineering (HFE) programs for a wide range of complex systems, including commercial nuclear power plants. Applicants to U.S. Nuclear Regulatory Commission (NRC) can use HPMs for design certifications, operating licenses, and license amendments. In the context of nuclear-plant safety, it is important to assure that HPMs are verified and validated, and their usage is consistent with their intended purpose. Using HPMs improperly may generate misleading or incorrect information, entailing safety concerns. The objective of this research was to develop guidance to support the NRC staff's reviews of an applicant's use of HPMs in an HFE program. The guidance is divided into three topical areas: (1) HPM Verification, (2) HPM Validation, and (3) User Interface Verification. Following this guidance will help ensure the benefits of HPMs are achieved in a technically sound, defensible manner. During the course of developing this guidance, I identified several issues that could not be addressed; they also are discussed.

  15. High-Affinity α-Conotoxin PnIA Analogs Designed on the Basis of the Protein Surface Topography Method

    PubMed Central

    Kasheverov, Igor E.; Chugunov, Anton O.; Kudryavtsev, Denis S.; Ivanov, Igor A.; Zhmak, Maxim N.; Shelukhina, Irina V.; Spirova, Ekaterina N.; Tabakmakher, Valentin M.; Zelepuga, Elena A.; Efremov, Roman G.; Tsetlin, Victor I.

    2016-01-01

    Despite some success for small molecules, elucidating structure–function relationships for biologically active peptides — the ligands for various targets in the organism — remains a great challenge and calls for the development of novel approaches. Some of us recently proposed the Protein Surface Topography (PST) approach, which benefits from a simplified representation of biomolecules’ surface as projection maps, which enables the exposure of the structure–function dependencies. Here, we use PST to uncover the “activity pattern” in α-conotoxins — neuroactive peptides that effectively target nicotinic acetylcholine receptors (nAChRs). PST was applied in order to design several variants of the α-conotoxin PnIA, which were synthesized and thoroughly studied. Among the best was PnIA[R9, L10], which exhibits nanomolar affinity for the α7 nAChR, selectivity and a slow wash-out from this target. Importantly, these mutations could hardly be delineated by “standard” structure-based drug design. The proposed combination of PST with a set of experiments proved very efficient for the rational construction of new bioactive molecules. PMID:27841338

  16. Driver-passenger collaboration as a basis for human-machine interface design for vehicle navigation systems.

    PubMed

    Antrobus, Vicki; Burnett, Gary; Krehl, Claudia

    2017-03-01

    Human Factors concerns exist with vehicle navigation systems, particularly relating to the effects of current Human-Machine Interfaces (HMIs) on driver disengagement from the environment. A road study was conducted aiming to provide initial input for the development of intelligent HMIs for in-vehicle systems, using the traditional collaborative navigation relationship between the driver and passenger to inform future design. Sixteen drivers navigated a predefined route in the city of Coventry, UK with the assistance of an existing vehicle navigation system (SatNav), whereas a further 16 followed the navigational prompts of a passenger who had been trained along the same route. Results found that there were no significant differences in the number of navigational errors made on route for the two different methods. However, drivers utilising a collaborative navigation approach had significantly better landmark and route knowledge than their SatNav counterparts. Analysis of individual collaborative transcripts revealed the large individual differences in descriptor use by passengers and reference to environmental landmarks, illustrating the potential for the replacement of distance descriptors in vehicle navigation systems. Results are discussed in the context of future HMIs modelled on a collaborative navigation relationship. Practitioner Summary: Current navigation systems have been associated with driver environmental disengagement, this study uses an on-road approach to look at how the driver-passenger collaborative relationship and dialogue can inform future navigation HMI design. Drivers navigating with passenger assistance demonstrated enhanced landmark and route knowledge over drivers navigating with a SatNav.

  17. Design, experiments and simulation of voltage transformers on the basis of a differential input D-dot sensor.

    PubMed

    Wang, Jingang; Gao, Can; Yang, Jie

    2014-07-17

    Currently available traditional electromagnetic voltage sensors fail to meet the measurement requirements of the smart grid, because of low accuracy in the static and dynamic ranges and the occurrence of ferromagnetic resonance attributed to overvoltage and output short circuit. This work develops a new non-contact high-bandwidth voltage measurement system for power equipment. This system aims at the miniaturization and non-contact measurement of the smart grid. After traditional D-dot voltage probe analysis, an improved method is proposed. For the sensor to work in a self-integrating pattern, the differential input pattern is adopted for circuit design, and grounding is removed. To prove the structure design, circuit component parameters, and insulation characteristics, Ansoft Maxwell software is used for the simulation. Moreover, the new probe was tested on a 10 kV high-voltage test platform for steady-state error and transient behavior. Experimental results ascertain that the root mean square values of measured voltage are precise and that the phase error is small. The D-dot voltage sensor not only meets the requirement of high accuracy but also exhibits satisfactory transient response. This sensor can meet the intelligence, miniaturization, and convenience requirements of the smart grid.

  18. Design, Experiments and Simulation of Voltage Transformers on the Basis of a Differential Input D-dot Sensor

    PubMed Central

    Wang, Jingang; Gao, Can; Yang, Jie

    2014-01-01

    Currently available traditional electromagnetic voltage sensors fail to meet the measurement requirements of the smart grid, because of low accuracy in the static and dynamic ranges and the occurrence of ferromagnetic resonance attributed to overvoltage and output short circuit. This work develops a new non-contact high-bandwidth voltage measurement system for power equipment. This system aims at the miniaturization and non-contact measurement of the smart grid. After traditional D-dot voltage probe analysis, an improved method is proposed. For the sensor to work in a self-integrating pattern, the differential input pattern is adopted for circuit design, and grounding is removed. To prove the structure design, circuit component parameters, and insulation characteristics, Ansoft Maxwell software is used for the simulation. Moreover, the new probe was tested on a 10 kV high-voltage test platform for steady-state error and transient behavior. Experimental results ascertain that the root mean square values of measured voltage are precise and that the phase error is small. The D-dot voltage sensor not only meets the requirement of high accuracy but also exhibits satisfactory transient response. This sensor can meet the intelligence, miniaturization, and convenience requirements of the smart grid. PMID:25036333

  19. Thinking about threats: Memory and prospection in human threat management.

    PubMed

    Bulley, Adam; Henry, Julie D; Suddendorf, Thomas

    2017-03-01

    Humans have evolved mechanisms for the detection and management of possible threats in order to abate their negative consequences for fitness. Internally generated ('detached') cognition may have evolved in part because of its contributions to this broad function, but important questions remain about its role in threat management. In this article, we therefore present a taxonomy of threat-related internally generated cognition comprising episodic and semantic formats of memory and prospection. We address the proximate mechanisms of each of the capacities in this taxonomy, and discuss their respective contributions to adaptive threat management in humans. For instance, mental time travel empowers people to contemplate and learn from threats experienced long ago, as well as to plan for dangers that might arise in the distant future. However, despite their functional benefits, these thought processes are also central to contemporary anxiety disorders and may be a potent source of distress.

  20. Insider Threat - Material Control and Accountability Mitigation

    SciTech Connect

    Powell, Danny H; Elwood Jr, Robert H; Roche, Charles T

    2011-01-01

    The technical objectives of nuclear safeguards are (1) the timely detection of diversion of significant quantities of nuclear material from peaceful uses to the manufacture of nuclear weapons or other nuclear explosive devices or for purposes unknown and (2) the deterrence of such diversion by the risk of early detection. The safeguards and security program must address both outsider threats and insider threats. Outsider threats are primarily addressed by the physical protection system. Insider threats can be any level of personnel at the site including passive or active insiders that could attempt protracted or abrupt diversion. This could occur by an individual acting alone or by collusion between an individual with material control and accountability (MC&A) responsibilities and another individual who has responsibility or control within both the physical protection and the MC&A systems. The insider threat is one that must be understood and incorporated into the safeguards posture. There have been more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. The insider has access, authority, and knowledge, as well as a set of attributes, that make him/her difficult to detect. An integrated safeguards program is designed as a defense-in-depth system that seeks to prevent the unauthorized removal of nuclear material, to provide early detection of any unauthorized attempt to remove nuclear material, and to rapidly respond to any attempted removal of nuclear material. The program is also designed to support protection against sabotage, espionage, unauthorized access, compromise, and other hostile acts that may cause unacceptable adverse impacts on national security, program continuity, the health and safety of employees, the public, or the environment. Nuclear MC&A play an essential role in the capabilities of an integrated safeguards system to deter and detect theft or diversion of nuclear material. An integrated safeguards system with

  1. Providing the Basis for Innovative Improvements in Advanced LWR Reactor Passive Safety Systems Design: An Educational R&D Project

    SciTech Connect

    Brian G. Williams; Jim C. P. Liou; Hiral Kadakia; Bill Phoenix; Richard R. Schultz

    2007-02-27

    This project characterizes typical two-phase stratified flow conditions in advanced water reactor horizontal pipe sections, following activation of passive cooling systems. It provides (1) a means to educate nuclear engineering students regarding the importance of two-phase stratified flow in passive cooling systems to the safety of advanced reactor systems and (2) describes the experimental apparatus and process to measure key parameters essential to consider when designing passive emergency core cooling flow paths that may encounter this flow regime. Based on data collected, the state of analysis capabilities can be determined regarding stratified flow in advanced reactor systems and the best paths forward can be identified to ensure that the nuclear industry can properly characterize two-phase stratified flow in passive emergency core cooling systems.

  2. Using a Non-Equivalent Groups Quasi Experimental Design to Reduce Internal Validity Threats to Claims Made by Math and Science K-12 Teacher Recruitment Programs

    NASA Astrophysics Data System (ADS)

    Moin, Laura

    2009-10-01

    The American Recovery and Reinvestment Act national policy established in 2009 calls for ``meaningful data'' that demonstrate educational improvements, including the recruitment of high-quality teachers. The scant data available and the low credibility of many K-12 math/science teacher recruitment program evaluations remain the major barriers for the identification of effective recruitment strategies. Our study presents a methodology to better evaluate the impact of recruitment programs on increasing participants' interest in teaching careers. The research capitalizes on the use of several control groups and presents a non-equivalent groups quasi-experimental evaluation design that produces program effect claims with higher internal validity than claims generated by current program evaluations. With this method that compares responses to a teaching career interest question from undergraduates all along a continuum from just attending an information session to participating (or not) in the recruitment program, we were able to compare the effect of the program in increasing participants' interest in teaching careers versus the evolution of the same interest but in the absence of the program. We were also able to make suggestions for program improvement and further research. While our findings may not apply to other K-12 math/science teacher recruitment programs, we believe that our evaluation methodology does and will contribute to conduct stronger program evaluations. In so doing, our evaluation procedure may inform recruitment program designers and policy makers.

  3. Shape threat detection via adaptive computed tomography

    NASA Astrophysics Data System (ADS)

    Masoudi, Ahmad; Thamvichai, Ratchaneekorn; Neifeld, Mark A.

    2016-05-01

    X-ray Computed Tomography (CT) is used widely for screening purposes. Conventional x-ray threat detection systems employ image reconstruction and segmentation algorithms prior to making threat/no-threat decisions. We find that in many cases these pre-processing steps can degrade detection performance. Therefore in this work we will investigate methods that operate directly on the CT measurements. We analyze a fixed-gantry system containing 25 x-ray sources and 2200 photon counting detectors. We present a new method for improving threat detection performance. This new method is a so-called greedy adaptive algorithm which at each time step uses information from previous measurements to design the next measurement. We utilize sequential hypothesis testing (SHT) in order to derive both the optimal "next measurement" and the stopping criterion to insure a target probability of error Pe. We find that selecting the next x-ray source according to such a greedy adaptive algorithm, we can reduce Pe by a factor of 42.4× relative to the conventional measurement sequence employing all 25 sources in sequence.

  4. Threat Assessment in College Settings

    ERIC Educational Resources Information Center

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  5. Linking Stereotype Threat and Anxiety

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2007-01-01

    Claude Steele's stereotype threat hypothesis has attracted significant attention in recent years. This study tested one of the main tenets of his theory--that stereotype threat serves to increase individual anxiety levels, thus hurting performance--using real-time measures of physiological arousal. Subjects were randomly assigned to either high or…

  6. Bio-threat microparticle simulants

    DOEpatents

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  7. Bio-threat microparticle simulants

    DOEpatents

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  8. Bomb Threat Assessments. Fact Sheet

    ERIC Educational Resources Information Center

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  9. Assessing the global threat from Zika virus.

    PubMed

    Lessler, Justin; Chaisson, Lelia H; Kucirka, Lauren M; Bi, Qifang; Grantz, Kyra; Salje, Henrik; Carcelen, Andrea C; Ott, Cassandra T; Sheffield, Jeanne S; Ferguson, Neil M; Cummings, Derek A T; Metcalf, C Jessica E; Rodriguez-Barraquer, Isabel

    2016-08-12

    First discovered in 1947, Zika virus (ZIKV) infection remained a little-known tropical disease until 2015, when its apparent association with a considerable increase in the incidence of microcephaly in Brazil raised alarms worldwide. There is limited information on the key factors that determine the extent of the global threat from ZIKV infection and resulting complications. Here, we review what is known about the epidemiology, natural history, and public health effects of ZIKV infection, the empirical basis for this knowledge, and the critical knowledge gaps that need to be filled.

  10. Understanding the structural basis of substrate recognition by Plasmodium falciparum plasmepsin V to aid in the design of potent inhibitors

    PubMed Central

    Bedi, Rajiv K.; Patel, Chandan; Mishra, Vandana; Xiao, Huogen; Yada, Rickey Y.; Bhaumik, Prasenjit

    2016-01-01

    Plasmodium falciparum plasmepsin V (PfPMV) is an essential aspartic protease required for parasite survival, thus, considered as a potential drug target. This study reports the first detailed structural analysis and molecular dynamics simulation of PfPMV as an apoenzyme and its complexes with the substrate PEXEL as well as with the inhibitor saquinavir. The presence of pro-peptide in PfPMV may not structurally hinder the formation of a functionally competent catalytic active site. The structure of PfPMV-PEXEL complex shows that the unique positions of Glu179 and Gln222 are responsible for providing the specificity of PEXEL substrate with arginine at P3 position. The structural analysis also reveals that the S4 binding pocket in PfPMV is occupied by Ile94, Ala98, Phe370 and Tyr472, and therefore, does not allow binding of pepstatin, a potent inhibitor of most pepsin-like aspartic proteases. Among the screened inhibitors, the HIV-1 protease inhibitors and KNI compounds have higher binding affinities for PfPMV with saquinavir having the highest value. The presence of a flexible group at P2 and a bulky hydrophobic group at P3 position of the inhibitor is preferred in the PfPMV substrate binding pocket. Results from the present study will aid in the design of potent inhibitors of PMV. PMID:27531685

  11. Examining the Effects of Stereotype Threat on Test-Taking Behaviors

    ERIC Educational Resources Information Center

    Scherbaum, Charles A.; Blanshetyn, Victoria; Marshall-Wolp, Elizabeth; McCue, Elizabeth; Strauss, Ross

    2011-01-01

    This study examines the relationship between stereotype threat and individual test-taking behaviors. Previous research has examined the impact of stereotype threat on test scores, but little research has examined the impact of stereotype threat on the test-taking behaviors impacting those scores. Using a pre-post experimental design, stereotype…

  12. Psychoanalysis and the nuclear threat

    SciTech Connect

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  13. Material Performance of Fully-Ceramic Micro-Encapsulated Fuel under Selected LWR Design Basis Scenarios: Final Report

    SciTech Connect

    B. Boer; R. S. Sen; M. A. Pope; A. M. Ougouag

    2011-09-01

    The extension to LWRs of the use of Deep-Burn coated particle fuel envisaged for HTRs has been investigated. TRISO coated fuel particles are used in Fully-Ceramic Microencapsulated (FCM) fuel within a SiC matrix rather than the graphite of HTRs. TRISO particles are well characterized for uranium-fueled HTRs. However, operating conditions of LWRs are different from those of HTRs (temperature, neutron energy spectrum, fast fluence levels, power density). Furthermore, the time scales of transient core behavior during accidents are usually much shorter and thus more severe in LWRs. The PASTA code was updated for analysis of stresses in coated particle FCM fuel. The code extensions enable the automatic use of neutronic data (burnup, fast fluence as a function of irradiation time) obtained using the DRAGON neutronics code. An input option for automatic evaluation of temperature rise during anticipated transients was also added. A new thermal model for FCM was incorporated into the code; so-were updated correlations (for pyrocarbon coating layers) suitable to estimating dimensional changes at the high fluence levels attained in LWR DB fuel. Analyses of the FCM fuel using the updated PASTA code under nominal and accident conditions show: (1) Stress levels in SiC-coatings are low for low fission gas release (FGR) fractions of several percent, as based on data of fission gas diffusion in UO{sub 2} kernels. However, the high burnup level of LWR-DB fuel implies that the FGR fraction is more likely to be in the range of 50-100%, similar to Inert Matrix Fuels (IMFs). For this range the predicted stresses and failure fractions of the SiC coating are high for the reference particle design (500 {micro}mm kernel diameter, 100 {micro}mm buffer, 35 {micro}mm IPyC, 35 {micro}mm SiC, 40 {micro}mm OPyC). A conservative case, assuming 100% FGR, 900K fuel temperature and 705 MWd/kg (77% FIMA) fuel burnup, results in a 8.0 x 10{sup -2} failure probability. For a 'best-estimate' FGR fraction

  14. Formulating a new basis for the treatment against botulinum neurotoxin intoxication: 3,4-diaminopyridine prodrug design and characterization

    PubMed Central

    Zakhari, Joseph S.; Kinoyama, Isao; Hixon, Mark S.; Di Mola, Antonia; Globisch, Daniel; Janda, Kim D.

    2011-01-01

    Botulism is a disease characterized by neuromuscular paralysis and is produced from botulinum neurotoxins (BoNTs) found within the Gram positive bacterium Clostridium botulinum. This bacteria produces the most deadliest toxin known, with lethal doses as low as 1 ng/kg. Due to the relative ease of production and transport, the use of these agents as potential bioterrorist weapons has become of utmost concern. No small molecule therapies against BoNT intoxication have been approved to date. However, 3,4-diaminopyridine, (3,4-DAP), a potent reversible inhibitor of voltage-gated potassium channels, is an effective cholinergic agonist used in the treatment of neuromuscular degenerative disorders that require cholinergic enhancement. 3,4-DAP has also been shown to facilitate recovery of neuromuscular action potential post botulinum intoxication by blocking K+ channels. Unfortunately, 3,4-DAP displays toxicity largely due to blood-brain-barrier (BBB) penetration. As a dual-action prodrug approach to cholinergic enhancement we have designed carbamate and amide conjugates of 3,4-DAP. The carbamate prodrug is intended to be a slowly reversible inhibitor of acetylcholinesterase (AChE) along the lines of the stigmines thereby allowing increased persistence of released acetylcholine within the synaptic cleft. As a secondary activity, cleavage of the carbamate prodrug by AChE will afford the localized release of 3,4-DAP, which in turn, will enhance the pre-synaptic release of additional acetylcholine. Being a competitive inhibitor with respect to acetylcholine, the activity of the prodrug will be greatest at the synaptic junctions most depleted of acetylcholine. Here we report upon the synthesis and biochemical characterization of three new classes of prodrugs intended to limit previously reported stability and toxicity issues. Of the prodrugs examined, compound 32, demonstrated the most clinically relevant half-life of 2.76 h, while selectively inhibiting AChE over

  15. Safety Basis Report

    SciTech Connect

    R.J. Garrett

    2002-01-14

    As part of the internal Integrated Safety Management Assessment verification process, it was determined that there was a lack of documentation that summarizes the safety basis of the current Yucca Mountain Project (YMP) site characterization activities. It was noted that a safety basis would make it possible to establish a technically justifiable graded approach to the implementation of the requirements identified in the Standards/Requirements Identification Document. The Standards/Requirements Identification Documents commit a facility to compliance with specific requirements and, together with the hazard baseline documentation, provide a technical basis for ensuring that the public and workers are protected. This Safety Basis Report has been developed to establish and document the safety basis of the current site characterization activities, establish and document the hazard baseline, and provide the technical basis for identifying structures, systems, and components (SSCs) that perform functions necessary to protect the public, the worker, and the environment from hazards unique to the YMP site characterization activities. This technical basis for identifying SSCs serves as a grading process for the implementation of programs such as Conduct of Operations (DOE Order 5480.19) and the Suspect/Counterfeit Items Program. In addition, this report provides a consolidated summary of the hazards analyses processes developed to support the design, construction, and operation of the YMP site characterization facilities and, therefore, provides a tool for evaluating the safety impacts of changes to the design and operation of the YMP site characterization activities.

  16. Assessing the threat of firearms: new threat formula, resources, and ontological linking algorithms

    NASA Astrophysics Data System (ADS)

    Hempelmann, Christian F.; Arslan, Abdullah N.; Attardo, Salvatore; Blount, Grady P.; Sirakov, Nikolay Metodiev

    2014-06-01

    The present work is part of an ongoing larger project.2, 3, 11, 12 The goal of this project is to develop a system capable of automatic threat assessment for instances of firearms use in public places. The main components of the system are: an ontology of firearms;1, 14 algorithms to create the visual footprint of the firearms,1, 14 to compare visual information,2, 3, 11, 12 to facilitate search in the ontology, and to generate the links between the conceptual and visual ontologies; as well as a formula to calculate the threat of individual firearms, firearms classes, and ammunition types in different environments. One part of the dual-level ontology for the properties of the firearms captures key visual features used to identify their type or class in images, while the other part captures their threat-relevant conceptual properties. The visual ontology is the result of image segmentation and matching methods, while the conceptual ontology is designed using knowledge-engineering principles and populated semi-automatically from Web resources. The focus of the present paper is two-fold. On the one hand, we will report on an update of the initial threat formula, based on the substantially increased population of the firearm ontology, including ammunition types and comparisons to actual incidents, and allowing for an overall more accurate assessment. On the other hand, the linking algorithms between the visual and conceptual ontologies are elaborated for faster transfer of information leading to an improvement in accuracy of the threat assessment.

  17. Modelling ultraviolet threats

    NASA Astrophysics Data System (ADS)

    James, I.

    2016-10-01

    Electro-optically (EO) guided surface to air missiles (SAM) have developed to use Ultraviolet (UV) wavebands supplementary to the more common Infrared (IR) wavebands. Missiles such as the US Stinger have been around for some time but are not considered a proliferation risk. The Chinese FN-16 and Russian SA-29 (Verba) are considered a much higher proliferation risk. As a result, models of the missile seekers must be developed to understand the characteristics of the seeker and the potential performance enhancement that are included. Therefore, the purpose of this paper is to introduce the steps that have been taken to characterise and model these missiles. It begins by outlining some of the characteristics of the threats, the key elements of a UV scene, the potential choice of waveband for a detector, the initial modelling work to represent the UV detector of the missile and presents initial results. The modelling shows that the UV detection range of a typical aircraft is dependent on both the size of the aircraft and its reflectivity. However, the strength of this correlation is less than expected. As a result, further work is required to model more seeker types and to investigate what is causing the weak correlations found in these initial investigations. In addition, there needs to be further study of the sensitivities of the model to other variables, such as the modelled detectivity of the detector and the signal to noise ratio assumed. Overall, the outcome of this work will be to provide specifications for aircraft size and reflectivity that limit the effectiveness of the UV channels.

  18. Managing biosecurity threats in China.

    PubMed

    Huang, Yanzhong

    2011-03-01

    Compared to the extensive literature on bioterrorism and biosecurity in the United States, less analysis has been conducted on similar challenges in China. This article seeks to fill this void by providing an integrated and updated assessment of 3 major biosecurity threats China faces: biowarfare, bioterrorism, and biocrimes. An analysis of China's biosecurity threats and biodefense building suggest varying levels of risk associated with each threat type. First, a direct bioweapons attack on China is highly unlikely, although the threat of biowarfare cannot be simply written off. Second, potential perpetrators of bioterrorism have capabilities at their disposal for carrying out such attacks. While terrorist organizations in China do not have a strong interest in bioterrorism, the limited state capability to counter such a threat may increase the risk in the future. Third, unlike the threats of biowarfare and bioterrorism, potential perpetrators of biocrimes have both incentives and capabilities, and biocrimes can produce reactions far out of proportion to the actual number of casualties. Despite the distinct biosecurity challenges it faces, China has yet to articulate a differentiated and coherent strategy to effectively tackle the challenges. Assessing different types of biosecurity threats in terms of degrees of risk not only provides greater analytical clarity but also has important implications for the strategies required to manage the risks.

  19. In Brief: Forecasting meningitis threats

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  20. Defense Against Threat. Threat Recognition and Analysis Project

    DTIC Science & Technology

    1975-09-01

    effort has been mounted in dttta gathering and in threat evaluation. !t is an understandable reaction that individuals who have devoted whole...Here, the theoretical consideration appears that the urge to mount collective action In defense against threats must be expected to be directed through...ACTIVITIES INCOMPATIBLE WITH HIS DIPLOMATIC STATUS^HN MOUNTS DIPLOMATIC ATTACKS ON USA IN INDOCI!! NA+03SERVERS BELIEVE CHN WILL NOW

  1. Insider Threat and Information Security Management

    NASA Astrophysics Data System (ADS)

    Coles-Kemp, Lizzie; Theoharidou, Marianthi

    The notion of insider has multiple facets. An organization needs to identify which ones to respond to. The selection, implementetion and maintenance of information security countermeasures requires a complex combination of organisational policies, functions and processes, which form Information Security Management. This chapter examines the role of current information security management practices in addressing the insider threat. Most approaches focus on frameworks for regulating insider behaviour and do not allow for the various cultural responses to the regulatory and compliance framework. Such responses are not only determined by enforcement of policies and awareness programs, but also by various psychological and organisational factors at an individual or group level. Crime theories offer techniques that focus on such cultural responses and can be used to enhance the information security management design. The chapter examines the applicability of several crime theories and concludes that they can contribute in providing additional controls and redesign of information security management processes better suited to responding to the insider threat.

  2. Bomb Threat Becomes Real News.

    ERIC Educational Resources Information Center

    Gastaldo, Evann

    1999-01-01

    Discusses how the staff of the newspaper at Camarillo High School (California) covered a bomb threat at their school. Describes how they, overnight, conducted interviews, took and developed photographs, produced the layout, and published the newspaper. (RS)

  3. Using protein design algorithms to understand the molecular basis of disease caused by protein-DNA interactions: the Pax6 example.

    PubMed

    Alibés, Andreu; Nadra, Alejandro D; De Masi, Federico; Bulyk, Martha L; Serrano, Luis; Stricher, François

    2010-11-01

    Quite often a single or a combination of protein mutations is linked to specific diseases. However, distinguishing from sequence information which mutations have real effects in the protein's function is not trivial. Protein design tools are commonly used to explain mutations that affect protein stability, or protein-protein interaction, but not for mutations that could affect protein-DNA binding. Here, we used the protein design algorithm FoldX to model all known missense mutations in the paired box domain of Pax6, a highly conserved transcription factor involved in eye development and in several diseases such as aniridia. The validity of FoldX to deal with protein-DNA interactions was demonstrated by showing that high levels of accuracy can be achieved for mutations affecting these interactions. Also we showed that protein-design algorithms can accurately reproduce experimental DNA-binding logos. We conclude that 88% of the Pax6 mutations can be linked to changes in intrinsic stability (77%) and/or to its capabilities to bind DNA (30%). Our study emphasizes the importance of structure-based analysis to understand the molecular basis of diseases and shows that protein-DNA interactions can be analyzed to the same level of accuracy as protein stability, or protein-protein interactions.

  4. Combating the Insider Cyber Threat

    SciTech Connect

    Greitzer, Frank L.; Moore, Andrew P.; Cappelli, Dawn M.; Andrews, Dee H.; Carroll, Lynn; Hull, Thomas D.

    2008-01-02

    This article represents a collaboration between PNNL, CERT/CMU, and AFRL that describes needs and related efforts by these institutions to develop technologies and approaches to counter cyber threats by insiders to informatin systems. The main focus of this article is on the need for effective training on insider threat to raise staff awareness and encourage organizations to adopt a more effective approach to identifying potential risks and take proactive steps to mitigate them.

  5. On NEO Threat Mitigation (Preprint)

    DTIC Science & Technology

    2007-10-15

    high level of authority. II. Threat Definition The threat posed by the impact of asteroids and comets with the Earth has been well publicized... asteroids , which spend most of their time within the Earth orbit but are crossing it. The rate of active comets dropping within the inner solar...extinction-class events, due to their significant mass but also their much higher kinetic energy compared to asteroids . Furthermore, comets are more likely

  6. Threat Modelling Adobe PDF

    DTIC Science & Technology

    2012-08-01

    on the MS Windows Server, Sun Solaris , IBM AIX, Red Hat or SUSE platforms. Figure 15. A registry setting for the Adobe Reader lockdown If an...be typed into the Acrobat console and executed. The console is designed for testing. 3. Batch JavaScript: a powerful batch system for the execution

  7. Cyber threat model for tactical radio networks

    NASA Astrophysics Data System (ADS)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  8. Recent advances in the development of a novel aerosol sorting and deposition system for bio-threat sensing applications

    NASA Astrophysics Data System (ADS)

    Pletcher, Timothy; McGinn, Joseph; Keller, David; Huston, Alan; Eversole, Jay; Sivaprakasum, Vasanthi

    2007-10-01

    Sarnoff Corporation and the Naval Research Laboratory, through support of the U.S. Department of Homeland Security, are developing an automated, high throughput bio-aerosol physical enrichment system designed for use as part of a biological-threat protection system. The Biological Aerosol-Capture-Enrichment (BioACE) system is a bio-aerosol collection system that combines three unique technologies to create physically enriched aerosol samples that can be subsequently interrogated by any number of bio-threat detection systems for the presence of threat agents. An air-to-air concentrator uses an inertial separation technique to highly concentrate an aerosol sample presented to a dual wavelength ultra-violet laser induced fluorescence (UVLIF) optical trigger used to discriminate potential threat particles from non-threat particles conveyed in a collimated particle stream. This particle classification information is used to trigger an electrostatic deposition mechanism to deposit only those particles determined to be potential bio-threats onto a stainless steel substrate. Non-threat particles are discarded with the exiting airflow. The goal for the most recent development effort has been the integration and optimization of these technologies into a unit capable of producing highly enriched particulate samples from ambient air containing variable background aerosol loading and type. Several key technical and engineering challenges were overcome during the course of this development including a unique solution for compensating particle velocity dispersion within the airflow, development of a real-time signal acquisition and detection algorithm for determining material type on a particle by particle basis at rates greater than 2000 particles per second, and the introduction of a robust method for transferring deposited particulate into a 50ul wet sample suitable for most advanced bio-detection techniques. This paper will briefly describe the overall system architecture and

  9. 340 waste handling facility interim safety basis

    SciTech Connect

    VAIL, T.S.

    1999-04-01

    This document presents an interim safety basis for the 340 Waste Handling Facility classifying the 340 Facility as a Hazard Category 3 facility. The hazard analysis quantifies the operating safety envelop for this facility and demonstrates that the facility can be operated without a significant threat to onsite or offsite people.

  10. The Social Construction of the Soviet Threat.

    ERIC Educational Resources Information Center

    Nathanson, Charles E.; Skelly, James M.

    For almost 40 years the perception of a Soviet threat has influenced much foreign and domestic political behavior in the United States. How to respond to the threat has been a subject of intense debate, but the reality of the threat has been taken for granted. Conviction about the reality of this threat dates back to George Kennan's long telegram…

  11. Comparative Environmental Threat Analysis: Three Case Studies.

    ERIC Educational Resources Information Center

    Latour, J. B.; Reiling, R.

    1994-01-01

    Reviews how carrying capacity for different environmental problems is operationalized. Discusses whether it is possible to compare threats, using the exceeding of carrying capacity as a yardstick. Points out problems in comparative threat analysis using three case studies: threats to European groundwater resources, threats to ecosystems in Europe,…

  12. Cyber threats within civil aviation

    NASA Astrophysics Data System (ADS)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  13. Computer-assisted threat evaluation

    NASA Astrophysics Data System (ADS)

    Bains, Jatin S.; Davies, Livingston

    2006-05-01

    The use of a CATE (Computer Assisted Threat Evaluation) System in the Maritime Domain lends itself technically and operationally to data exploitation thru the use of domain forensics and link analysis of fragmented information utilizing data prioritization and suspicion indicators for an aggressor's method of operation. The timely availability of threat mitigating actionable information is one of the key tools for success in the Global War On Terror (GWOT). The global supply chain is vulnerable to exploitation by nefarious individuals, governments, and terrorist organizations. For example, Figure 1 illustrates one of many potential methods that could be used to circumvent regulations limiting proliferation of WMDs.

  14. Identifying chemicals that are planetary boundary threats.

    PubMed

    MacLeod, Matthew; Breitholtz, Magnus; Cousins, Ian T; de Wit, Cynthia A; Persson, Linn M; Rudén, Christina; McLachlan, Michael S

    2014-10-07

    Rockström et al. proposed a set of planetary boundaries that delimit a "safe operating space for humanity". Many of the planetary boundaries that have so far been identified are determined by chemical agents. Other chemical pollution-related planetary boundaries likely exist, but are currently unknown. A chemical poses an unknown planetary boundary threat if it simultaneously fulfills three conditions: (1) it has an unknown disruptive effect on a vital Earth system process; (2) the disruptive effect is not discovered until it is a problem at the global scale, and (3) the effect is not readily reversible. In this paper, we outline scenarios in which chemicals could fulfill each of the three conditions, then use the scenarios as the basis to define chemical profiles that fit each scenario. The chemical profiles are defined in terms of the nature of the effect of the chemical and the nature of exposure of the environment to the chemical. Prioritization of chemicals in commerce against some of the profiles appears feasible, but there are considerable uncertainties and scientific challenges that must be addressed. Most challenging is prioritizing chemicals for their potential to have a currently unknown effect on a vital Earth system process. We conclude that the most effective strategy currently available to identify chemicals that are planetary boundary threats is prioritization against profiles defined in terms of environmental exposure combined with monitoring and study of the biogeochemical processes that underlie vital Earth system processes to identify currently unknown disruptive effects.

  15. Dimensions of early experience and neural development: deprivation and threat.

    PubMed

    Sheridan, Margaret A; McLaughlin, Katie A

    2014-11-01

    Over the past decade, a growing area of research has focused on adverse childhood experiences (ACEs) and their impacts on neural and developmental outcomes. Work in the field to-date has generally conceptualized ACEs in terms of exposure to stress while overlooking the underlying dimensions of environmental experience that may distinctly impact neural development. Here, we propose a novel framework that differentiates between deprivation (absence of expected cognitive and social input) and threat (presence of a threat to one's physical integrity). We draw support for the neural basis of this distinction from studies on fear learning and sensory deprivation in animals to highlight potential mechanisms through which experiences of threat and deprivation could affect neural structure and function in humans.

  16. Design of hybrid radial basis function neural networks (HRBFNNs) realized with the aid of hybridization of fuzzy clustering method (FCM) and polynomial neural networks (PNNs).

    PubMed

    Huang, Wei; Oh, Sung-Kwun; Pedrycz, Witold

    2014-12-01

    In this study, we propose Hybrid Radial Basis Function Neural Networks (HRBFNNs) realized with the aid of fuzzy clustering method (Fuzzy C-Means, FCM) and polynomial neural networks. Fuzzy clustering used to form information granulation is employed to overcome a possible curse of dimensionality, while the polynomial neural network is utilized to build local models. Furthermore, genetic algorithm (GA) is exploited here to optimize the essential design parameters of the model (including fuzzification coefficient, the number of input polynomial fuzzy neurons (PFNs), and a collection of the specific subset of input PFNs) of the network. To reduce dimensionality of the input space, principal component analysis (PCA) is considered as a sound preprocessing vehicle. The performance of the HRBFNNs is quantified through a series of experiments, in which we use several modeling benchmarks of different levels of complexity (different number of input variables and the number of available data). A comparative analysis reveals that the proposed HRBFNNs exhibit higher accuracy in comparison to the accuracy produced by some models reported previously in the literature.

  17. An approach to estimating radiological risk of offsite release from a design basis earthquake for the Process Experimental Pilot Plant (PREPP)

    SciTech Connect

    Lucero, V.; Meale, B.M.; Reny, D.A.; Brown, A.N.

    1990-09-01

    In compliance with Department of Energy (DOE) Order 6430.1A, a seismic analysis was performed on DOE's Process Experimental Pilot Plant (PREPP), a facility for processing low-level and transuranic (TRU) waste. Because no hazard curves were available for the Idaho National Engineering Laboratory (INEL), DOE guidelines were used to estimate the frequency for the specified design-basis earthquake (DBE). A dynamic structural analysis of the building was performed, using the DBE parameters, followed by a probabilistic risk assessment (PRA). For the PRA, a functional organization of the facility equipment was effected so that top events for a representative event tree model could be determined. Building response spectra (calculated from the structural analysis), in conjunction with generic fragility data, were used to generate fragility curves for the PREPP equipment. Using these curves, failure probabilities for each top event were calculated. These probabilities were integrated into the event tree model, and accident sequences and respective probabilities were calculated through quantification. By combining the sequences failure probabilities with a transport analysis of the estimated airborne source term from a DBE, onsite and offsite consequences were calculated. The results of the comprehensive analysis substantiated the ability of the PREPP facility to withstand a DBE with negligible consequence (i.e., estimated release was within personnel and environmental dose guidelines). 57 refs., 19 figs., 20 tabs.

  18. Effects of non-latching blast valves on the source term and consequences of the design-basis accidents in the Device Assembly Facility (DAF)

    SciTech Connect

    Nguyen, D.H.

    1993-08-01

    The analysis of the Design-Basis Accidents (DBA) involving high explosives (HE) and Plutonium (Pu) in the assembly cell of the Device Assembly Facility (DAF), which was completed earlier, assumed latching blast valves in the ventilation system of the assembly cell. Latching valves effectively sealed a release path through the ventilation duct system. However, the blast valves in the assembly cell, as constructed are actually non-latching valves, and would reopen when the gas pressure drops to 0.5 psi above one atmosphere. Because the reopening of the blast valves provides an additional release path to the environment, and affects the material transport from the assembly cell to other DAF buildings, the DOE/NV DAF management has decided to support an additional analysis of the DAF`s DBA to account for the effects of non-latching valves. Three cases were considered in the DAF`s DBA, depending on the amount of HE and Pu involved, as follows: Case 1 -- 423 {number_sign}HE, 16 kg Pu; Case 2 -- 150 {number_sign}HE 10 kg Pu; Case 3 -- 55 {number_sign}HE 5 kg Pu. The results of the analysis with non-latching valves are summarized.

  19. Cyber Threats to Nuclear Infrastructures

    SciTech Connect

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  20. Parking garage threats and countermeasures.

    PubMed

    Clark, Sam

    2004-01-01

    Preventing and dealing with crime in hospital parking facilities poses a serious challenge to administration and security. Multiple methods to effectively combat the threats are described by the author, but their implementation depends on how seriously a healthcare organization views its responsibility to provide a safe and secure environment for its staff, patients and visitors.

  1. Bomb Threats Taking Financial Toll

    ERIC Educational Resources Information Center

    Bowman, Darcia Harris

    2004-01-01

    Despite all its efforts to crack down on the bomb scares that disrupted classes again and again in 2003, North Carolina's Orange County district fell victim to yet another false alarm this school year, 2004. For some schools, bomb threats have become more routine than fire drills, with each incident ringing up multi-thousand-dollar tabs for…

  2. Meteoroids and Meteor Storms: A Threat to Spacecraft

    NASA Technical Reports Server (NTRS)

    Anderson, B. Jeffrey

    1999-01-01

    Robust system design is the best protection against meteoroid damage. Impacts by small meteoroids are common on satellite surfaces, but impacts by meteoroids large enough to damage well designed systems are very rare. Estimating the threat from the normal meteoroid environment is difficult. Estimates for the occasional "storm" are even more uncertain. Common sense precautions are in order for the 1999 Leonids, but wide-spread catastrophic damage is highly unlikely. Strong Leonid showers are also expected in 2000 and 2001, but these pose much less threat than 1999.

  3. Brain Mechanisms of Social Threat Effects on Working Memory

    PubMed Central

    van Ast, V. A.; Spicer, J.; Smith, E. E.; Schmer-Galunder, S.; Liberzon, I.; Abelson, J. L.; Wager, T. D.

    2016-01-01

    Social threat can have adverse effects on cognitive performance, but the brain mechanisms underlying its effects are poorly understood. We investigated the effects of social evaluative threat on working memory (WM), a core component of many important cognitive capabilities. Social threat impaired WM performance during an N-back task and produced widespread reductions in activation in lateral prefrontal cortex and intraparietal sulcus (IPS), among other regions. In addition, activity in frontal and parietal regions predicted WM performance, and mediation analyses identified regions in the bilateral IPS that mediated the performance-impairing effects of social threat. Social threat also decreased connectivity between the IPS and dorsolateral prefrontal cortex, while increasing connectivity between the IPS and the ventromedial prefrontal cortex, a region strongly implicated in the generation of autonomic and emotional responses. Finally, cortisol response to the stressor did not mediate WM impairment but was rather associated with protective effects. These results provide a basis for understanding interactions between social and cognitive processes at a neural systems level. PMID:25249408

  4. The effect of threat on attentional interruption by pain.

    PubMed

    Moore, David J; Keogh, Edmund; Eccleston, Christopher

    2013-01-01

    Pain is known to interrupt attention. This interruption is highly sensitive to the extent of involvement of both attentional control and the level of threat associated with the sensation. However, few studies have examined these factors together. This study aimed to examine the interruptive effect of pain on higher-order attentional tasks under conditions of low and high threat. Fifty participants completed an n-back task, an attentional switching task, and a divided attention task, once in pain and once without pain. Twenty-five participants were given standard task instructions (control condition), and the remainder were given additional verbal information designed to increase threat (threat condition). Pain interrupted participant performance on both the n-back and attentional switching task, but not on the divided attention task. The addition of the threat manipulation did not seem to significantly alter the effect of pain on these attentional tasks. However, independent of pain, threat did moderate performance on the divided attention task. These findings support the robustness of the effect of pain on performance on higher-order attention tasks. Future research is needed to examine what factors alter the cognitive interruption caused by pain.

  5. Attention to Threats and Combat-Related Posttraumatic Stress Symptoms

    PubMed Central

    Wald, Ilan; Degnan, Kathryn A.; Gorodetsky, Elena; Charney, Dennis S.; Fox, Nathan A.; Fruchter, Eyal; Goldman, David; Lubin, Gad; Pine, Daniel S.; Bar-Haim, Yair

    2015-01-01

    Importance Combat places soldiers at risk for post-traumatic stress disorder (PTSD). The excessive rates of PTSD and other adjustment disorders in soldiers returning home make it imperative to identify risk and resilience factors that could be targeted by novel therapeutic treatments. Objective To investigate the interplay among attention to threat, combat exposure, and other risk factors for PTSD symptoms in soldiers deployed to combat. Design and Setting Longitudinal prospective study of Israeli Defense Force infantry soldiers carried out in 2008 through 2010. Repeated measurements during a 1-year period included baseline and predeployment data collected in training camps and deployment data collected in the combat theater. Participants Infantry soldiers (1085 men; mean age,18.8 years). Main Outcome Measures Postcombat PTSD symptoms. Results Soldiers developed threat vigilance during combat deployment, particularly when they were exposed to high-intensity combat, as indicated by faster response times to targets appearing at the location of threat relative to neutral stimuli (P < .001). Threat-related attention bias also interacted with combat exposure to predict risk for PTSD (P <.05). Bias toward threat at recruitment (P <.001) and bias away from threat just before deployment (P < .05) predicted postcombat PTSD symptoms. Moreover, these threat-related attention associations with PTSD were moderated by genetic and environmental factors, including serotonin transporter (5-HTTLPR) genotype. Conclusions and Relevance Combat exposure interacts with threat-related attention to place soldiers at risk for PTSD, and interactions with other risk factors account for considerable variance in PTSD vulnerability. Understanding these associations informs research on novel attention bias modification techniques and prevention of PTSD. PMID:23407816

  6. Integrated Cognitive-neuroscience Architectures for Understanding Sensemaking (ICArUS): A Computational Basis for ICArUS Challenge Problem Design

    DTIC Science & Technology

    2014-11-01

    Integrated Cognitive- neuroscience Architectures for Understanding Sensemaking (ICArUS): A Computational Basis for ICArUS Challenge...4. TITLE AND SUBTITLE Integrated Cognitive- neuroscience Architectures for Understanding Sensemaking (ICArUS): A Computational Basis for ICArUS...Advanced Research Projects Activity) program ICArUS (Integrated Cognitive- neuroscience Architectures for Understanding Sensemaking) requires

  7. Enzymatic activation of double-targeted 5'-O-L-valyl-decitabine prodrug by biphenyl hydrolase-like protein and its molecular design basis.

    PubMed

    Tao, Wenhui; Zhao, Dongyang; Sun, Mengchi; Li, Meng; Zhang, Xiangyu; He, Zhonggui; Sun, Yinghua; Sun, Jin

    2017-04-01

    A primary focus of this research was to explore the activation process and mechanism of decitabine (5-aza-2'-deoxycytidine, DAC) prodrug. Recently, it has been reported that biphenyl hydrolase-like protein (BPHL) can play an important role in the activation of some amino acid nucleoside prodrugs with a general preference for hydrophobic amino acids and 5'-esters. Therefore, we put forward a bold hypothesis that this novel enzyme may be primarily responsible for the activation process of DAC prodrug as well. 5'-O-L-valyl-decitabine (L-val-DAC) was synthesized before and can be transported across biological membranes by the oligopeptide transporter (PEPT1), granting it much greater utility in vivo. In this report, L-val-DAC was found to be a good substrate of BPHL protein (K m 0.59 mM; k cat/K m 553.69 mM(-1) s(-1)). After intestinal absorption, L-val-DAC was rapidly and almost completely hydrolyzed to DAC and L-valine. The catalysis was mainly mediated by the BPHL hydrolase and resulted in the intestinal first-pass effect of L-val-DAC after oral administration in Sprague-Dawley rats with cannulated jugular and portal veins. The structural insights using computational molecular docking showed that BPHL had a unique binding mode for L-val-DAC. As a fundamental basis, the simulation was employed to explain the catalytic mechanism in molecular level. In conclusion, BPHL was at least one of the primary candidate enzymes for L-val-DAC prodrug activation. This promising double-targeted prodrug approach have more advantages than the traditional targeted designs due to its higher transport and more predictable activation, thereby leading to a favorable property for oral delivery.

  8. Monitoring Technologies for Mitigating Insider Threats

    NASA Astrophysics Data System (ADS)

    Bowen, Brian M.; Salem, Malek Ben; Keromytis, Angelos D.; Stolfo, Salvatore J.

    In this chapter, we propose a design for an insider threat detection system that combines an array of complementary techniques that aims to detect evasive adversaries. We are motivated by real world incidents and our experience with building isolated detectors: such standalone mechanisms are often easily identified and avoided by malefactors. Our work-in-progress combines host-based user-event monitoring sensors with trap-based decoys and remote network detectors to track and correlate insider activity. We introduce and formalize a number of properties of decoys as a guide to design trap-based defenses to increase the likelihood of detecting an insider attack. We identify several challenges in scaling up, deploying, and validating our architecture in real environments.

  9. Zika Still a Threat During Winter Months

    MedlinePlus

    ... page: https://medlineplus.gov/news/fullstory_162518.html Zika Still a Threat During Winter Months Public health ... doesn't necessarily mean the end of the Zika threat in the United States, a public health ...

  10. Defeating the Modern Asymmetric Threat

    DTIC Science & Technology

    2002-06-01

    prolific use of suicide bombers by the LTTE: one strategic, one operational, one psychological and one religious. Chapter V conducts an analysis of...and responsive government) are the applicable variables in defeating the modern asymmetric threat, even those that employ suicide bombers. I...future. 15. NUMBER OF PAGES 171 14. SUBJECT TERMS Sri Lanka, LTTE, Ethnic Conflict, Asymmetry, Suicide Terrorism, Foreign Internal Defense

  11. Unintentional Insider Threats: Social Engineering

    DTIC Science & Technology

    2014-01-01

    sensitive information posted publicly on a website, mishandled, or sent to the wrong party via email, fax, or mail • UIT- HACK , or malicious code (UIT... HACKing , malware/spyware)—an outsider’s electronic entry acquired through social engineering (e.g., phishing email attack, planted or unauthorized USB...with PHYS, 28% with PORT, and 17% with UIT- HACK . With nearly half of the incidents falling in the DISC 4 We use the term threat vector, instead

  12. National Strategy, Future Threats and Defense Spending

    DTIC Science & Technology

    1992-06-05

    AD-A256 884 NATIONAL STRATEGY, FUTURE THREATS AND DEFENSE SPENDING A thesis presented to the Faculty of the U.S. Army Command and General Staff...Jun 92 4. TITLE AND SUBTITLE S. FUNDING NUMBERS National Strategy, Future Threats and Defense Spending 6. AUTHOR(S) MAJ Daniel M. Gerstein, USA 7...Future Threats, Defense Spending , 192 Regional Threats 16. PRICE COOE 17. SECURITY CLASSIFICATION 118. SECURITY CLASSIFICATION 19. SECURITY

  13. Threat Assessment Teams Target School Crisis

    ERIC Educational Resources Information Center

    Stover, Del

    2005-01-01

    In this article, the author discusses the creation of a threat-assessment team to be utilized in order to analyze each threat and the usage of threat-assessment protocols for the purpose of guiding school administrators through a crisis. These are actually developed with the advice from the US Department of Education and the Secret Service. When a…

  14. Stereotype Threat, Test Anxiety, and Mathematics Performance

    ERIC Educational Resources Information Center

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  15. Perfectionism Moderates Stereotype Threat Effects on STEM Majors' Academic Performance

    ERIC Educational Resources Information Center

    Rice, Kenneth G.; Lopez, Frederick G.; Richardson, Clarissa M. E.; Stinson, Jennifer M.

    2013-01-01

    Using a randomized, between-subjects experimental design, we tested hypotheses that self-critical perfectionism would moderate the effects of subtle stereotype threat (ST) for women and students in underrepresented racial/ethnic groups who are pursuing traditional degrees in science, technology, engineering, or math (STEM). A diverse sample of…

  16. There is more than the amygdala: potential threat assessment in the cingulate cortex.

    PubMed

    Fiddick, Laurence

    2011-03-01

    Fear conditioning with its neurological basis in the amygdala and associated structures provides an important model of anxiety disorders. However, this review will argue for a distinction between fear-provoking immediate and anxiety-provoking potential threats, with the amygdala processing immediate threats and the cingulate cortex (and insular) processing potential threats. Four independent but related literatures are reviewed to bolster this argument: (1) rodent remote contextual fear conditioning, (2) symptom provocation in obsessive compulsive disorder (OCD), (3) fMRI investigations of risk assessment, and (4) behavioural and neurological studies of precautionary reasoning. These four literatures converge in suggesting that the cingulate cortex (and in more specific instances the insula) underlie potential threat assessment, providing support for a number of recent models posting the existence of a separate potential threat system that is dysfunctional in obsessive compulsive disorder (e.g., Szechtman and Woody, 2004; Woody and Szechtman, 2011).

  17. Novel Threat-risk Index Using Probabilistic Risk Assessment and Human Reliability Analysis - Final Report

    SciTech Connect

    George A. Beitel

    2004-02-01

    In support of a national need to improve the current state-of-the-art in alerting decision makers to the risk of terrorist attack, a quantitative approach employing scientific and engineering concepts to develop a threat-risk index was undertaken at the Idaho National Engineering and Environmental Laboratory (INEEL). As a result of this effort, a set of models has been successfully integrated into a single comprehensive model known as Quantitative Threat-Risk Index Model (QTRIM), with the capability of computing a quantitative threat-risk index on a system level, as well as for the major components of the system. Such a threat-risk index could provide a quantitative variant or basis for either prioritizing security upgrades or updating the current qualitative national color-coded terrorist threat alert.

  18. Stereotype threat and female communication styles.

    PubMed

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  19. Threats to Networked RFID Systems

    NASA Astrophysics Data System (ADS)

    Mitrokotsa, Aikaterini; Beye, Michael; Peris-Lopez, Pedro

    RFID technology is an area currently undergoing active development. An issue, which has received a lot of attention, is the security risks that arise due to the inherent vulnerabilities of RFID technology. Most of this attention, however, has focused on related privacy issues. The goal of this chapter is to present a more global overview of RFID threats. This can not only help experts perform risk analyses of RFID systems but also increase awareness and understanding of RFID security issues for non-experts. We use clearly defined and widely accepted concepts from both the RFID area and classical risk analysis to structure this overview.

  20. [Modern threat of Ebola virus].

    PubMed

    Płusa, Tadeusz

    2014-11-01

    Since the detection of Ebola virus in 1976. recorded 13 major epidemics in Africa. The current threat in Guinea, Liberia and Sierra Leone absorbs another victims and threatened pandemic. Picture of the disease is initially very non-characteristic (influenza-like symptoms) and quickly leads to dehydration, shock and disseminated intravascular coagulation syndrome, which is responsible for high mortality. Lack of effective antibiotic therapy and vaccine hampers the existing situation. For this reason, there is an absolute necessity to introduce regimes sanitation, quarantine at the suspects and maintain the highest safety measures for emergency responders. Developed procedures require absolute compliance.

  1. Teens impulsively react rather than retreat from threat.

    PubMed

    Dreyfuss, Michael; Caudle, Kristina; Drysdale, Andrew T; Johnston, Natalie E; Cohen, Alexandra O; Somerville, Leah H; Galván, Adriana; Tottenham, Nim; Hare, Todd A; Casey, B J

    2014-01-01

    There is a significant inflection in risk taking and criminal behavior during adolescence, but the basis for this increase remains largely unknown. An increased sensitivity to rewards has been suggested to explain these behaviors, yet juvenile offences often occur in emotionally charged situations of negative valence. How behavior is altered by changes in negative emotional processes during adolescence has received less attention than changes in positive emotional processes. The current study uses a measure of impulsivity in combination with cues that signal threat or safety to assess developmental changes in emotional responses to threat cues. We show that adolescents, especially males, impulsively react to threat cues relative to neutral ones more than adults or children, even when instructed not to respond. This adolescent-specific behavioral pattern is paralleled by enhanced activity in limbic cortical regions implicated in the detection and assignment of emotional value to inputs and in the subsequent regulation of responses to them when successfully suppressing impulsive responses to threat cues. In contrast, prefrontal control regions implicated in detecting and resolving competing responses show an adolescent-emergent pattern (i.e. greater activity in adolescents and adults relative to children) during successful suppression of a response regardless of emotion. Our findings suggest that adolescence is a period of heightened sensitivity to social and emotional cues that results in diminished regulation of behavior in their presence.

  2. Threat detection system for intersection collision avoidance

    NASA Astrophysics Data System (ADS)

    Jocoy, Edward H.; Pierowicz, John A.

    1998-01-01

    Calspan SRL Corporation is currently developing an on- vehicle threat detection system for intersection collision avoidance (ICA) as part of its ICA program with the National Highway Transportation Safety Administration. Crash scenarios were previously defined and an on-board radar sensor was designed. This paper describes recent efforts that include the development of a simulation of a multitarget tracker and collision avoidance algorithm used to predict system performance in a variety of target configurations in the various ICA crash scenarios. In addition, a current headway radar was mounted on the Calspan Instrumented Vehicle and in-traffic data were recorded for two limited crash scenarios. Warning functions were developed through the simulation and applied to the recorded data.

  3. RESPONSE PROTOCOL TOOLBOX: PLANNING FOR AND RESPONDING TO DRINKING WATER CONTAMINATION THREATS AND INCIDENTS. MODULE 1: WATER UTILITIES PLANNING GUIDE - INTERIM FINAL - DECEMBER 2003

    EPA Science Inventory

    The interim final Response Protocol Toolbox: Planning for and Responding to Contamination Threats to Drinking Water Systems is designed to help the water sector effectively and appropriately respond to intentional contamination threats and incidents. It was produced by EPA, buil...

  4. RESPONSE PROTOCOL TOOLBOX: PLANNING FOR AND RESPONDING TO DRINKING WATER CONTAMINATION THREATS AND INCIDENTS. OVERVIEW AND APPLICATION. INTERIM FINAL - DECEMBER 2003

    EPA Science Inventory

    The interim final Response Protocol Toolbox: Planning for and Responding to Contamination Threats to Drinking Water Systems is designed to help the water sector effectively and appropriately respond to intentional contamination threats and incidents. It was produced by EPA, buil...

  5. RESPONSE PROTOCOL TOOLBOX: PLANNING FOR AND RESPONDING TO DRINKING WATER CONTAMINATION THREATS AND INCIDENTS, MODULE 3: SITE CHARACTERIZATION AND SAMPLING GUIDE. INTERIM FINAL - DECEMBER 2003

    EPA Science Inventory

    The interim final Response Protocol Toolbox: Planning for and Responding to Contamination Threats to Drinking Water Systems is designed to help the water sector effectively and appropriately respond to intentional contamination threats and incidents. It was produced by EPA, buil...

  6. RESPONSE PROTOCOL TOOLBOX: PLANNING FOR AND RESPONDING TO DRINKING WATER CONTAMINATION THREATS AND INCIDENTS. MODULE 4: ANALYTICAL GUIDE. INTERIM FINAL - DECEMBER 2003

    EPA Science Inventory

    The interim final Response Protocol Toolbox: Planning for and Responding to Contamination Threats to Drinking Water Systems is designed to help the water sector effectively and appropriately respond to intentional contamination threats and incidents. It was produced by EPA, buil...

  7. Disrupting Threat Finances: Using Financial Information to Disrupt Terrorist Organizations

    DTIC Science & Technology

    2008-04-01

    organizations work together to meet the significant threat that terrorist networks pose to national sovereignty. In the U.S., we describe this situation as...both at home and abroad include a number of interdependent activities: a. Terrorist designation. First, the USG designates terrorists and then...cooperation and complete integration with intel- ligence activities, law enforcement officials will develop a better under- standing of the situation

  8. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    PubMed

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  9. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    PubMed Central

    Zhu, Yong; Zhao, Yufang; Ybarra, Oscar; Stephan, Walter G.; Yang, Qing

    2015-01-01

    Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes–Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants’ memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed. PMID:26635669

  10. Countering the Nuclear Terrorist Threat

    SciTech Connect

    Vantine, H C

    2002-10-04

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  11. Effect of evaluation threat on procrastination behavior.

    PubMed

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  12. World's soils are under threat

    NASA Astrophysics Data System (ADS)

    Montanarella, Luca; Pennock, Daniel Jon; McKenzie, Neil; Badraoui, Mohamed; Chude, Victor; Baptista, Isaurinda; Mamo, Tekalign; Yemefack, Martin; Singh Aulakh, Mikha; Yagi, Kazuyuki; Hong, Suk Young; Vijarnsorn, Pisoot; Zhang, Gan-Lin; Arrouays, Dominique; Black, Helaina; Krasilnikov, Pavel; Sobocká, Jaroslava; Alegre, Julio; Henriquez, Carlos Roberto; de Lourdes Mendonça-Santos, Maria; Taboada, Miguel; Espinosa-Victoria, David; AlShankiti, Abdullah; Kazem AlaviPanah, Sayed; El Mustafa Elsheikh, Elsiddig Ahmed; Hempel, Jon; Camps Arbestain, Marta; Nachtergaele, Freddy; Vargas, Ronald

    2016-02-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources Report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecurity among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the State of the World's Soil Resources Report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  13. World's soils are under threat

    NASA Astrophysics Data System (ADS)

    Montanarella, L.; Pennock, D. J.; McKenzie, N. J.; Badraoui, M.; Chude, V.; Baptista, I.; Mamo, T.; Yemefack, M.; Singh Aulakh, M.; Yagi, K.; Hong, S. Young; Vijarnsorn, P.; Zhang, G.-L.; Arrouays, D.; Black, H.; Krasilnikov, P.; Sobocká, J.; Alegre, J.; Henriquez, C. R.; Mendonça-Santos, M. L.; Taboada, M.; Espinosa-Victoria, D.; AlShankiti, A.; AlaviPanah, S. K.; Elsheikh, E. A. E.; Hempel, J.; Camps Arbestain, M.; Nachtergaele, F.; Vargas, R.

    2015-12-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecure among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the SWSR report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  14. Parasite threat to panda conservation.

    PubMed

    Zhang, Jin-Shuo; Daszak, Peter; Huang, Hua-Li; Yang, Guang-You; Kilpatrick, A Marm; Zhang, Shuyi

    2008-03-01

    The giant panda is a global symbol of wildlife conservation that is threatened by historic and current habitat loss. Despite a great deal of research on the physiology, reproductive biology, and diet of pandas in the wild and in captivity, there is little information on wild panda mortality. Here we integrate previously unavailable data on the mortality of wild pandas. We report on three recent phases of panda mortality: deaths due to bamboo flowering in the 1970s and 1980s, surprisingly extensive poaching in the 1980s and 1990s, and a parasitic infection over the past few years. Our analyses suggest that the current most significant threat to wild panda survival is disease due to extraintestinal migration (visceral larval migrans) by an ascarid nematode. We demonstrate that the probability of death of wild pandas being caused by this disease increased significantly between 1971 and 2005 and discuss the possible factors leading to the emergence of this disease.

  15. Insider Threat Mitigation Workshop Instructional Materials

    SciTech Connect

    Gibbs, Philip; Larsen, Robert; O'Brien, Mike; Rodriquez, Jose

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  16. A Description of a Design Method of a Claw Teeth Motor on the Basis of Three-Dimensional Reluctance Network Analysis

    NASA Astrophysics Data System (ADS)

    Mizuguchi, Takahiro; Nakamura, Kenji; Koyama, Takayuki; Ichinokura, Osamu

    Soft magnetic composites (SMCs) have the following advantages: three-dimensional magnetic isotropy, high resistivity, and recyclability. By using SMC, therefore, a new concept motor with a three-dimensional structure can be developed. Its power-to-space ratio and efficiency can be improved since the space factor of winding and the space utilization factor of the motor is increased. This paper describes a design method of a claw teeth motor made of SMC by reluctance network analysis (RNA)-based experimental design. First, a three-dimensional RNA model of the claw teeth motor is presented. Next, the RNA-based experimental design of the claw teeth motor is presented. As a result, the average torque is improved by approximately 50%. In addition, the calculation time required for the design is significantly reduced by the proposed design method.

  17. DOE site-specific threat assessment

    SciTech Connect

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-07-12

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs.

  18. Autonomous Realtime Threat-Hunting Robot (ARTHR

    ScienceCinema

    INL

    2016-07-12

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  19. Autonomous Realtime Threat-Hunting Robot (ARTHR

    SciTech Connect

    INL

    2008-05-29

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  20. Inferring the nature of anthropogenic threats from long-term abundance records.

    PubMed

    Shoemaker, Kevin T; Akçakaya, H Resit

    2015-02-01

    Diagnosing the processes that threaten species persistence is critical for recovery planning and risk forecasting. Dominant threats are typically inferred by experts on the basis of a patchwork of informal methods. Transparent, quantitative diagnostic tools would contribute much-needed consistency, objectivity, and rigor to the process of diagnosing anthropogenic threats. Long-term census records, available for an increasingly large and diverse set of taxa, may exhibit characteristic signatures of specific threatening processes and thereby provide information for threat diagnosis. We developed a flexible Bayesian framework for diagnosing threats on the basis of long-term census records and diverse ancillary sources of information. We tested this framework with simulated data from artificial populations subjected to varying degrees of exploitation and habitat loss and several real-world abundance time series for which threatening processes are relatively well understood: bluefin tuna (Thunnus maccoyii) and Atlantic cod (Gadus morhua) (exploitation) and Red Grouse (Lagopus lagopus scotica) and Eurasian Skylark (Alauda arvensis) (habitat loss). Our method correctly identified the process driving population decline for over 90% of time series simulated under moderate to severe threat scenarios. Successful identification of threats approached 100% for severe exploitation and habitat loss scenarios. Our method identified threats less successfully when threatening processes were weak and when populations were simultaneously affected by multiple threats. Our method selected the presumed true threat model for all real-world case studies, although results were somewhat ambiguous in the case of the Eurasian Skylark. In the latter case, incorporation of an ancillary source of information (records of land-use change) increased the weight assigned to the presumed true model from 70% to 92%, illustrating the value of the proposed framework in bringing diverse sources of

  1. Threat Theory: A Model for Forecasting the Threat Environment of the Future

    DTIC Science & Technology

    1993-05-14

    AD-A2 7 4 021 / Threat Theory: A Model for Forecasting the Threat Environment of the Future A Monograph by Lieutenant Colonel Larry D. Bruns Military...5. FUNDING NUMBERS THREAT THEORY. A MODEL FOR FORECASTING THREAT ENVIRONMENT OF THE FUTURE 6. AUTHOR(S) LTC LARRY D. BRUNS, USA 7. PERFORMING...PRICE CODE FORCE DEVELOPMENT 17. SECURITY CLASSIFICATION II8. SECURITY CLASSIFICATION 19. SECURITY CL.ASSIFICATION 20. LIMITATION Of ABSTRACT OF REPORT

  2. Integrated optic chip for laser threat identification

    NASA Astrophysics Data System (ADS)

    McAulay, Alastair D.

    2010-04-01

    In this conference last year, we proposed free-space gratings, Fizeau interferometers and wavefront estimation for detecting the different lasers deployed in the battlefield for range finding, target designation, communications, dazzle, location of targets, munitions guidance, and destruction. Since last year, advanced laser weapons of the electron cyclotron type, are in development, such as the free-electron laser, that are tunable and can, unlike conventional bound-electron state lasers, be used at any wavelength from microwaves to soft X-rays. We list the characteristics of the nine dominant laser weapons because we assume that the free-electron lasers will initially use one of the current threat wavelengths because of availability of components and instrumentation. In this paper we replace the free-space grating with a higher performing array waveguide grating integrated optic chip, similar to that used in telecommunications, because integrated circuits are more robust and less expensive. It consists of a star coupler that fans out amongst waveguides of different length followed by a star coupler that focuses different wavelengths to different outputs in order to separate them. Design equations are derived to cover a range of frequencies at specific frequency spacing relevant to this application.

  3. Shades of Threat: Racial Identity as a Moderator of Stereotype Threat

    ERIC Educational Resources Information Center

    Davis, Claytie, III; Aronson, Joshua; Salinas, Moises

    2006-01-01

    This study investigated Black racial identity attitudes as a moderator of intellectual performance in potentially stereotype threatening situations. Ninety-eight African American students were randomly assigned to one of three stereotype threatening conditions: low threat, medium threat, or high threat. Analyses confirmed a stereotype threat…

  4. Human threat management systems: self-protection and disease avoidance.

    PubMed

    Neuberg, Steven L; Kenrick, Douglas T; Schaller, Mark

    2011-03-01

    Humans likely evolved precautionary systems designed to minimize the threats to reproductive fitness posed by highly interdependent ultrasociality. A review of research on the self-protection and disease avoidance systems reveals that each system is functionally distinct and domain-specific: each is attuned to different cues; engages different emotions, inferences, and behavioral inclinations; and is rooted in somewhat different neurobiological substrates. These systems share important features, however. Each system is functionally coherent, in that perceptual, affective, cognitive, and behavioral processes work in concert to reduce fitness costs of potential threats. Each system is biased in a risk-averse manner, erring toward precautionary responses even when available cues only heuristically imply threat. And each system is functionally flexible, being highly sensitive to specific ecological and dispositional cues that signal greater vulnerability to the relevant threat. These features characterize a general template useful for understanding not only the self-protection and disease avoidance systems, but also a broader set of evolved, domain-specific precautionary systems.

  5. Measuring attentional biases for threat in children and adults.

    PubMed

    LoBue, Vanessa

    2014-10-19

    Investigators have long been interested in the human propensity for the rapid detection of threatening stimuli. However, until recently, research in this domain has focused almost exclusively on adult participants, completely ignoring the topic of threat detection over the course of development. One of the biggest reasons for the lack of developmental work in this area is likely the absence of a reliable paradigm that can measure perceptual biases for threat in children. To address this issue, we recently designed a modified visual search paradigm similar to the standard adult paradigm that is appropriate for studying threat detection in preschool-aged participants. Here we describe this new procedure. In the general paradigm, we present participants with matrices of color photographs, and ask them to find and touch a target on the screen. Latency to touch the target is recorded. Using a touch-screen monitor makes the procedure simple and easy, allowing us to collect data in participants ranging from 3 years of age to adults. Thus far, the paradigm has consistently shown that both adults and children detect threatening stimuli (e.g., snakes, spiders, angry/fearful faces) more quickly than neutral stimuli (e.g., flowers, mushrooms, happy/neutral faces). Altogether, this procedure provides an important new tool for researchers interested in studying the development of attentional biases for threat.

  6. Human Threat Management Systems: Self-Protection and Disease Avoidance

    PubMed Central

    Neuberg, Steven L.; Kenrick, Douglas T.; Schaller, Mark

    2010-01-01

    Humans likely evolved precautionary systems designed to minimize the threats to reproductive fitness posed by highly interdependent ultrasociality. A review of research on the self-protection and disease avoidance systems reveals that each system is functionally distinct and domain-specific: Each is attuned to different cues; engages different emotions, inferences, and behavioral inclinations; and is rooted in somewhat different neurobiological substrates. These systems share important features, however. Each system is functionally coherent, in that perceptual, affective, cognitive, and behavioral processes work in concert to reduce fitness costs of potential threats. Each system is biased in a risk-averse manner, erring toward precautionary responses even when available cues only heuristically imply threat. And each system is functionally flexible, being highly sensitive to specific ecological and dispositional cues that signal greater vulnerability to the relevant threat. These features characterize a general template useful for understanding not only the self-protection and disease avoidance systems, but also a broader set of evolved, domain-specific precautionary systems. PMID:20833199

  7. An Integrated Process Model of Stereotype Threat Effects on Performance

    PubMed Central

    Johns, Michael; Forbes, Chad

    2008-01-01

    Research showing that activation of negative stereotypes can impair the performance of stigmatized individuals on a wide variety of tasks has proliferated. However, a complete understanding of the processes underlying these stereotype threat effects on behavior is still lacking. The authors examine stereotype threat in the context of research on stress arousal, vigilance, working memory, and self-regulation to develop a process model of how negative stereotypes impair performance on cognitive and social tasks that require controlled processing, as well as sensorimotor tasks that require automatic processing. The authors argue that stereotype threat disrupts performance via 3 distinct, yet interrelated, mechanisms: (a) a physiological stress response that directly impairs prefrontal processing, (b) a tendency to actively monitor performance, and (c) efforts to suppress negative thoughts and emotions in the service of self-regulation. These mechanisms combine to consume executive resources needed to perform well on cognitive and social tasks. The active monitoring mechanism disrupts performance on sensorimotor tasks directly. Empirical evidence for these assertions is reviewed, and implications for interventions designed to alleviate stereotype threat are discussed. PMID:18426293

  8. The artificial heart's threat to others.

    PubMed

    Jonsen, A R

    1986-02-01

    A member of the two federal advisory panels on artificial hearts reflects that the nuclear-powered artificial heart, had it been developed, would have posed a physical threat to others. Today's artificial heart poses a different threat. Because of the high costs, many people may be deprived of access to other forms of medical care and other social goods.

  9. Keeping Schools Safe through Threat Assessment

    ERIC Educational Resources Information Center

    Barton, Rhonda

    2008-01-01

    This article illustrates how effective a threat assessment program like the Mid-Valley Student Threat Assessment (STAT) program can be in dealing with violent and threatening students. STAT is a a regional system that draws together resources from schools, mental health agencies, law enforcement bureaus, and other youth-serving organizations in…

  10. Perception of the Threat of Terrorism.

    PubMed

    Cohen-Louck, Keren

    2016-04-28

    In light of the tense and ongoing security situation in Israel, one important issue that needs to be analyzed and understood is the perception of terrorism threats. Most studies focused mainly on the psychological implications of terrorist acts; this study examines the complexity of the manner in which the individual perceives the threat of terrorism. In all, 40 Israeli adults (22 women and 18 men) were interviewed using semistructured in-depth interviews. Qualitative analysis indicates that the components of the perception of terrorism that construct the evaluation and subjective perception of the participants are as follows: (a) perception of control, which is a feeling of loss of control and helplessness due to uncertainty, inability to predict threats, and the vagueness of the threat; (b) perception of vulnerability to the threat, such as a feeling of vulnerability to and potential victimization by terrorism; and (c) perception of fear of terrorism that includes responses of fear, anxiety, feeling of danger, and emotional distress. In addition, gender differences were found in the analysis. The findings of this study help gain a better understanding as to how people perceive the threat of terrorism. The findings also enable an understanding of the complexity of living under ongoing terrorism threats and may assist in understanding how citizens cope with and adjust to this threat.

  11. Bombs and Bomb Threats in the School

    ERIC Educational Resources Information Center

    Starkey, David J.; Starkey, John D.

    1977-01-01

    Bombs and the threat of bombing can leave school personnel faced by an explosive hazard without knowledge of what to do. Therefore, a preplanned response is necessary. Discusses four major stages of dealing with bombs and bomb threats. (Author/RK)

  12. Bomb Threats and Bomb Search Techniques.

    ERIC Educational Resources Information Center

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  13. The Smallpox Threat: The School Nurse's Role

    ERIC Educational Resources Information Center

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  14. The Nature of the Bioterrorism Threat

    SciTech Connect

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  15. High Power Electromagnetic (HPEM) Threat Analysis

    DTIC Science & Technology

    2008-04-01

    EMERGING THREATS ...... 13 HEMP coupling characteristics ............................................................................... 13 High power...microwave (HPEM) coupling characteristics ..................................... 16 High power microwave: local protective measures...ncy (W1 Figure 22. Various bands summarizing EM threats. HEMP coupling characteristics In the early 1960’s, researchers proposed a theory that a high

  16. How you perceive threat determines your behavior

    PubMed Central

    Fernandes, Orlando; Portugal, Liana C. L.; Alves, Rita C. S.; Campagnoli, Rafaela R.; Mocaiber, Izabela; David, Isabel P. A.; Erthal, Fátima C. S.; Volchan, Eliane; de Oliveira, Leticia; Pereira, Mirtes G.

    2013-01-01

    The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT) paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed toward the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during directed toward threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, directed away threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by threat stimuli directed toward the observer. In sum, our data support the concept that emotions are indeed action tendencies. PMID:24115925

  17. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    USGS Publications Warehouse

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    The Florida manatee (Trichechus manatus latirostris) is an endangered marine mammal endemic to the southeastern United States. The primary threats to manatee populations are collisions with watercraft and the potential loss of warm-water refuges. For the purposes of listing, recovery, and regulation under the Endangered Species Act (ESA), an understanding of the relative effects of the principal threats is needed. This work is a quantitative approach to threats analysis, grounded in the assumption that an appropriate measure of status under the ESA is based on the risk of extinction, as quantified by the probability of quasi-extinction. This is related to the qualitative threats analyses that are more common under the ESA, but provides an additional level of rigor, objectivity, and integration. In this approach, our philosophy is that analysis of the five threat factors described in Section 4(a)(1) of the ESA can be undertaken within an integrated quantitative framework. The basis of this threats analysis is a comparative population viability analysis. This involves forecasting the Florida manatee population under different scenarios regarding the presence of threats, while accounting for process variation (environmental, demographic, and catastrophic stochasticity) as well as parametric and structural uncertainty. We used the manatee core biological model (CBM) for this viability analysis, and considered the role of five threats: watercraft-related mortality, loss of warm-water habitat in winter, mortality in water-control structures, entanglement, and red tide. All scenarios were run with an underlying parallel structure that allowed a more powerful estimation of the effects of the various threats. The results reflect our understanding of manatee ecology (as captured in the structure of the CBM), our estimates of manatee demography (as described by the parameters in the model), and our characterization of the mechanisms by which the threats act on manatees. As an

  18. Security threats categories in healthcare information systems.

    PubMed

    Samy, Ganthan Narayana; Ahmad, Rabiah; Ismail, Zuraini

    2010-09-01

    This article attempts to investigate the various types of threats that exist in healthcare information systems (HIS). A study has been carried out in one of the government-supported hospitals in Malaysia.The hospital has been equipped with a Total Hospital Information System (THIS). The data collected were from three different departments, namely the Information Technology Department (ITD), the Medical Record Department (MRD), and the X-Ray Department, using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The results show that the most critical threat for the THIS is power failure followed by acts of human error or failure and other technological factors. This research holds significant value in terms of providing a complete taxonomy of threat categories in HIS and also an important component in the risk analysis stage.

  19. ONR Workshop on Nonlinear Sea Loads and Ship Response: A Basis for Ship Structural Design Held in Ann Arbor, Michigan on July 7-8, 1994

    DTIC Science & Technology

    1994-07-08

    Avail arý,dlIor8:00 - 8:30 Coffee and doughnuts, registration Dist Special Workshop Introduction 8:30 - 8:45 Welcome Prof. Michael G. Parsons, Naval...Bureau of Shipping Friday, July 8 8:00 - 8:30 Coffee and doughnuts Simulation-Based Design Environment 8:30 - 8:50 Use of Reliability in Structural Design...virtual environment with user, data glove and I physical elements I 73 VW Super Beetle -H 10364 Vertices 10514 Polygons 73 VW Super Beetle -L 1520 Vertices

  20. Nuclear threats from small states

    SciTech Connect

    Kahan, J.H.

    1994-06-13

    What are the policy implications regarding proliferation and counter proliferation of nuclear weapons among Third World states. How does deterrence operate outside the parameters of superpower confrontation as defined by the cold war elaborate system of constraints enforced by concepts like mutual assured destruction, and counter-value and counter-force targeting. How can US policymakers devise contingencies for dealing with nuclear threats posed by countries like North Korea, Libya, Iraq, Iran, and Syria. These are some of the unsettling but nevertheless important questions addressed by the author in this monograph. In his analysis, Mr. Jerome Kahan examines the likelihood that one or more of these countries will use nuclear weapons before the year 2000. He also offers a framework that policymakers and planners might use in assessing US interests in preempting the use of nuclear weapons or in retaliating for their use. Ironically, with the end of the cold war, it is imperative that defense strategists, policymakers, and military professionals think about the `unthinkable`. In the interest of fostering debate on this important subject, the Strategic Studies Institute commends this insightful monograph.

  1. Bioterriorism: from threat to reality.

    PubMed

    Atlas, Ronald M

    2002-01-01

    The fears and predictions of attacks with biological weapons, which were increasing at the close of the twentieth century, were transformed into reality not long after September 11, 2001, when several anthrax-laden letters were sent through the U.S. postal system. The attack challenged our medical preparedness and scientific understanding of the epidemiology of biothreat agents. It is fortunate that this was not a massive aerosol release that could have exposed hundreds of thousands. Rapid diagnoses and medical treatments limited casualties and increased survival rates, but tragically some individuals died of inhalational anthrax. Even as physicians tested new treatment regimes and scientists employed new ways of detecting anthrax and decontaminating the mail, new predictions were made for potentially even more devastating attacks with anthrax, smallpox, plague, tularemia, botulism, or hemorrhagic fever viruses. Fear gripped the nation. Law enforcement sought to find the villain(s) who sent the anthrax letters and to deter future bioterrorist attacks. The biomedical community began to seek new ways of protecting against such future threats of bioterrorism.

  2. Stereotype threat prevents perceptual learning.

    PubMed

    Rydell, Robert J; Shiffrin, Richard M; Boucher, Kathryn L; Van Loo, Katie; Rydell, Michael T

    2010-08-10

    Stereotype threat (ST) refers to a situation in which a member of a group fears that her or his performance will validate an existing negative performance stereotype, causing a decrease in performance. For example, reminding women of the stereotype "women are bad at math" causes them to perform more poorly on math questions from the SAT and GRE. Performance deficits can be of several types and be produced by several mechanisms. We show that ST prevents perceptual learning, defined in our task as an increasing rate of search for a target Chinese character in a display of such characters. Displays contained two or four characters and half of these contained a target. Search rate increased across a session of training for a control group of women, but not women under ST. Speeding of search is typically explained in terms of learned "popout" (automatic attraction of attention to a target). Did women under ST learn popout but fail to express it? Following training, the women were shown two colored squares and asked to choose the one with the greater color saturation. Superimposed on the squares were task-irrelevant Chinese characters. For women not trained under ST, the presence of a trained target on one square slowed responding, indicating that training had caused the learning of an attention response to targets. Women trained under ST showed no slowing, indicating that they had not learned such an attention response.

  3. Threats to sandy beach ecosystems: A review

    NASA Astrophysics Data System (ADS)

    Defeo, Omar; McLachlan, Anton; Schoeman, David S.; Schlacher, Thomas A.; Dugan, Jenifer; Jones, Alan; Lastra, Mariano; Scapini, Felicita

    2009-01-01

    We provide a brief synopsis of the unique physical and ecological attributes of sandy beach ecosystems and review the main anthropogenic pressures acting on the world's single largest type of open shoreline. Threats to beaches arise from a range of stressors which span a spectrum of impact scales from localised effects (e.g. trampling) to a truly global reach (e.g. sea-level rise). These pressures act at multiple temporal and spatial scales, translating into ecological impacts that are manifested across several dimensions in time and space so that today almost every beach on every coastline is threatened by human activities. Press disturbances (whatever the impact source involved) are becoming increasingly common, operating on time scales of years to decades. However, long-term data sets that describe either the natural dynamics of beach systems or the human impacts on beaches are scarce and fragmentary. A top priority is to implement long-term field experiments and monitoring programmes that quantify the dynamics of key ecological attributes on sandy beaches. Because of the inertia associated with global climate change and human population growth, no realistic management scenario will alleviate these threats in the short term. The immediate priority is to avoid further development of coastal areas likely to be directly impacted by retreating shorelines. There is also scope for improvement in experimental design to better distinguish natural variability from anthropogenic impacts. Sea-level rise and other effects of global warming are expected to intensify other anthropogenic pressures, and could cause unprecedented ecological impacts. The definition of the relevant scales of analysis, which will vary according to the magnitude of the impact and the organisational level under analysis, and the recognition of a physical-biological coupling at different scales, should be included in approaches to quantify impacts. Zoning strategies and marine reserves, which have not

  4. Computer-Based Training for the U.S. Coast Guard Standard Terminal Microcomputer: A Basis for Implementation Utilizing the Elaboration Theory of Instructional Design.

    DTIC Science & Technology

    1985-03-01

    73 BIBLIOGRAPHY----------------------------------------------- 76 INITIAL DISTRIBUTION LIST...provide " sonnet " as an example concept. A procedure is "a set of actions that are intended to achieve an end...a skill, technique, or method." A...of Instructional Design, 2nd edition, New York: Holt, Rinehart and W nston, 1979. 73 12. Convergent Technologies, Inc., Technical Documentation

  5. System for ranking relative threats of U.S. volcanoes

    USGS Publications Warehouse

    Ewert, J.W.

    2007-01-01

    A methodology to systematically rank volcanic threat was developed as the basis for prioritizing volcanoes for long-term hazards evaluations, monitoring, and mitigation activities. A ranking of 169 volcanoes in the United States and the Commonwealth of the Northern Mariana Islands (U.S. volcanoes) is presented based on scores assigned for various hazard and exposure factors. Fifteen factors define the hazard: Volcano type, maximum known eruptive explosivity, magnitude of recent explosivity within the past 500 and 5,000 years, average eruption-recurrence interval, presence or potential for a suite of hazardous phenomena (pyroclastic flows, lahars, lava flows, tsunami, flank collapse, hydrothermal explosion, primary lahar), and deformation, seismic, or degassing unrest. Nine factors define exposure: a measure of ground-based human population in hazard zones, past fatalities and evacuations, a measure of airport exposure, a measure of human population on aircraft, the presence of power, transportation, and developed infrastructure, and whether or not the volcano forms a significant part of a populated island. The hazard score and exposure score for each volcano are multiplied to give its overall threat score. Once scored, the ordered list of volcanoes is divided into five overall threat categories from very high to very low. ?? 2007 ASCE.

  6. Building relationships with foreign governments in support of threat reduction

    SciTech Connect

    Cajigal, George L.

    2007-07-01

    The effectiveness of any multinational effort in support of threat reduction depends on the relationship developed between the nation receiving the assistance and the donor nations. The effectiveness of this relationship must be based on a solid legal and cooperative framework that establishes the ground rules for the interaction between all parties involved. The author proposes in this paper to outline major considerations by the donor nation and the nation receiving the assistance as they establish an effective approach to threat-reduction efforts. The legal framework needs to be founded on a well-developed, country-to-country agreement that establishes general ground rules and officially recognizes the collaborative effort in an internationally binding document between signatories. This document normally addresses such issues as liability, tax exemptions, import duties, contracts, applicable environmental regulations, etc. Also, of utmost importance is the establishment of a collaborative framework. The basis for such a collaborative framework must be the buy-in into a common objective, the willingness to share concerns and work toward resolutions, and continuous communications. Only when a proper legal framework and a collaborative approach are established can effective relationships be built to enhance threat-reduction efforts. (author)

  7. Electrophysiological Responses to Threat in Youth with and without Posttraumatic Stress Disorder

    PubMed Central

    Simons, Robert F.

    2012-01-01

    The current study was designed to examine event-related brain potentials and autonomic responses to pictures indicating threat, relative to non-threat, and acoustic startle reflexes in traumatized youth diagnosed with PTSD, relative to non-exposed children, before and after receiving psychotherapy. Children in the control group were individually yoked and demographically matched to the PTSD group. Both groups displayed enhanced late positive potentials and more prolonged heart rate deceleration to pictures indicating threat, relative to non-threat, and larger skin conductance responses to pictures indicating threat, relative to non-threat, at time one. At time two, controls appeared to habituate, as reflected by an overall attenuated skin conductance response, whereas the PTSD group showed little change. Across time points the PTSD group exhibited greater acoustic startle reflexes than the control group. Psychotherapy and symptom reduction was not associated with electrophysiology. Drawing from the adult literature, this study was an attempt to address the scarcity of research examining electrophysiological irregularities in childhood PTSD. The overall results suggest that children and adolescents allocate more attention to threat-related stimuli regardless of PTSD status, and exaggerated startle and a possible failure to habituate skin conductance responses to threat-related stimuli in youth with versus without PTSD. PMID:22406756

  8. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  9. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  10. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  11. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  12. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  13. Technical Basis for the Determination that Current Characterization Data and Processes are Sufficient to Ensure Safe Storage and to Design Waste Disposal

    SciTech Connect

    SIMPSON, B.C.

    1999-08-12

    This document presents the technical basis for closure of Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 93-5 Implementation Plan milestone 5.6.3.13, ''Core sample all tanks by 2002'' (DOE-RL 1996). The milestone was based on the need for characterization data to ensure safe storage of the waste, to operate the tanks safely, and to plan and implement retrieval and processing of the waste. Sufficient tank characterization data have been obtained to ensure that existing controls are adequate for safe storage of the waste in the 177 waste tanks at the Hanford Site. In addition, a process has been developed, executed, and institutionalized to systemically identify information needs, to integrate and prioritize the needs, and to reliably obtain and analyze the associated samples. This document provides a technical case that the remaining 45 incompletely sampled tanks no longer require sampling to support the intent of the Implementation Plan milestone. Sufficient data have been obtained to close the Unreviewed Safety Questions (USQs), and to ensure that existing hazard controls are adequate and appropriately applied. However, in the future, additional characterization of tanks at the site will be required to support identified information needs. Closure of this milestone allows sampling and analytical data to be obtained in a manner that is consistent with the integrated priority process.

  14. Self-concept clarity buffers the impact of societal threat to safety on right-wing authoritarianism.

    PubMed

    Russo, Silvia; Manzi, Claudia; Roccato, Michele

    2016-09-16

    Exposure to societal threat can elicit an increase in right-wing authoritarianism (RWA). In this study, using a quasi-experimental vignette design (Italian community sample, N = 86), we tested the moderating role of self-concept clarity (SCC). A moderated regression showed that manipulated societal threat to safety fostered RWA only among low SCC scorers. It is concluded that SCC is an important resource for individuals facing threat conditions.

  15. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    PubMed

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat.

  16. Forecasting Lightning Threat Using WRF Proxy Fields

    NASA Technical Reports Server (NTRS)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  17. Depressed mood enhances anxiety to unpredictable threat

    PubMed Central

    Robinson, OJ; Overstreet, C; Letkiewicz, A; Grillon, C

    2011-01-01

    Background Depression and anxiety disorders (AD) are highly comorbid, but the reason for this comorbidity is unclear. One possibility is that they predispose one another. An informative way to examine interactions between disorders without the confounds present in patient populations is to manipulate the psychological processes thought to underlie the pathological states in healthy individuals. In this paper we therefore asked whether a model of the sad mood in depression can enhance psychophysiological responses (startle) to a model of the anxiety in AD. We predicted that sad mood would increase anxious anxiety-potentiated startle responses. Methods In a between-subjects design, participants (N=36) completed either a sad mood induction procedure (N=18) or neutral mood induction procedure (N=18). Startle responses were assessed during short duration predictable electric shock conditions (fear-potentiated startle) or long-duration unpredictable threat of shock conditions (anxiety-potentiated startle). Results Induced sadness enhanced anxiety-, but not fear- potentiated startle. Conclusions This study provides support for the hypothesis that sadness can increase anxious responding measured by the affective startle response. This, taken together with prior evidence that AD can contribute to depression, provides initial experimental support for the proposition that AD and depression are frequently comorbid because they may be mutually reinforcing. PMID:22088577

  18. SLATE: scanning laser automatic threat extraction

    NASA Astrophysics Data System (ADS)

    Clark, David J.; Prickett, Shaun L.; Napier, Ashley A.; Mellor, Matthew P.

    2016-10-01

    SLATE is an Autonomous Sensor Module (ASM) designed to work with the SAPIENT system providing accurate location tracking and classifications of targets that pass through its field of view. The concept behind the SLATE ASM is to produce a sensor module that provides a complementary view of the world to the camera-based systems that are usually used for wide area surveillance. Cameras provide a hi-fidelity, human understandable view of the world with which tracking and identification algorithms can be used. Unfortunately, positioning and tracking in a 3D environment is difficult to implement robustly, making location-based threat assessment challenging. SLATE uses a Scanning Laser Rangefinder (SLR) that provides precise (<1cm) positions, sizes, shapes and velocities of targets within its field-of-view (FoV). In this paper we will discuss the development of the SLATE ASM including the techniques used to track and classify detections that move through the field of view of the sensor providing the accurate tracking information to the SAPIENT system. SLATE's ability to locate targets precisely allows subtle boundary-crossing judgements, e.g. on which side of a chain-link fence a target is. SLATE's ability to track targets in 3D throughout its FoV enables behavior classification such as running and walking which can provide an indication of intent and help reduce false alarm rates.

  19. Emerging oomycete threats to plants and animals.

    PubMed

    Derevnina, Lida; Petre, Benjamin; Kellner, Ronny; Dagdas, Yasin F; Sarowar, Mohammad Nasif; Giannakopoulou, Artemis; De la Concepcion, Juan Carlos; Chaparro-Garcia, Angela; Pennington, Helen G; van West, Pieter; Kamoun, Sophien

    2016-12-05

    Oomycetes, or water moulds, are fungal-like organisms phylogenetically related to algae. They cause devastating diseases in both plants and animals. Here, we describe seven oomycete species that are emerging or re-emerging threats to agriculture, horticulture, aquaculture and natural ecosystems. They include the plant pathogens Phytophthora infestans, Phytophthora palmivora, Phytophthora ramorum, Plasmopara obducens, and the animal pathogens Aphanomyces invadans, Saprolegnia parasitica and Halioticida noduliformans For each species, we describe its pathology, importance and impact, discuss why it is an emerging threat and briefly review current research activities.This article is part of the themed issue 'Tackling emerging fungal threats to animal health, food security and ecosystem resilience'.

  20. Vibrational spectroscopy standoff detection of threat chemicals

    NASA Astrophysics Data System (ADS)

    Ortiz-Rivera, William; Pacheco-Londoño, Leonardo C.; Castro-Suarez, John R.; Felix-Rivera, Hilsamar; Hernandez-Rivera, Samuel P.

    2011-06-01

    Spectroscopy based standoff detection systems: Raman and FTIR have been tested for detection of threat chemicals, including highly energetic materials, homemade explosives, explosives formulations and high explosives mixtures. Other threat chemicals studied included toxic industrial compounds (TIC) and chemical agent simulants. Microorganisms and biological threat agent simulants have also been detected at standoff distances. Open Path FTIR has been used to detect vapors and chemicals deposited on metal surfaces at μg/cm2 levels at distances as far as 30 m in active mode and 60 m in passive mode. In the case of Raman telescope, standoff distances for acetonitrile and ammonium nitrate were 140 m.

  1. Insider threat to secure facilities: data analysis

    SciTech Connect

    Not Available

    1980-05-09

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs.

  2. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    SciTech Connect

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  3. Identity threat and stigma in cancer patients

    PubMed Central

    Marziliano, Allison; Moyer, Anne

    2014-01-01

    Cancer stigma has undergone an important transformation in recent decades. In general, this disease no longer fits squarely into Goffman’s classic taxonomy of stigmatized conditions. This review will demonstrate that, with important adaptations, an identity-threat model of stigma can be used to organize cancer stigma research post-Goffman. This adapted model postulates that one’s personal attributions, responses to situational threat, and disease/treatment characteristics can be used to predict identity threat and well-being of individuals with cancer. Implications for further research and clinical practice are discussed. PMID:28070343

  4. Assessment of ionospheric threat modeling techniques over Marmara Region

    NASA Astrophysics Data System (ADS)

    Onur Karslioglu, Mahmut; Yeganehsahab, Amir; Durmaz, Murat

    2016-04-01

    It is generally known that extreme ionospheric density associated with severe magnetic storm degrades the Global Navigation satellite Systems (GNSS) measurements also at mid - to high latitudes. Strong solar activity can cause large local spatial and temporal gradients in the delays induced on the GNSS signals by the ionosphere. The local nature of gradients can result in significant decorrelation between Ground Based Augmentation System (GBAS) Ground Stations and the GNSS receiver on board the aircraft. For the mitigation of this effect either a special functional architecture is established to monitor the ionosphere on the basis of so called Extended GBAS or ionospheric threat models can be constructed for a certain region. In this work two different techniques have been evaluated for the estimation of ionospheric threat model parameters consisting of width, slope and velocity of the ionospheric wave front by using real ground-based observations from both GPS and GLONASS in the Marmara Region. The data collected between 2012 and 2015 also containing high ionospheric activities are pre-processed to extract ionospheric gradients. Ionospheric delays at each ionospheric piercing point are determined by applying a local ionospheric Total Electron Content (TEC) modeling and filtering techniques on the basis of raw carrier-phase observations. The ionospheric fronts are searched by looking at high ionospheric gradients which result from ionospheric delay differences between ionospheric piercing points. The first technique of the threat model evaluation is based on the propagation of an ideal plane wave as a wave front, velocity of which is estimated on the basis of a Gauss Markov Model using an ordinary least square estimation procedure. The remaining parameters namely slope and width are calculated afterwards using rate of change gradients and the duration of the wave front in context with the estimated front velocity. In the second technique both the magnitude of the

  5. Systematic description of direct push sensor systems: A conceptual framework for system decomposition as a basis for the optimal sensor system design

    NASA Astrophysics Data System (ADS)

    Bumberger, Jan; Paasche, Hendrik; Dietrich, Peter

    2015-11-01

    Systematic decomposition and evaluation of existing sensor systems as well as the optimal design of future generations of direct push probes are of high importance for optimized geophysical experiments since the employed equipment is a constrain on the data space. Direct push technologies became established methods in the field of geophysical, geotechnical, hydrogeological, and environmental sciences for the investigation of the near subsurface. By using direct push sensor systems it is possible to measure in-situ parameters with high vertical resolution. Such information is frequently used for quantitative geophysical model calibration of interpretation of geotechnical and hydrological subsurface conditions. Most of the available direct push sensor systems are largely based on empirical testing and consecutively evaluated under field conditions. Approaches suitable to identify specific characteristics and problems of direct push sensor systems have not been established, yet. We develop a general systematic approach for the classification, analysis, and optimization of direct push sensor systems. First, a classification is presented for different existing sensor systems. The following systematic description, which is based on the conceptual decomposition of an existing sensor system into subsystems, is a suitable way to analyze and explore the transfer behavior of the system components and therefore of the complete system. Also, this approach may serve as guideline for the synthesis and the design of new and optimized direct push sensor systems.

  6. Contending with Stereotype Threat at Work: A Model of Long-Term Responses

    ERIC Educational Resources Information Center

    Block, Caryn J.; Koch, Sandy M.; Liberman, Benjamin E.; Merriweather, Tarani J.; Roberson, Loriann

    2011-01-01

    Women and people of color are still underrepresented in many occupational roles. Being in a situation where one is underrepresented, and thus in the demographic minority, has been shown to be a factor leading to the experience of stereotype threat--the expectation that one will be judged or perceived on the basis of social identity group…

  7. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    PubMed Central

    Carels, Robert A.; Domoff, Sarah E.; Burmeister, Jacob M.; Koball, Afton M.; Hinman, Nova G.; Davis, Alan K.; Oehlhof, Marissa Wagner; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A.

    2013-01-01

    Objective The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method 216 adults completed an online survey. Participants’ mean age was 23.6 (SD 10.1; range 18–64) years and mean BMI was 31.6 (SD 7.5) kg/m2. Results Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Conclusion Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals’ susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes’ impact on cognitive and behavioral outcomes. PMID:23736227

  8. Patient Safety Threat - Syringe Reuse

    MedlinePlus

    ... Devices Clinical Reminder: Insulin Pens Publications Infection Control Assessment of Ambulatory Surgical Centers Meetings Insurance Stakeholders Meeting – December 2011 Ambulatory Surgical Centers – October 2010 Safety by Design – May 2010 Sticking with Safety – May 2010 Injection ...

  9. Terahertz imaging system for stand-off detection of threats

    NASA Astrophysics Data System (ADS)

    Hübers, H.-W.; Semenov, A. D.; Richter, H.; Böttger, U.

    2007-04-01

    Suicide bombers and hidden bombs or explosives have become serious threats especially for mass transportation. Until now there exists no established system which can be used against these threats. Therefore new technologies especially for stand-off detection of threats are required. Terahertz (THz) rays offer an alternative inspection method, which can cope with these new challenges. Major advantages of THz radiation as compared to other spectral regions are the possibility to penetrate through clothes and that THz radiation is not harmful for human health. In this report the design and results of a THz stand-off detection system will be presented. The sensor is based on active illumination of the object and sensitive heterodyne detection of reflected and backscattered radiation. The system operates at about 0.8 THz. A THz laser is used for illumination and a superconducting hot-electron bolometric mixer for detection. The local oscillator required for heterodyne detection is a multiplied microwave source. The optical system is designed to allow for stand-off detection at 20 m with a spatial resolution less than 2 cm.

  10. Metallurgical design basis, qualification testing, and production history of 50 ksi and 60 ksi steel plate for the MARS TLP deck fabrication

    SciTech Connect

    Suzuki, Shuichi; Sueda, Kyosuke; Iki, Hiroshi; Smith, J.D.

    1995-12-31

    The MARS TLP fast-track deck construction project required rapid qualification and production of 50 ksi and 60 ksi steel plate. This paper describes the development of high-performance 4 in. (101.6mm) 50 ksi and 3 in. (76.2mm) 60 ksi steels of a modified API 2W composition and presents the production history for the MARS deck steel order. The same base composition was used for both grades via innovative proprietary TMCP practice. Utilization of the mono-chemistry steel allowed for production of a wide range of thicknesses and grades in a very short time frame via a simplified melting schedule and made it possible to minimize the number of new welding procedures to be developed by the deck fabricator. Extremely low carbon equivalent allowed the implementation of low fabrication preheats, with resultant cost and fabrication schedule savings. The chemical composition of the steel was specifically designed for this project and qualification testing in accordance with API RP 2Z verified high heat-affected zone CTOD toughness free of local brittle zones over a wide range of heat input and interpass temperature. Strict production process control resulted in very tight production property histograms with all steel being verified to have Charpy V-notch transition temperatures below {minus}80 C ({minus}112 F) at the plate mid-width, mid-thickness position. The success of the MARS deck steel rapid qualification, production and delivery was enabled by close teamwork between deck design engineers, construction fabrication contractor, and steelmaker for this steel.

  11. Structural Basis for Parathyroid Hormone-related Protein Binding to the Parathyroid Hormone Receptor and Design of Conformation-selective Peptides

    SciTech Connect

    Pioszak, Augen A.; Parker, Naomi R.; Gardella, Thomas J.; Xu, H. Eric

    2009-12-01

    Parathyroid hormone (PTH) and PTH-related protein (PTHrP) are two related peptides that control calcium/phosphate homeostasis and bone development, respectively, through activation of the PTH/PTHrP receptor (PTH1R), a class B G protein-coupled receptor. Both peptides hold clinical interest for their capacities to stimulate bone formation. PTH and PTHrP display different selectivity for two distinct PTH1R conformations, but how their binding to the receptor differs is unclear. The high resolution crystal structure of PTHrP bound to the extracellular domain (ECD) of PTH1R reveals that PTHrP binds as an amphipathic {alpha}-helix to the same hydrophobic groove in the ECD as occupied by PTH, but in contrast to a straight, continuous PTH helix, the PTHrP helix is gently curved and C-terminally 'unwound.' The receptor accommodates the altered binding modes by shifting the side chain conformations of two residues within the binding groove: Leu-41 and Ile-115, the former acting as a rotamer toggle switch to accommodate PTH/PTHrP sequence divergence, and the latter adapting to the PTHrP curvature. Binding studies performed with PTH/PTHrP hybrid ligands having reciprocal exchanges of residues involved in different contacts confirmed functional consequences for the altered interactions and enabled the design of altered PTH and PTHrP peptides that adopt the ECD-binding mode of the opposite peptide. Hybrid peptides that bound the ECD poorly were selective for the G protein-coupled PTH1R conformation. These results establish a molecular model for better understanding of how two biologically distinct ligands can act through a single receptor and provide a template for designing better PTH/PTHrP therapeutics.

  12. Asynchronous threat awareness by observer trials using crowd simulation

    NASA Astrophysics Data System (ADS)

    Dunau, Patrick; Huber, Samuel; Stein, Karin U.; Wellig, Peter

    2016-10-01

    The last few years showed that a high risk of asynchronous threats is given in every day life. Especially in large crowds a high probability of asynchronous attacks is evident. High observational abilities to detect threats are desirable. Consequently highly trained security and observation personal is needed. This paper evaluates the effectiveness of a training methodology to enhance performance of observation personnel engaging in a specific target identification task. For this purpose a crowd simulation video is utilized. The study first provides a measurement of the base performance before the training sessions. Furthermore a training procedure will be performed. Base performance will then be compared to the after training performance in order to look for a training effect. A thorough evaluation of both the training sessions as well as the overall performance will be done in this paper. A specific hypotheses based metric is used. Results will be discussed in order to provide guidelines for the design of training for observational tasks.

  13. Race and imprisonments: vigilante violence, minority threat, and racial politics.

    PubMed

    Jacobs, David; Malone, Chad; Iles, Gale

    2012-01-01

    The effects of lynchings on criminal justice outcomes have seldom been examined. Recent findings also are inconsistent about the effects of race on imprisonments. This study uses a pooled time-series design to assess lynching and racial threat effects on state imprisonments from 1972 to 2000. After controlling for Republican strength, conservatism, and other factors, lynch rates explain the growth in admission rates. The findings also show that increases in black residents produce subsequent expansions in imprisonments that likely are attributable to white reactions to this purported menace. But after the percentage of blacks reaches a substantial threshold—and the potential black vote becomes large enough to begin to reduce these harsh punishments—reductions in prison admissions occur. These results also confirm a political version of racial threat theory by indicating that increased Republican political strength produces additional imprisonments.

  14. The threat from creationism to the rational teaching of biology.

    PubMed

    Cornish-Bowden, Athel; Cárdenas, María Luz

    2007-01-01

    Most biologists outside the USA and a few other countries, like Australia and Canada, are under the impression that the threat to the teaching of biology represented by creationism does not concern them directly. This is unfortunately no longer true: the recent growth of creationism, especially in its pseudo-scientific manifestation known as "intelligent design", has been obvious in several countries of Western Europe, especially the UK, Germany and Poland, and it is beginning to be noticeable in Brazil, and maybe elsewhere in Latin America. The problem is complicated by the fact that there are not just two possibilities, evolution and creationism, because creationism comes in various incompatible varieties. Turkey is now a major source of creationist propaganda outside the USA, and is especially significant in relation to its influence on Muslim populations in Europe. The time for biologists to address the creationist threat is now.

  15. R2U2: Monitoring and Diagnosis of Security Threats for Unmanned Aerial Systems

    NASA Technical Reports Server (NTRS)

    Schumann, Johann; Moosbruger, Patrick; Rozier, Kristin Y.

    2015-01-01

    We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2, implemented in FPGA hardware, is a real-time, REALIZABLE, RESPONSIVE, UNOBTRUSIVE Unit for security threat detection. R2U2 is designed to continuously monitor inputs from the GPS and the ground control station, sensor readings, actuator outputs, and flight software status. By simultaneously monitoring and performing statistical reasoning, attack patterns and post-attack discrepancies in the UAS behavior can be detected. R2U2 uses runtime observer pairs for linear and metric temporal logics for property monitoring and Bayesian networks for diagnosis of security threats. We discuss the design and implementation that now enables R2U2 to handle security threats and present simulation results of several attack scenarios on the NASA DragonEye UAS.

  16. Acid Rain: The Silent Environmental Threat.

    ERIC Educational Resources Information Center

    Zmud, Mia

    1992-01-01

    Describes the silent environmental threat posed by acid rain. Caused mainly by manmade pollutants, acid rain damages water and trees, decreases visibility, corrodes monuments, and threatens public health. The article includes guidelines for action. (SM)

  17. Need threat can motivate performance after ostracism.

    PubMed

    Jamieson, Jeremy P; Harkins, Stephen G; Williams, Kipling D

    2010-05-01

    Ostracism threatens fundamental needs of belonging, self-esteem, control, and meaningful existence, which should motivate participants to respond to this threat. However, research has yet to examine the role of need threat in producing motivation after ostracism. In the current work, participants completed a "cognitive ability" (antisaccade) task following Cyberball-induced ostracism or inclusion. In two experiments, it was found that when ostracized, participants do not see antisaccade performance as a means of responding to the concerns produced by need threat; they respond only to the social threat, leading to worse performance than included participants (Experiments 1 and 2). However, when participants see an avenue of response (the Cyberball players can compare antisaccade performances), ostracized participants outperform included participants (Experiment 2). Moreover, this effect was mediated by the need for belonging, suggesting that ostracized participants were motivated to elevate their inclusionary status by demonstrating their worth on the cognitive ability task.

  18. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    ScienceCinema

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2016-07-12

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  19. Childhood maltreatment and threats with weapons.

    PubMed

    Casiano, Hygiea; Mota, Natalie; Afifi, Tracie O; Enns, Murray W; Sareen, Jitender

    2009-11-01

    The relationship between childhood maltreatment and future threats with weapons is unknown. We examined data from the nationally representative National Comorbidity Survey Replication (n = 5692) and conducted multiple logistic regression analyses to determine the association between childhood maltreatment and lifetime behavior of threatening others with a gun or other weapon. After adjusting for sociodemographic variables, physical abuse, sexual abuse, and witnessing domestic violence were significantly associated with threats made with a gun (adjusted odds ratios [AOR] ranging between 3.38 and 4.07) and other weapons (AOR ranging between 2.16 and 2.83). The greater the number of types of maltreatment experienced, the stronger the association with lifetime threats made to others with guns and any weapons. Over 94% of respondents who experienced maltreatment and made threats reported that the maltreatment occurred prior to threatening others with weapons. Prevention efforts that reduce exposure to maltreatment may reduce violent behavior in later life.

  20. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    SciTech Connect

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2008-05-29

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  1. Advanced Insider Threat Mitigation Workshop Instructional Materials

    SciTech Connect

    Gibbs, Philip; Larsen, Robert; O'Brien, Mike; Edmunds, Tom

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  2. Stereotype threat and lift effects in motor task performance: the mediating role of somatic and cognitive anxiety.

    PubMed

    Laurin, Raphael

    2013-01-01

    The aim of this investigation was to replicate the stereotype threat and lift effects in a motor task in a neutral sex-typed activity, using somatic and cognitive anxiety as key mediators of these phenomena. It was hypothesized that an ingroup/outgroup social categorization based on gender would have distinctive effects for female and male participants. A total of 161 French physical education students were randomly assigned to three threat conditions--no threat, female threat, and male threat--thus leading to a 3 x 2 (threat by gender) design. The analyses revealed a stereotype lift effect on the performances for both male and female participants, as well as a stereotype threat effect only for female participants. They also indicated that somatic anxiety had a mediating effect on the performance of female participants targeted by a negative stereotype, but that it had a facilitating effect on their performance. The stereotype threat and lift effects on motor tasks were replicated in a neutral sex-typed activity and somatic anxiety seems to have a facilitating mediating effect of the relationships between the gender-conditions (control or female threat) interaction and free-throw performance. The model used to distinguish somatic and cognitive anxiety appeared to be a relevant means of explaining the stereotype threat and lift mechanisms.

  3. DoD Insider Threat Mitigation

    DTIC Science & Technology

    1999-01-01

    password file at home , subsequently gaining unlimited access to the classified network, disruption on normal operations and the theft of DoD information...during military operations or crisis situations . 2 Vulnerability 3 Threat 1 Criticality 4 5 6 7 RISK Risk Model DoD Insider Threat IPT 8...personnel security and management chain. This will also support PDD 63 by fostering the partnership between the public and private sectors. DoD should

  4. Bio-Terrorism Threat and Casualty Prevention

    SciTech Connect

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  5. Thucydides was Right: Defining the Future Threat

    DTIC Science & Technology

    2015-04-01

    future threat, and the author believes that there are historical parallels between the time of Thucydides and our own that can help us avoid much peril...University Press of Kentucky, 2004); Another Bloody Century: Future Warfare (Weidenfeld and Nicol- son, 2005); Strategy and History: Essays on Theory and...source of evidence on future threat; instead, the concept of the historical parallel, the difference between the two ideas, is very large. Fourth

  6. Advanced insider threat mitigation workshop instructional materials

    SciTech Connect

    Gibbs, Philip; Larsen, Robert; O Brien, Mike; Edmunds, Tom

    2008-11-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.

  7. nonlinMIP contribution to CMIP6: model intercomparison project for non-linear mechanisms: physical basis, experimental design and analysis principles (v1.0)

    NASA Astrophysics Data System (ADS)

    Good, Peter; Andrews, Timothy; Chadwick, Robin; Dufresne, Jean-Louis; Gregory, Jonathan M.; Lowe, Jason A.; Schaller, Nathalie; Shiogama, Hideo

    2016-11-01

    nonlinMIP provides experiments that account for state-dependent regional and global climate responses. The experiments have two main applications: (1) to focus understanding of responses to CO2 forcing on states relevant to specific policy or scientific questions (e.g. change under low-forcing scenarios, the benefits of mitigation, or from past cold climates to the present day), or (2) to understand the state dependence (non-linearity) of climate change - i.e. why doubling the forcing may not double the response. State dependence (non-linearity) of responses can be large at regional scales, with important implications for understanding mechanisms and for general circulation model (GCM) emulation techniques (e.g. energy balance models and pattern-scaling methods). However, these processes are hard to explore using traditional experiments, which explains why they have had so little attention in previous studies. Some single model studies have established novel analysis principles and some physical mechanisms. There is now a need to explore robustness and uncertainty in such mechanisms across a range of models (point 2 above), and, more broadly, to focus work on understanding the response to CO2 on climate states relevant to specific policy/science questions (point 1). nonlinMIP addresses this using a simple, small set of CO2-forced experiments that are able to separate linear and non-linear mechanisms cleanly, with a good signal-to-noise ratio - while being demonstrably traceable to realistic transient scenarios. The design builds on the CMIP5 (Coupled Model Intercomparison Project Phase 5) and CMIP6 DECK (Diagnostic, Evaluation and Characterization of Klima) protocols, and is centred around a suite of instantaneous atmospheric CO2 change experiments, with a ramp-up-ramp-down experiment to test traceability to gradual forcing scenarios. In all cases the models are intended to be used with CO2 concentrations rather than CO2 emissions as the input. The understanding

  8. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    PubMed

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  9. The Dragonian Subsurface Abyss and Submarine Force’s Ability to Counter the Rising Threat

    DTIC Science & Technology

    2013-05-23

    Pacific region, indicated by diplomatic and military moves like PRC legislation that went into effect in 2012 that allowed Chinese police to board and... nineteen of these antiquated designs remain in service, they still present a significant threat.45 Although stereotypically noisy and near the end of...capable of submarine forces. Recent modernization efforts have only increased the threat posed by China’s SSKs. In 1993, Beijing purchased four

  10. Structural Basis of the Cross-Reactivity of Genetically Related Human Anti-HIV-1 mAbs: Implications for Design of V3-Based Immunogens

    SciTech Connect

    Burke, V.; Williams, C; Sukumaran, M; Kim, S; Li, H; Wang, X; Gorny, M; Zolla-Pazner, S; Kong, X

    2009-01-01

    Human monoclonal antibodies 447-52D and 537-10D, both coded by the VH3 gene and specific for the third variable region (V3) of the HIV-1 gp120, were found to share antigen-binding structural elements including an elongated CDR H3 forming main-chain interactions with the N terminus of the V3 crown. However, water-mediated hydrogen bonds and a unique cation- sandwich stacking allow 447-52D to be broadly reactive with V3 containing both the GPGR and GPGQ crown motifs, while the deeper binding pocket and a buried Glu in the binding site of 537-10D limit its reactivity to only V3 containing the GPGR motif. Our results suggest that the design of immunogens for anti-V3 antibodies should avoid the Arg at the V3 crown, as GPGR-containing epitopes appear to select for B cells making antibodies of narrower specificity than V3 that carry Gln at this position.

  11. Understanding MHC class I presentation of viral antigens by human dendritic cells as a basis for rational design of therapeutic vaccines.

    PubMed

    van Montfoort, Nadine; van der Aa, Evelyn; Woltman, Andrea M

    2014-01-01

    Effective viral clearance requires the induction of virus-specific CD8(+) cytotoxic T lymphocytes (CTL). Since dendritic cells (DC) have a central role in initiating and shaping virus-specific CTL responses, it is important to understand how DC initiate virus-specific CTL responses. Some viruses can directly infect DC, which theoretically allow direct presentation of viral antigens to CTL, but many viruses target other cells than DC and thus the host depends on the cross-presentation of viral antigens by DC to activate virus-specific CTL. Research in mouse models has highly enhanced our understanding of the mechanisms underlying cross-presentation and the dendritic cells (DC) subsets involved, however, these results cannot be readily translated toward the role of human DC in MHC class I-antigen presentation of human viruses. Here, we summarize the insights gained in the past 20 years on MHC class I presentation of viral antigen by human DC and add to the current debate on the capacities of different human DC subsets herein. Furthermore, possible sources of viral antigens and essential DC characteristics for effective induction of virus-specific CTL are evaluated. We conclude that cross-presentation is not only an efficient mechanism exploited by DC to initiate immunity to viruses that do not infect DC but also to viruses that do infect DC, because cross-presentation has many conceptual advantages and bypasses direct immune modulatory effects of the virus on its infected target cells. Since knowledge on the mechanism of viral antigen presentation and the preferred DC subsets is crucial for rational vaccine design, the obtained insights are very instrumental for the development of effective anti-viral immunotherapy.

  12. Investigating the neural basis for fMRI-based functional connectivity in a blocked design: application to interregional correlations and psycho-physiological interactions.

    PubMed

    Kim, Jieun; Horwitz, Barry

    2008-06-01

    This paper investigates how well different kinds of fMRI functional connectivity analysis reflect the underlying interregional neural interactions. This is hard to evaluate using real experimental data where such relationships are unknown. Rather, we use a biologically realistic neural model to simulate both neuronal activities and multiregional fMRI data from a blocked design. Because we know how every element in the model is related to every other element, we can compare functional connectivity measurements across different spatial and temporal scales. We focus on (1) psycho-physiological interaction (PPI) analysis, which is a simple brain connectivity method that characterizes the activity in one brain region by the interaction between another region's activity and a psychological factor, and (2) interregional correlation analysis. We investigated the neurobiological underpinnings of PPI using simulated neural activities and fMRI signals generated by a large-scale neural model that performs a visual delayed match-to-sample task. Simulated fMRI data are generated by convolving integrated synaptic activities (ISAs) with a hemodynamic response function. The simulation was done under three task conditions: high-attention, low-attention and a control task ('passive viewing'). We investigated how biological and scanning parameters affect PPI and compared these with functional connectivity measures obtained using correlation analysis. We performed correlational and PPI analyses with three types of time-series data: ISA, fMRI and deconvolved fMRI (which yields estimated neural signals) obtained using a deconvolution algorithm. The simulated ISA can be considered as the 'gold standard' because it represents the underlying neural activity. Our main findings show (1) that evaluating the change in an interregional functional connection using the difference in regression coefficients (as is essentially done in the PPI method) produces results that better reflect the

  13. Forecasting Lightning Threat using Cloud-Resolving Model Simulations

    NASA Technical Reports Server (NTRS)

    McCaul, Eugene W., Jr.; Goodman, Steven J.; LaCasse, Katherine M.; Cecil, Daniel J.

    2008-01-01

    Two new approaches are proposed and developed for making time and space dependent, quantitative short-term forecasts of lightning threat, and a blend of these approaches is devised that capitalizes on the strengths of each. The new methods are distinctive in that they are based entirely on the ice-phase hydrometeor fields generated by regional cloud-resolving numerical simulations, such as those produced by the WRF model. These methods are justified by established observational evidence linking aspects of the precipitating ice hydrometeor fields to total flash rates. The methods are straightforward and easy to implement, and offer an effective near-term alternative to the incorporation of complex and costly cloud electrification schemes into numerical models. One method is based on upward fluxes of precipitating ice hydrometeors in the mixed phase region at the-15 C level, while the second method is based on the vertically integrated amounts of ice hydrometeors in each model grid column. Each method can be calibrated by comparing domain-wide statistics of the peak values of simulated flash rate proxy fields against domain-wide peak total lightning flash rate density data from observations. Tests show that the first method is able to capture much of the temporal variability of the lightning threat, while the second method does a better job of depicting the areal coverage of the threat. Our blended solution is designed to retain most of the temporal sensitivity of the first method, while adding the improved spatial coverage of the second. Exploratory tests for selected North Alabama cases show that, because WRF can distinguish the general character of most convective events, our methods show promise as a means of generating quantitatively realistic fields of lightning threat. However, because the models tend to have more difficulty in predicting the instantaneous placement of storms, forecasts of the detailed location of the lightning threat based on single

  14. Driving experience moderates the effect of implicit versus explicit threat priming on hazard perception test.

    PubMed

    Hoffman, Yaakov; Rosenbloom, Tova

    2016-07-01

    Due to the controversial evidence regarding the efficacy of threat campaigns on driving behavior, we addressed the effects of explicit vs. implicit threats. As in other areas of advertisements, we hypothesized that an implicit threat would be more effective, i.e., generate more anxiety than an explicit threat. Furthermore, we hypothesized that such effects would be moderated by driving experience: more experienced drivers when threatened will rely on driving skills and perform in a less cautious manner vs. less experienced drivers who have not yet acquired these skills, and therefore will tend to calm their fear by exercising more caution. Driving behavior in this experimental design was addressed by the Hazard Perception (HP) task. Results were as expected. Anxiety was higher under implicit vs. explicit threat. HP scores however were overall the same for both groups. Implicit priming generated less-cautious behavior in high-experienced drivers while generating more caution for less-experienced drivers. Demonstrating in a single experiment all three driving patterns following threat, namely, no change in driving behavior (whole sample), more cautious driving behavior (less-experience) and less cautious behavior (more-experience), potentially comprises an important step in resolving the aforementioned disparity concerning effects of threat campaigns on driving behavior.

  15. Countering Air and Missile Threats

    DTIC Science & Technology

    2012-03-23

    should not be placed on an airborne warning and control/ airborne C2 aircraft that are not designated as a full time SADC directing ground - based AD in...increase the probability of kill (Pk). Attacks should also be considered against airborne , maritime, and ground - based C2 platforms, as well as...Defense. Area defense uses a combination of weapon systems (e.g., aircraft and SAMs) or various combinations of airborne and ground - based sensors and

  16. The Basis System

    SciTech Connect

    Dubois, P.F.

    1989-05-16

    This paper discusses the basis system. Basis is a program development system for scientific programs. It has been developed over the last five years at Lawrence Livermore National Laboratory (LLNL), where it is now used in about twenty major programming efforts. The Basis System includes two major components, a program development system and a run-time package. The run-time package provides the Basis Language interpreter, through which the user does input, output, plotting, and control of the program's subroutines and functions. Variables in the scientific packages are known to this interpreter, so that the user may arbitrarily print, plot, and calculate with, any major program variables. Also provided are facilities for dynamic memory management, terminal logs, error recovery, text-file i/o, and the attachment of non-Basis-developed packages.

  17. High responsivity to threat during the initial stage of perception in repression: a 3 T fMRI study

    PubMed Central

    Paul, Victoria Gabriele; Rauch, Astrid Veronika; Kugel, Harald; ter Horst, Lena; Bauer, Jochen; Dannlowski, Udo; Ohrmann, Patricia; Lindner, Christian; Donges, Uta-Susan; Kersting, Anette; Egloff, Boris

    2012-01-01

    Repression designates coping strategies such as avoidance, or denial that aim to shield the organism from threatening stimuli. Derakshan et al. have proposed the vigilance–avoidance theory of repressive coping. It is assumed that repressors have an initial rapid vigilant response triggering physiological responses to threat stimuli. In the following second stage repressors manifest avoidant cognitive biases. Functional magnetic resonance imaging at 3T was used to study neural correlates of repressive coping during the first stages of perception of threat. Pictures of human faces bearing fearful, angry, happy and neutral expressions were briefly presented masked by neutral faces. Forty study participants (20 repressive and 20 sensitizing individuals) were selected from a sample of 150 female students on the basis of their scores on the Mainz Coping Inventory. Repressors exhibited stronger neural activation than sensitizers primarily in response to masked threatening faces (vs neutral baseline) in the frontal, parietal and temporal cortex as well as in the cingulate gyrus, basal ganglia and insula. There was no brain region in which sensitizers showed increased activation to emotion expression compared to repressors. The present results are in line with the vigilance–avoidance theory which predicts heightened automatic responsivity to threatening stimuli in repression. PMID:22133562

  18. Technological Innovations to Counter CBRNE Threat Vectors and Ecotage

    NASA Astrophysics Data System (ADS)

    Vaseashta, Ashok

    The ubiquitous presence of sensors for enhanced situational awareness necessitates an innovative, articulate, and focused review of their design, architecture, functionality, and interoperability. A comprehensive overview of the latest and state-of-the art technological innovations in point and stand-off sensing/detection platforms with the objective of countering threats arising from chemical-biological-nuclear-high yield explosives (CBRNE) is the focus of this investigation. Ongoing research efforts and future research directions based on advanced approaches, including nanomaterials to develop materials, devices, and systems for potential use in sensing and detection of such threat vectors are articulated. The concept of advanced sciences convergences is introduced to examine the feasibility of potentially new and innovative research directions for persistent surveillance of CBRNE agents and infectious diseases. The intentional release of such agents in the environment constitutes ecological sabotage. Advanced sensing/detection platforms for CBRNE are used to detect threats to the environment. Issues associated with the use of nanomaterials regarding societal implications and dual-use concerns are addressed by studying fate and transport and the development of guidelines for a risk-assessment model. A roadmap of the future of nanomaterials, in terms of complexity, a nexus of disciplines, and its emerging potential to provide advanced, futuristic, and a paradigm-shifting platform is presented.

  19. Recognizing the real threat of biological terror.

    PubMed Central

    Wenzel, Richard P.

    2002-01-01

    Weapons of mass destruction can be used to harm and terrorize populations. Such weapons include those with chemical, nuclear or biological properties. Obviously computer viruses can add additional barriers to a quick response. The most effective, least costly and greatest threats are biologicals. Biological terror is not new, and biological weapons have been used for centuries. However, as a result of modern technology, the risks are greater now and the outcomes more terrible. Today they include live pathogens, various toxins, and theoretically "bioregulators"--biochemicals affecting cell signaling. Altered cell signaling could be used to induce apoptosis-cell death, or a heightened outpouring of cytokines mimicking overwhelming sepsis, or even an intracellular, biochemical "strike" causing cellular paralysis. Biological weaponeers now have the frightening ability to alter the genetic makeup of pathogens, rendering them resistant not only to available antibiotic therapy but also to currently effective vaccines. In dark corners of some fringe groups, bioweaponeers are searching for the capability of designing pathogens that target specific races, by virtue of discriminating ligands (1). The resulting morbidity and mortality from use of any biological weapons will be accompanied by chaos, governmental and social instability, panic, an extraordinary utilization of available resources, and an ongoing epidemic of sleepless nights (2,3). Herein I will review some of the issues and some of the currently available biological weapons. The major goal is to highlight the clinical presentations of patients with infections that could be used as biological weapons. Images Fig. 1 Fig. 2 Fig. 3 Fig. 4 PMID:12053717

  20. Cyber Threat Assessment of Uplink and Commanding System for Mission Operation

    NASA Technical Reports Server (NTRS)

    Ko, Adans Y.; Tan, Kymie M. C.; Cilloniz-Bicchi, Ferner; Faris, Grant

    2014-01-01

    Most of today's Mission Operations Systems (MOS) rely on Ground Data System (GDS) segment to mitigate cyber security risks. Unfortunately, IT security design is done separately from the design of GDS' mission operational capabilities. This incoherent practice leaves many security vulnerabilities in the system without any notice. This paper describes a new way to system engineering MOS, to include cyber threat risk assessments throughout the MOS development cycle, without this, it is impossible to design a dependable and reliable MOS to meet today's rapid changing cyber threat environment.

  1. Neural mechanisms underlying selective attention to threat.

    PubMed

    Bishop, Sonia J

    2008-01-01

    Biased competition models of selective attention suggest that attentional competition is influenced both by bottom-up sensory mechanisms sensitive to stimulus salience and top-down control mechanisms that support the processing of task-relevant stimuli. This provides a framework for investigating the neural mechanisms underlying selective attention to threat. Both subcortical regions implicated in threat detection--specifically the amygdala--and prefrontal cortical regions implicated in top-down attentional control are activated in response to task-irrelevant threat stimuli. A number of questions including the automaticity of the amygdala response to threat distractors, the modulation by anxiety of the amygdala and prefrontal response to these stimuli, and the impact of genetic and environmental factors upon this circuitry are addressed. The empirical literature is considered in the context of theoretical accounts of the neural substrate of selective attention and conscious awareness. It is suggested that the neural activity provoked by a given visual stimulus is influenced by factors impacting upon the strength of the bottom-up trace (e.g., presentation time, backward masking), stimulus salience (including threat relatedness), competition with other visual stimuli for perceptual processing resources, and the augmentation of the stimulus trace by allocation of top-down attentional resources. Individual differences in trait and state anxiety, and in genetic makeup, are thought to modulate the influence of stimulus valence and top-down attention through their impact upon amygdala and prefrontal function.

  2. Stereotype threat affects financial decision making.

    PubMed

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  3. NEOShield - A global approach to NEO Impact Threat Mitigation

    NASA Astrophysics Data System (ADS)

    Michel, Patrick

    2015-03-01

    NEOShield is a European-Union funded project coordinated by the German Aero-space Center, DLR, to address near-Earth object (NEO) impact hazard mitigation issues. The NEOShield consortium consists of 13 research institutes, universities, and industrial partners from 6 countries and includes leading US and Russian space organizations. The project is funded for a period of 3.5 years from January 2012 with a total of 5.8 million euros. The primary aim of the project is to investigate in detail promising mitigation techniques, such as the kinetic impactor, blast deflection, and the gravity tractor, and devise feasible demonstration missions. Options for an international strategy for implementation when an actual impact threat arises will also be investigated. The NEOShield work plan consists of scientific investigations into the nature of the impact hazard and the physical properties of NEOs, and technical and engineering studies of practical means of deflecting NEOs. There exist many ideas for asteroid deflection techniques, many of which would require considerable scientific and technological development. The emphasis of NEOShield is on techniques that are feasible with current technology, requiring a minimum of research and development work. NEOShield aims to provide detailed designs of feasible mitigation demonstration missions, targeting NEOs of the kind most likely to trigger the first space-based mitigation action. Most of the asteroid deflection techniques proposed to date require physical contact with the threatening object, an example being the kinetic impactor. NEOShield includes research into the mitigation-relevant physical properties of NEOs on the basis of remotely-sensed astronomical data and the results of rendezvous missions, the observational techniques required to efficiently gather mitigation-relevant data on the dynamical state and physical properties of a threatening NEO, and laboratory investigations using gas guns to fire projectiles into

  4. The relationship between threat appraisal and social constraints in cancer survivors and their spouses.

    PubMed

    Herzer, Michele; Zakowski, Sandra G; Flanigan, Robert; Johnson, Peter

    2006-12-01

    : Social constraints stem from unsupportive social environments and are associated with reluctance to discuss stressor-related thoughts and feelings. Support deterioration and erosion models provide a framework for explaining how a cancer patient's threat appraisal contributes to a spouse's inadvertent constraint on the patient's emotional expression. Also, based on social comparison theory and the convoy model, a discrepancy in threat appraisal between patient and spouse may create social constraints. Contrary to social cognitive processing theories, we hypothesized that threat appraisals may be an antecedent of social constraints, rather than a consequence. Cancer patients (n=75) and their spouses (n=75) completed questionnaires assessing cancer-related threat appraisals and perceived spousal social constraints at two time points. Cross-lagged panel design results suggested that patient appraisal precedes and predicts patients' perception of social constraints. However, patient and spouse appraisals did not significantly interact in predicting spousal constraints. Limitations and implications are discussed.

  5. Threats to information security of real-time disease surveillance systems.

    PubMed

    Henriksen, Eva; Johansen, Monika A; Baardsgaard, Anders; Bellika, Johan G

    2009-01-01

    This paper presents the main results from a qualitative risk assessment of information security aspects for a new real-time disease surveillance approach in general, and for the Snow surveillance system in particular. All possible security threats and acceptable solutions, and the implications these solutions had to the design of the system, were discussed. Approximately 30 threats were identified. None of these got an unacceptable high risk level originally, but two got medium risk level, of which one was concluded to be unacceptable after further investigation. Of the remaining low risk threats, some have severe consequence, thus requiring particular assessment. Since it is very important to identify and solve all security threats before real-time solutions can be used in a wide scale, additional investigations are needed.

  6. Rapid Threat Organism Recognition Pipeline

    SciTech Connect

    Williams, Kelly P.; Solberg, Owen D.; Schoeniger, Joseph S.

    2013-05-07

    The RAPTOR computational pipeline identifies microbial nucleic acid sequences present in sequence data from clinical samples. It takes as input raw short-read genomic sequence data (in particular, the type generated by the Illumina sequencing platforms) and outputs taxonomic evaluation of detected microbes in various human-readable formats. This software was designed to assist in the diagnosis or characterization of infectious disease, by detecting pathogen sequences in nucleic acid sequence data from clinical samples. It has also been applied in the detection of algal pathogens, when algal biofuel ponds became unproductive. RAPTOR first trims and filters genomic sequence reads based on quality and related considerations, then performs a quick alignment to the human (or other host) genome to filter out host sequences, then performs a deeper search against microbial genomes. Alignment to a protein sequence database is optional. Alignment results are summarized and placed in a taxonomic framework using the Lowest Common Ancestor algorithm.

  7. Insider Threat Assessment: Model, Analysis and Tool

    NASA Astrophysics Data System (ADS)

    Chinchani, Ramkumar; Ha, Duc; Iyer, Anusha; Ngo, Hung Q.; Upadhyaya, Shambhu

    Insider threat is typically attributed to legitimate users who maliciously leverage their system privileges, and familiarity and proximity to their computational environment to compromise valuable information or inflict damage. According to the annual CSI/FBI surveys conducted since 1996, internal attacks and insider abuse form a significant portion of reported incidents. The strongest indication yet that insider threat is very real is given by the recent study [2] jointly conducted by CERT and the US Secret Service; the first of its kind, which provides an in-depth insight into the problem in a real-world setting. However, there is no known body of work which addresses this problem effectively. There are several challenges, beginning with understanding the threat.

  8. Epidemiology today: Mitigating threats to an ecosystem.

    PubMed

    Kreiger, Nancy

    2016-06-27

    Ecosystems comprise all the living and non-living things in a particular area (e.g., rain forest, desert), which interact and maintain equilibrium. Loss of equilibrium (e.g., clear-cutting trees in a rain forest) can mean the decline of the ecosystem, unless it is able to adapt to the new circumstances. The term "knowledge ecosystem" describes an approach to managing knowledge in a particular field; the components of this system include the people, the technological skills and resources, and information or data. Epidemiology can be thought of as a knowledge ecosystem and, like ecological systems, its existence can be threatened, from both internal and external forces that may alter its equilibrium. This paper describes some threats to the epidemiology knowledge ecosystem, how these threats came about, and what responses we can make that may serve to mitigate those threats.

  9. [The threat of snake and scorpion venoms].

    PubMed

    Płusa, Tadeusz; Smędzik, Katarzyna

    2015-09-01

    Venoms of snakes and scorpions pose a significant threat to the health and life of humans. The speed and range of their actions causes damage of the organ responsible for the maintenance of vital signs. Venomous snake venoms cause blood clotting disorders, tissue necrosis and hemolysis, and the release of a number of proinflammatory cytokines and impair antibody synthesis. Availability of antitoxins is limited and in the most cases supportive treatment is recommended. In turn, the venom of scorpions beside intestinal symptoms cause significant impairment of neuromuscular conduction, causing severe respiratory disorders. Action venom poses a particular threat to sensitive patients. The degree of threat to life caused by the venom of snakes and scorpions authorizes the treatment of these substances as a potential biological weapon.

  10. Multisensor data fusion for IED threat detection

    NASA Astrophysics Data System (ADS)

    Mees, Wim; Heremans, Roel

    2012-10-01

    In this paper we present the multi-sensor registration and fusion algorithms that were developed for a force protection research project in order to detect threats against military patrol vehicles. The fusion is performed at object level, using a hierarchical evidence aggregation approach. It first uses expert domain knowledge about the features used to characterize the detected threats, that is implemented in the form of a fuzzy expert system. The next level consists in fusing intra-sensor and inter-sensor information. Here an ordered weighted averaging operator is used. The object level fusion between candidate threats that are detected asynchronously on a moving vehicle by sensors with different imaging geometries, requires an accurate sensor to world coordinate transformation. This image registration will also be discussed in this paper.

  11. Environmental Health: Threats and their Interactions

    PubMed Central

    Holdstock, Douglas

    2008-01-01

    Improvements in the provision of an acceptable standard of health care, particularly in the developing world, will be undermined by three ongoing processes: ongoing armed conflicts; the threat of global warming due to rising levels of greenhouse gases, particularly carbon dioxide emitted by developed countries; and by rapidly rising populations. The key features of these three threats are summarised, and it is shown that interactions between them increase both the likelihood of their occurrence and the probable harm that they will cause. Some of the interactions are described, with ways of providing health care taking into account the threats and their interactions, and the paradox is emphasised that better health care in the developing world will further increase population growth followed by increased greenhouse gas emissions. Improved education for women and free and unlimited access to modern methods of contraception are vital. PMID:21572838

  12. Left-Wing Extremism: The Current Threat

    SciTech Connect

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  13. Stimulus-Driven Attention, Threat Bias, and Sad Bias in Youth with a History of an Anxiety Disorder or Depression.

    PubMed

    Sylvester, Chad M; Hudziak, James J; Gaffrey, Michael S; Barch, Deanna M; Luby, Joan L

    2016-02-01

    Attention biases towards threatening and sad stimuli are associated with pediatric anxiety and depression, respectively. The basic cognitive mechanisms associated with attention biases in youth, however, remain unclear. Here, we tested the hypothesis that threat bias (selective attention for threatening versus neutral stimuli) but not sad bias relies on stimulus-driven attention. We collected measures of stimulus-driven attention, threat bias, sad bias, and current clinical symptoms in youth with a history of an anxiety disorder and/or depression (ANX/DEP; n = 40) as well as healthy controls (HC; n = 33). Stimulus-driven attention was measured with a non-emotional spatial orienting task, while threat bias and sad bias were measured at a short time interval (150 ms) with a spatial orienting task using emotional faces and at a longer time interval (500 ms) using a dot-probe task. In ANX/DEP but not HC, early attention bias towards threat was negatively correlated with later attention bias to threat, suggesting that early threat vigilance was associated with later threat avoidance. Across all subjects, stimulus-driven orienting was not correlated with early threat bias but was negatively correlated with later threat bias, indicating that rapid stimulus-driven orienting is linked to later threat avoidance. No parallel relationships were detected for sad bias. Current symptoms of depression but not anxiety were related to decreased stimulus-driven attention. Together, these results are consistent with the hypothesis that threat bias but not sad bias relies on stimulus-driven attention. These results inform the design of attention bias modification programs that aim to reverse threat biases and reduce symptoms associated with pediatric anxiety and depression.

  14. Bioterrorism: is it a real threat?

    PubMed

    Gottschalk, René; Preiser, Wolfgang

    2005-05-01

    The Geneva Protocol of 1925 commits the signatory nations to refraining from the use of biological weapons. However, the terrorist assaults of September 2001 and, subsequently, the anthrax-containing letters are cause for great concerns: new threats to the security of nations are expected, as terrorist organizations seem to increasingly explore novel ways of spreading terror. In this context, naturally emerging diseases such as SARS, monkeypox or West Nile fever assume new importance because it is difficult to distinguish between natural epidemics and possible bioweapon assaults. Great efforts on the part of governments and public health authorities are necessary to counteract these threats.

  15. Performance of single-stage compressor designed on basis of constant total enthalpy with symmetrical velocity diagram at all radii and velocity ratio of 0.7 at rotor hub / Jack R. Burtt and Robert J. Jackson

    NASA Technical Reports Server (NTRS)

    Burtt, Jack R; Jackson, Robert J

    1951-01-01

    A typical inlet axial-flow compressor inlet stage, which was designed on the basis of constant total enthalpy with symmetrical velocity diagram at all radii, was investigated. At a tip speed of 1126 feet per second, a peak pressure ratio of 1.28 was obtained at an efficiency of 0.76. At a tip speed, the highest practical flow was 28 pounds per second per square foot frontal area with an efficiency of 0.78. Data for a rotor relative inlet Mach number range of from 0.5 to 0.875 indicates that the critical value for any stage radial element is approximately 0.80 for the stage investigated.

  16. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not require a public accommodation to permit an individual to participate in or benefit from the goods, services, facilities, privileges, advantages and accommodations of that public accommodation when...

  17. Primary Auditory Cortex Regulates Threat Memory Specificity

    ERIC Educational Resources Information Center

    Wigestrand, Mattis B.; Schiff, Hillary C.; Fyhn, Marianne; LeDoux, Joseph E.; Sears, Robert M.

    2017-01-01

    Distinguishing threatening from nonthreatening stimuli is essential for survival and stimulus generalization is a hallmark of anxiety disorders. While auditory threat learning produces long-lasting plasticity in primary auditory cortex (Au1), it is not clear whether such Au1 plasticity regulates memory specificity or generalization. We used…

  18. Al Qaeda in Iraq: Demobilizing the Threat

    DTIC Science & Technology

    2005-12-01

    Insurgents.................. 130 b. Amnesty and Reconciliation Program .................... 130 c. Legitimize the Democratically-Elected Government...Socio-Economic............................... 132 a. Provide Employment and Opportunities................. 132 b. Secure the Economic Elite... evaluate strategies that have the potential to defeat or demobilize the threat. A majority of insurgency-counterinsurgency literature deals with

  19. Threats to Academic Freedom in Higher Education.

    ERIC Educational Resources Information Center

    Oldaker, Lawrence Lee

    This paper looks at the meaning of academic freedom and threats to that freedom in recent conflicts and legal rulings. The introduction calls academic freedom confusing and widely misunderstood and offers an historical and legal explanation of the concept as well as discussion of the traditional areas of conflict in instruction, research,…

  20. Antibiotic and Antimicrobial Resistance: Threat Report 2013

    MedlinePlus

    ... resistant Staphylococcus aureus (MRSA) [page 77] Drug-resistant Streptococcus pneumoniae [page 79] Drug-resistant tuberculosis [page 81] Microorganisms with a Threat Level of Concerning Vancomycin-resistant Staphylococcus aureus ... Streptococcus [page 87] Clindamycin-resistant Group B Streptococcus [page ...

  1. Global threat to agriculture from invasive species.

    PubMed

    Paini, Dean R; Sheppard, Andy W; Cook, David C; De Barro, Paul J; Worner, Susan P; Thomas, Matthew B

    2016-07-05

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread.

  2. Threats and countermeasures for network security

    NASA Technical Reports Server (NTRS)

    Denning, Peter J.

    1991-01-01

    In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented.

  3. Stereotype Threat and Women's Performance in Physics

    ERIC Educational Resources Information Center

    Marchand, Gwen C.; Taasoobshirazi, Gita

    2013-01-01

    Stereotype threat (ST), which involves confirming a negative stereotype about one's group, is a factor thought to contribute to the gender gap in science achievement and participation. This study involved a quasi-experiment in which 312 US high school physics students were randomly assigned, via their classroom cluster, to one of three ST…

  4. The silent threat of low genetic diversity

    USGS Publications Warehouse

    Hunter, Margaret E.

    2013-01-01

    Across the Caribbean, protected coastal waters have served as primary feeding and breeding grounds for the endangered Antillean manatee. Unfortunately, these same coastal waters are also a popular “habitat” for humans. In the past, the overlap between human and manatee habitat allowed for manatee hunting and threatened the survival of these gentle marine mammals. Today, however, threats are much more inadvertent and are often related to coastal development, degraded habitats and boat strikes. In the state of Florida, decades of research on the species’ biological needs have helped conservationists address threats to its survival. For example, low wake zones and boater education have protected manatees from boat strikes, and many of their critical winter refuges are now protected. The Florida population has grown steadily, thus increasing from approximately 1,200 in 1991 to more than 5,000 in 2010. It is conceivable that in Florida manatees may one day be reclassified as “threatened” rather than “endangered.” Yet, in other parts of the Caribbean, threats still loom. This includes small, isolated manatee populations found on islands that can be more susceptible to extinction and lack of genetic diversity. To ensure the species’ long-term viability, scientists have turned their sights to the overall population dynamics of manatees throughout the Caribbean. Molecular genetics has provided new insights into long-term threats the species faces. Fortunately, the emerging field of conservation genetics provides managers with tools and strategies for protecting the species’ long-term viability.

  5. Hostile Intelligence Threat U.S. Technology

    DTIC Science & Technology

    1988-11-01

    Assistant Secretary of Defense for DoD 5200.1-PH-2 Command, Control, Comunnications , and Intelligence (703) 695-2686 DEPARTMENT OF DEFENSE DTIC...intelligence threat: "* PROGRAM MANAGER Telephone: "* INSTALLATION SECURITY OFFICE Telephone: "* LOCAL DIS COGNIZANT SECURITY OFFICE (Industrial

  6. Global threat to agriculture from invasive species

    PubMed Central

    Paini, Dean R.; Sheppard, Andy W.; Cook, David C.; De Barro, Paul J.; Worner, Susan P.; Thomas, Matthew B.

    2016-01-01

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread. PMID:27325781

  7. The Lone Wolf Threat: A Different Approach

    DTIC Science & Technology

    2016-03-24

    intelligence communities and law enforcement agencies can employ asymmetric strategic approaches to aid in interdicting the lone wolf terrorist. 15...and a Golden Moment is identified in which intelligence communities and law enforcement agencies can employ asymmetric strategic approaches to aid ...and model presented in the thesis will further aid homeland security entities in combating this asymmetric threat. 40    CHAPTER 7: CONCLUSION

  8. The Nature of the Terrorism Threat

    ERIC Educational Resources Information Center

    Goldstein, Evan R., Comp.

    2008-01-01

    This article describes how Bruce Hoffman and Marc Sageman, two prominent scholars of terrorism, square off over whether Al Qaeda remains the primary global terrorist threat. The dispute began in the pages of "Foreign Affairs," where Hoffman, a professor in the security-studies program at Georgetown University, wrote a withering review of…

  9. Computer Security-Risks, Threats, and Safeguards.

    ERIC Educational Resources Information Center

    Ekhaml, Leticia

    2001-01-01

    Describes a variety of Internet threats to computers and networks used in schools. Discusses electronic trashing; clearing hard drives; cyber spying on Web sites visited; protection against cyber spying, including disposable email accounts; password sniffers; privacy policies; email snooping; email attachments that carry viruses; and hoaxes. (LRW)

  10. A Physicist Looks at the Terrorist Threat

    NASA Astrophysics Data System (ADS)

    Muller, Richard

    2009-05-01

    Many people fear a terrorist nuclear device, smuggled into the United States, as the one weapon that could surpass the destruction and impact of 9-11. I'll review the design of nuclear weapons, with emphasis on the kinds that can be developed by rogue nations, terrorist groups, and high-school students. Saddam, prior to the first gulf war, was developing a uranium bomb, similar to the one that destroyed Hiroshima. His calutrons (named after my university) were destroyed by the United Nations. The North Korean nuclear weapon was, like the U.S. bomb used on Nagasaki, based on plutonium. Its test released the energy equivalent of about 400 tons of TNT. Although some people have speculated that they were attempting to build a small bomb, it is far more likely that this weapon was a fizzle, with less than 1 percent of the plutonium exploded. In contrast, the energy released from burning jet fuel at the 9-11 World Trade Center attack was the equivalent of 900 tons of TNT for each plane -- over twice that of the North Korean Nuke. The damage came from the fact that gasoline delivers 10 kilocalories per gram, about 15 times the energy of an equal weight of TNT. It is this huge energy per gram that also accounts for our addiction to gasoline; per gram, high performance lithium-ion computer batteries carry only 1 percent as much energy. A dirty bomb (radiological weapon) is also unattractive to terrorists because of the threhold effect: doses less than 100 rem produce no radiation illness and will leave no dead bodies at the scene. That may be why al Qaeda instructed Jose Padilla to abandon his plans for a dirty bomb attack in Chicago, and to try a fossil fuel attack (natural gas) instead. I will argue that the biggest terrorist threat is the conventional low-tech one, such as an airplane attack on a crowded stadium using the explosive fuel that they can legally buy at the corner station.

  11. Threats to avifauna on oceanic islands.

    PubMed

    Trevino, Heather S; Skibiel, Amy L; Karels, Tim J; Dobson, F Stephen

    2007-02-01

    Results of the study by Blackburn et al. (2004a) of avifauna on oceanic islands suggest that distance from the mainland and time since European colonization have major influences on species extinctions and that island area is a significant but secondary contributing factor. After augmenting the data of the study on geographical properties for some of the islands they examined, we used a causal analysis approach with structural equation modeling to reexamine their conclusions. In our model geographical properties of islands, such as island area and isolation, were considered constraints on biological factors, such as the number of introduced mammalian predators and existing number of avifauna, that can directly or indirectly influence extinction. Of the variables we tested, island area had the greatest total influence on the threat of extinction due to its direct and indirect effects on the size of island avifauna. Larger islands had both a greater number of threatened bird species and more avifauna, increasing the number of species that could become threatened with extinction. Island isolation also had a significant, positive, and direct effect on threats to island avifauna because islands farther from the mainland had fewer current extant avifauna. Time since European colonization had a significant negative, but relatively weaker, influence on threats compared with the traditional biogeographic factors of island area and distance to the mainland. We also tested the hypothesis that the amount of threat is proportionally lower on islands that have had more extinctions (i.e., there is a "filter effect"). Because the proportion of bird extinctions potentially explained only 2.3% of the variation in the proportion of threatened species on islands, our results did not support this hypothesis. Causal modeling provided a powerful tool for examining threat of extinction patterns of known and hypothesized pathways of influence.

  12. On keeping your enemies close: powerful leaders seek proximity to ingroup power threats.

    PubMed

    Mead, Nicole L; Maner, Jon K

    2012-03-01

    Throughout history, humans have had to detect and deflect myriad threats from their social and physical environment in order to survive and flourish. When people detect a threat, the most common response is avoidance. In the present research, the authors provide evidence that ingroup power threats elicit a very different response. Three experiments supported the hypothesis that dominant leaders seek proximity to ingroup members who pose a threat to their power, as a way to control and downregulate the threat that those members pose. In each experiment, leaders high (but not low) in dominance motivation sought proximity to an ingroup member who threatened their power. Consistent with the hypothesis that increased proximity was designed to help leaders protect their own power, the proximity effect was apparent only under conditions of unstable power (not stable power), only in the absence of intergroup competition (not when a rival outgroup was present), and only toward a threatening group member (not a neutral group member). Moreover, the effect was mediated by perceptions of threat (Experiment 1) and the desire to monitor the threatening group member (Experiment 3). These results shed new light on one key strategy through which dominant leaders try to maintain control over valuable yet potentially threatening group members. Findings have implications for theories of power, leadership, and group behavior.

  13. Promoting dental hygiene to children: comparing traditional and interactive media following threat appeals.

    PubMed

    Panic, Katarina; Cauberghe, Veroline; De Pelsmacker, Patrick

    2014-01-01

    Until now, social marketing campaigns mainly targeted children using traditional media. However, little is known about the effectiveness of computer games to communicate health-related information to children. This study compares the impact of an interactive game as a medium to provide health information and improve children's dietary habits to the impact of more traditional media. Using a 2 × 3 between-subject factorial design with 190 children (7-9 years old), this study investigates the effect of threat messages (weak vs. strong) concerning dental hygiene on behavioral outcome (snack choice), and how this effect is moderated by the type of medium used to communicate subsequent health information after the threat appeal (computer game, information brochure, narrative story). Results show a positive significant effect of perceived threat on children's adaptive behavior. However, this effect only remains significant when afterwards children are exposed to a narrative health-related story. When children play a game or read a brochure, they need to devote more attention to process this content, distracting them from the original threat message. In sum, when a threat message is followed by additional health information, the medium through which this information is presented influences the effectiveness of the preceding threat message.

  14. The Relationships Between Internal and External Threats and Right-Wing Attitudes: A Three-Wave Longitudinal Study.

    PubMed

    Onraet, Emma; Dhont, Kristof; Van Hiel, Alain

    2014-06-01

    The interplay between threat and right-wing attitudes has received much research attention, but its longitudinal relationship has hardly been investigated. In this study, we investigated the longitudinal relationships between internal and external threats and right-wing attitudes using a cross-lagged design at three different time points in a large nationally representative sample (N = 800). We found evidence for bidirectional relationships. Higher levels of external threat were related to higher levels of Right-Wing Authoritarianism (RWA) and to both the egalitarianism and dominance dimensions of Social Dominance Orientation at a later point in time. Conversely, higher levels of RWA were also related to increased perception of external threat later in time. Internal threat did not yield significant direct or indirect longitudinal relationships with right-wing attitudes. Theoretical and practical implications of these longitudinal effects are discussed.

  15. The role of ingroup threat and conservative ideologies on prejudice against immigrants in two samples of Italian adults.

    PubMed

    Caricati, Luca; Mancini, Tiziana; Marletta, Giuseppe

    2017-01-01

    This research investigated the relationship among perception of ingroup threats (realistic and symbolic), conservative ideologies (social dominance orientation [SDO] and right-wing authoritarianism [RWA]), and prejudice against immigrants. Data were collected with a cross-sectional design in two samples: non-student Italian adults (n = 223) and healthcare professionals (n = 679). Results were similar in both samples and indicated that symbolic and realistic threats, as well as SDO and RWA, positively and significantly predicted anti-immigrant prejudice. Moreover, the model considering SDO and RWA as mediators of threats' effects on prejudice showed a better fit than the model in which ingroup threats mediated the effects of SDO and RWA on prejudice against immigrants. Accordingly, SDO and RWA partially mediated the effect of both symbolic and realistic threats, which maintained a significant effect on prejudice against immigrants, however.

  16. Neuromechanical Basis of Kinesiology.

    ERIC Educational Resources Information Center

    Enoka, Roger M.

    This textbook provides a scientific basis for the study of human motion. The eight chapters are organized under three major sections. Part One--The Force-Motion Relationship--contains chapters on (1) motion; (2) force; (3) types of movement analysis. In Part Two--The Simple Joint System--chapters concern (4) simple joint system components; (5)…

  17. Dopamine D2 receptors gate generalization of conditioned threat responses through mTORC1 signaling in the extended amygdala

    PubMed Central

    De Bundel, Dimitri; Zussy, Charleine; Espallergues, Julie; Gerfen, Charles R; Girault, Jean-Antoine; Valjent, Emmanuel

    2016-01-01

    Overgeneralization of conditioned threat responses is a robust clinical marker of anxiety disorders. In overgeneralization, responses that are appropriate to threat-predicting cues are evoked by perceptually similar safety-predicting cues. Inappropriate learning of conditioned threat responses may thus form an etiological basis for anxiety disorders. The role of dopamine (DA) in memory encoding is well established. Indeed by signaling salience and valence, DA is thought to facilitate discriminative learning between stimuli representing safety or threat. However, the neuroanatomical and biochemical substrates through which DA modulates overgeneralization of threat responses remain poorly understood. Here we report that the modulation of DA D2 receptor (D2R) signaling bidirectionally regulates the consolidation of fear responses. While the blockade of D2R induces generalized fear responses, its stimulation facilitates discriminative learning between stimuli representing safety or threat. Moreover, we show that controlled fear generalization requires the coordinated activation of D2R in the bed nucleus of the stria terminalis (BNST) and the central amygdala (CEA). Finally, we identify the mTORC1 cascade activation as an important molecular event by which D2R mediates its effects. These data reveal that D2R signaling in the extended amygdala constitutes an important checkpoint through which DA participates in the control of threat processing and the emergence of overgeneralized fear responses. PMID:26782052

  18. Microbial Threats to Health. Emerging Infections: Microbial Threats to Health in the United States.

    DTIC Science & Technology

    1992-10-01

    Cryptosporidiosis - a parasitic infection of the epithelial cells of the gastrointestinal . biliary, and respiratory tracts of man, as well as other... gastrointestinal tract (where the female lays eggs) MODE OF TRANSMISSION - penetration of skin or mucous membrane by infective larvae (usually from fecally...AD-A257 841 AD____ GRANT NO: DAMD17-90-Z-0047 TITLE: MICROBIAL THREATS TO HEALTH SUBTITLE: REmerging Infections - Microbial Threats to Health in the

  19. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    DTIC Science & Technology

    2013-08-01

    Research Corp. 1750 Commerce Blvd. North 1001 Leadership Place 60 Frontage Road Fairborn, OH 45324-6362 Killeen, TX...rank, and the MOS by rank. The five Soldiers with MOSs other than 11B had deployed, as did one Soldier with an MOS of infantryman (11B). 9...next to the tree [is a threat] because it could be an IED, the actual tree [could be a threat] because somebody could be hiding in it,” • “The weeds

  20. Comprehensive test ban treaty international monitoring system security threats and proposed security attributes

    SciTech Connect

    Draelos, T.J.; Craft, R.L.

    1996-03-01

    To monitor compliance with a Comprehensive Test Ban Treaty (CTBT), a sensing network, referred to as the International Monitoring System (IMS), is being deployed. Success of the IMS depends on both its ability to preform its function and the international community`s confidence in the system. To ensure these goals, steps must be taken to secure the system against attacks that would undermine it; however, it is not clear that consensus exists with respect to the security requirements that should be levied on the IMS design. In addition, CTBT has not clearly articulated what threats it wishes to address. This paper proposes four system-level threats that should drive IMS design considerations, identifies potential threat agents, and collects into one place the security requirements that have been suggested by various elements of the IMS community. For each such requirement, issues associated with the requirement are identified and rationale for the requirement is discussed.

  1. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    PubMed Central

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  2. Vision-based threat detection in dynamic environments.

    SciTech Connect

    Carlson, Jeffrey J.

    2007-08-01

    This report addresses the development of automated video-screening technology to assist security forces in protecting our homeland against terrorist threats. A prevailing threat is the covert placement of bombs inside crowded public facilities. Although video-surveillance systems are increasingly common, current systems cannot detect the placement of bombs. It is also unlikely that security personnel could detect a bomb or its placement by observing video from surveillance cameras. The problems lie in the large number of cameras required to monitor large areas, the limited number of security personnel employed to protect these areas, and the intense diligence required to effectively screen live video from even a single camera. Different from existing video-detection systems designed to operate in nearly static environments, we are developing technology to detect changes in the background of dynamic environments: environments where motion and human activities are persistent over long periods. Our goal is to quickly detect background changes, even if the background is visible to the camera less than 5 percent of the time and possibly never free from foreground activity. Our approach employs statistical scene models based on mixture densities. We hypothesized that the background component of the mixture has a small variance compared to foreground components. Experiments demonstrate this hypothesis is true under a wide variety of operating conditions. A major focus involved the development of robust background estimation techniques that exploit this property. We desire estimation algorithms that can rapidly produce accurate background estimates and detection algorithms that can reliably detect background changes with minimal nuisance alarms. Another goal is to recognize unusual activities or foreground conditions that could signal an attack (e.g., large numbers of running people, people falling to the floor, etc.). Detection of background changes and/or unusual

  3. Threat assessment and sensor management in a modular architecture

    NASA Astrophysics Data System (ADS)

    Page, S. F.; Oldfield, J. P.; Islip, S.; Benfold, B.; Brandon, R.; Thomas, P. A.; Stubbins, D. J.

    2016-10-01

    Many existing asset/area protection systems, for example those deployed to protect critical national infrastructure, are comprised of multiple sensors such as EO/IR, radar, and Perimeter Intrusion Detection Systems (PIDS), loosely integrated with a central Command and Control (C2) system. Whilst some sensors provide automatic event detection and C2 systems commonly provide rudimentary multi-sensor rule based alerting, the performance of such systems is limited by the lack of deep integration and autonomy. As a result, these systems have a high degree of operator burden. To address these challenges, an architectural concept termed "SAPIENT" was conceived. SAPIENT is based on multiple Autonomous Sensor Modules (ASMs) connected to a High-Level Decision Making Module (HLDMM) that provides data fusion, situational awareness, alerting, and sensor management capability. The aim of the SAPIENT concept is to allow for the creation of a surveillance system, in a modular plug-and-play manner, that provides high levels of autonomy, threat detection performance, and reduced operator burden. This paper considers the challenges associated with developing an HLDMM aligned with the SAPIENT concept, through the discussion of the design of a realised HLDMM. Particular focus is drawn to how high levels of system level performance can be achieved whilst retaining modularity and flexibility. A number of key aspects of our HLDMM are presented, including an integrated threat assessment and sensor management framework, threat sequence matching, and ASM trust modelling. The results of real-world testing of the HLDMM, in conjunction with multiple Laser, Radar, and EO/IR sensors, in representative semi-urban environments, are discussed.

  4. Future Infectious Disease Threats to Europe

    PubMed Central

    Suk, Jonathan E.

    2011-01-01

    We examined how different drivers of infectious disease could interact to threaten control efforts in Europe. We considered projected trends through 2020 for 3 broad groups of drivers: globalization and environmental change, social and demographic change, and health system capacity. Eight plausible infectious disease threats with the potential to be significantly more problematic than they are today were identified through an expert consultation: extensively drug-resistant bacteria, vector-borne diseases, sexually transmitted infections, food-borne infections, a resurgence of vaccine-preventable diseases, health care–associated infections, multidrug-resistant tuberculosis, and pandemic influenza. Preemptive measures to be taken by the public health community to counteract these threats were identified. PMID:21940915

  5. Detecting underwater improvised explosive threats (DUIET)

    NASA Astrophysics Data System (ADS)

    Feeley, Terry

    2010-04-01

    Improvised Explosive Devices (IEDs) have presented a major threat in the wars in Afghanistan and Iraq. These devices are powerful homemade land mines that can be small and easily hidden near roadsides. They are then remotely detonated when Coalition Forces pass by either singly or in convoys. Their rapid detection, classification and destruction is key to the safety of troops in the area. These land based bombs will have an analogue in the underwater theater especially in ports, lakes, rivers and streams. These devices may be used against Americans on American soil as an element of the global war on terrorism (GWOT) Rapid detection and classification of underwater improvised explosive devices (UIED) is critical to protecting innocent lives and maintaining the day to day flow of commerce. This paper will discuss a strategy and tool set to deal with this potential threat.

  6. Current nuclear threats and possible responses

    NASA Astrophysics Data System (ADS)

    Lamb, Frederick K.

    2005-04-01

    Over the last 50 years, the United States has spent more than 100 billion developing and building a variety of systems intended to defend its territory against intercontinental-range ballistic missiles. Most of these systems never became operational and ultimately all were judged ineffective. The United States is currently spending about 10 billion per year developing technologies and systems intended to defend against missiles that might be acquired in the future by North Korea or Iran. This presentation will discuss these efforts ad whether they are likely to be more effective than those of the past. It will also discuss the proper role of anti-ballistic programs at a time when the threat of a nuclear attack on the U.S. by terrorists armed with nuclear weapons is thought to be much higher than the threat of an attack by nuclear-armed ballistic missles.

  7. Securing Infrastructure from High Explosive Threats

    SciTech Connect

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  8. Common Viruses a Deadly Threat At Nursing Homes

    MedlinePlus

    ... 163048.html Common Viruses a Deadly Threat at Nursing Homes RSV and human metapneumovirus need to be ... News) -- Common viruses pose a serious threat in nursing homes, often sabotaging standard infection control measures, a ...

  9. Introduction to Administrative Programs that Mitigate the Insider Threat

    SciTech Connect

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  10. Uncertainties in the North Korean Nuclear Threat

    DTIC Science & Technology

    2010-01-01

    providing objective analysis and effective solutions that address the challenges facing the public and private sectors around the world . RAND’s...stigmatize Korean goods, further complicating problems for the Korean economy. And economic disruption can ripple through an economy in devastating ways...the outside world . 1 “N. Korean Poster Seems to Confi rm Succession,” 2009. 4 Uncertainties in the North Korean Nuclear Threat NK Nuclear

  11. Viral haemorrhagic fevers: current status, future threats.

    PubMed

    Speed, B R; Gerrard, M P; Kennett, M L; Catton, M G; Harvey, B M

    1996-01-15

    In developing countries, the major outbreaks of viral haemorrhagic fevers such as Marburg, Ebola and Lassa fever viruses have been nosocomially spread. The high mortality and absence of specific treatment have had a devastating effect. Epidemics of this highly contagious disease remain a constant threat to Australia and, as a result, carefully planned laboratory and public health strategies and clinical infection control measures have been instituted for the management of suspected cases.

  12. SARS: Down But Still a Threat

    DTIC Science & Technology

    2003-08-01

    economic and political impact. • Although SARS has killed far fewer people than die each year from more common maladies such as pneumonia, influenza...is not necessarily authoritative. DI Cartography Center/MPG 764135AI 8-03 All of these diseases, except cholera , dengue, and diphtheria, are... Cholera O1 Dengue/Dengue Hemorrhagic Fever Cholera O139 Dengue 9 Discussion SARS: Down But Still a Threat The Global Health Challenge

  13. Dismount Threat Recognition through Automatic Pose Identification

    DTIC Science & Technology

    2012-03-01

    camera and joint estimation software of the Kinect for Xbox 360. A threat determination is made based on the pose identified by the network. Ac- curacy...The automobile industry continues to refine pedestrian avoidance systems to assist drivers [14,15]. Microsoft’s Kinect for Xbox 360 [3] uses real-time...Conference on Acoustics, Speech and Signal Process- ing , Vol. 4, April 2007, pp. IV–21 – IV–24. 3. Kinect for Xbox 360 , Microsoft Corp., Redmond WA. 4

  14. The Divisive Threat of Immigration in Europe

    DTIC Science & Technology

    2012-12-01

    Europe , immigrant children consistently underperformed in reading. This disparity suggests that immigrant children will have lower literacy rates, less...OF IMMIGRATION IN EUROPE by Andrew J. Sheehan Lars W. Lilleby December 2012 Thesis Advisor: Gordon McCormick Second Reader: Anna...COVERED Master’s Thesis 4. TITLE AND SUBTITLE The Divisive Threat of Immigration in Europe 5. FUNDING NUMBERS 6. AUTHOR(S) Lars W. Lilleby

  15. Understanding Public Responses to Domestic Threats

    DTIC Science & Technology

    2007-09-01

    to shortages and gray markets , including both black market activities and grayer ones, like preferential treatment for families of officials or the...government is creating sufficient stockpiles for them. Insufficient government stockpiling may lead to gray markets for masks, utilized by citizens to build...Potential threats to social resilience are gray markets , addressing shortages illegally or unethically (e.g., favored treatment for officials’ families

  16. Safeguarding Canadian Arctic Sovereignty Against Conventional Threats

    DTIC Science & Technology

    2009-06-01

    The effects of climate change as well as national interests over control of vast amounts of natural resources in the Arctic seem to be... natural resources in the Arctic seem to be destabilizing the geostrategic environment involving the circumpolar states. A traditional conflict...sovereignty in the Arctic. The changing geostrategic environment in the region however, and the nature of the potential conventional threat, may compel

  17. Matrix Characterization in Threat Material Detection Processes

    SciTech Connect

    Obhodas, J.; Sudac, D.; Valkovic, V.

    2009-03-10

    Matrix characterization in the threat material detection is of utmost importance, it generates the background against which the threat material signal has to be identified. Threat materials (explosive, chemical warfare, ...) are usually contained within small volume inside large volumes of variable matrices. We have studied the influence of matrix materials on the capability of neutron systems to identify hidden threat material. Three specific scenarios are considered in some details: case 1--contraband material in the sea containers, case 2 - explosives in soil (landmines), case 3 - explosives and chemical warfare on the sea bottom. Effects of container cargo material on tagged neutron system are seen in the increase of gamma background and the decrease of neutron beam intensity. Detection of landmines is more complex because of variable soil properties. We have studied in detail space and time variations of soil elemental compositions and in particular hydrogen content (humidity). Of special interest are ammunitions and chemical warfare on the sea bottom, damping sites and leftovers from previous conflicts (WW-I, WW-II and local). In this case sea sediment is background source and its role is similar to the role of the soil in the landmine detection. In addition to geochemical cycling of chemical elements in semi-enclosed sea, like the Adriatic Sea, one has to consider also anthropogenic influence, especially when studying small scale variations in concentration levels. Some preliminary experimental results obtained with tagged neutron sensor inside an underwater vehicle are presented as well as data on sediment characterization by X-Ray Fluorescence.

  18. Nonproliferation, Nuclear Security, and the Insider Threat

    SciTech Connect

    Balatsky, Galya I.; Duggan, Ruth

    2012-07-12

    Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

  19. Avian influenza: an emerging pandemic threat.

    PubMed

    Jin, Xian Wen; Mossad, Sherif B

    2005-12-01

    While we are facing the threat of an emerging pandemic from the current avian flu outbreak in Asia, we have learned important traits of the virus responsible for the 1918 Spanish influenza pandemic that made it so deadly. By using stockpiled antiviral drugs effectively and developing an effective vaccine, we can be in a better position than ever to mitigate the global impact of an avian influenza pandemic.

  20. Harbor Threat Detection, Classification, and Identification

    DTIC Science & Technology

    2006-09-30

    used for testing. As an example, the results for separating divers using structural acoustics-based features for closed systems (MK16, optima , and...for practical deployment purposes but the frequency range are sufficiently broad enough to capitalize on potential discoveries of target/false target...Task 1: Database Generation: NRL will provide measurements and analysis of additional signature threats by using its Laboratory for Structural

  1. The MANPAD Threat to Civilian Airliners

    DTIC Science & Technology

    2006-03-03

    PAGES: 19 KEY TERMS: Homeland Security; Non-Proliferation; Airport Security CLASSIFICATION: Unclassified This paper investigates strategic approaches...technological solutions and law enforcement operations to provide a competent airport security perimeter.”18 To combat this ominous threat of MANPADS...sites for phone and computer tips should be established with access for airport security , local and federal law enforcement, as well as intelligence

  2. Stereotype Threat Reinterpreted as a Regulatory Mismatch

    PubMed Central

    Grimm, Lisa R.; Markman, Arthur B.; Maddox, W. Todd; Baldwin, Grant C.

    2008-01-01

    Research documents performance decrements resulting from the activation of a negative task-relevant stereotype. We combine a number of strands of work to identify causes of stereotype threat in a way that allows us to reverse the effects and improve the performance of individuals with negative task-relevant stereotypes. We draw on prior work suggesting that negative stereotypes induce a prevention focus, and other research suggesting that people exhibit greater flexibility when their regulatory focus matches the reward structure of the task. This work suggests that stereotype threat effects emerge from a prevention focus combined with tasks that have an explicit or implicit gains reward structure. We find flexible performance can be induced in individuals who have a negative task-relevant stereotype by using a losses reward structure. We demonstrate the interaction of stereotypes and the reward structure of the task using chronic stereotypes and GRE math problems (Experiment 1), and primed stereotypes and a category learning task (Experiments 2a and 2b). We discuss implications of this research for other work on stereotype threat. PMID:19159133

  3. Asymmetric threat data mining and knowledge discovery

    NASA Astrophysics Data System (ADS)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  4. Impact! - The Threat of Comets and Asteroids

    NASA Astrophysics Data System (ADS)

    Verschuur, Gerrit L.

    1997-12-01

    In Impact , Gerrit L. Verschuur offers an eye-opening look at the catastrophic collisions of comets and asteroids with our planet. Perhaps more important, he paints an unsettling portrait of the possibility of new collisions with earth, exploring potential threats to our planet and describing what scientists are doing right now to prepare for this frightening possibility. Every day something from space hits our planet, Verschuur reveals. In fact, about 10,000 tons of space debris fall to earth every year, mostly in meteoric form. But meteors are not the greatest threat to life on earth, the author points out. The major threats are asteroids and comets. The reader discovers that astronomers have located some 350 NEAs ("Near Earth Asteroids"), objects whose orbits cross the orbit of the earth. Comets, of course, are even more deadly. He discusses Comet Swift-Tuttle--"the most dangerous object in the solar system"--a comet far larger than the one that many scientists believe killed off the dinosaurs, due to pass through earth's orbit in the year 2126. In addition, the author describes the efforts of Spacewatch and other groups to locate NEAs, and evaluates the idea that comet and asteroid impacts have been an underrated factor in the evolution of life on earth. Whether discussing monumental tsunamis or the innumerable comets in the solar system, Impact will enthrall anyone curious about outer space, remarkable natural phenomenon, or the future of the planet earth.

  5. Bot armies as threats to network security

    NASA Astrophysics Data System (ADS)

    Banks, Sheila B.; Stytz, Martin R.

    2007-04-01

    "Botnets", or "bot armies", are large groups of remotely controlled malicious software. Bot armies pose one of the most serious security threats to all networks. Botnets, remotely controlled and operated by botmasters or botherders, can launch massive denial of service attacks, multiple penetration attacks, or any other malicious network activity on a massive scale. While bot army activity has, in the past, been limited to fraud, blackmail, and other forms of criminal activity, their potential for causing large-scale damage to the entire internet; for launching large-scale, coordinated attacks on government computers and networks; and for large-scale, coordinated data gathering from thousands of users and computers on any network has been underestimated. This paper will not discuss how to build bots but the threats they pose. In a "botnet" or "bot army", computers can be used to spread spam, launch denial-of-service attacks against Web sites, conduct fraudulent activities, and prevent authorized network traffic from traversing the network. In this paper we discuss botnets and the technologies that underlie this threat to network and computer security. The first section motivates the need for improved protection against botnets, their technologies, and for further research about botnets. The second contains background information about bot armies and their key underlying technologies. The third section presents a discussion of the types of attacks that botnets can conduct and potential defenses against them. The fourth section contains a summary and suggestions for future research and development.

  6. Posterror speeding after threat-detection failure.

    PubMed

    Caudek, Corrado; Ceccarini, Francesco; Sica, Claudio

    2015-04-01

    Cognitive control enables individuals to rapidly adapt to changing task demands. To investigate error-driven adjustments in cognitive control, we considered performance changes in posterror trials, when participants performed a visual search task requiring detection of angry, happy, or neutral facial expressions in crowds of faces. We hypothesized that the failure to detect a potential threat (angry face) would prompt a different posterror adjustment than the failure to detect a nonthreatening target (happy or neutral face). Indeed, in 3 sets of experiments, we found evidence of posterror speeding, in the first case, and of posterror slowing, in the second case. Previous results indicate that a threatening stimulus can improve the efficiency of visual search. The results of the present study show that a similar effect can also be observed when participants fail to detect a threat. The impact of threat-detection failure on cognitive control, as revealed by the present study, suggests that posterror adjustments should be understood as the product of domain-specific mechanisms that are strongly influenced by affective information, rather than as the effect of a general-purpose error-monitoring system.

  7. Soil threats in Europe for the RECARE project

    NASA Astrophysics Data System (ADS)

    Stolte, Jannes; Tesfai, Mehretaeb; Oygarden, Lillian

    2015-04-01

    Soil is one of our most important natural resources that provides us with vital goods and services to sustain life. Nevertheless, soils functions are threatened by a wide range of processes and a number of soil threats have been identified in Europe. Although there is a large body of knowledge available on soil threats in Europe, the complexity and functioning of soil systems and their interaction with human activities, climate change, and ecosystem services (ESS), is still not fully understood. An extensive literature review was carried out by a group of experts on soil threats at the European level. In total, around 60 experts from the 17 case study sites of the RECARE project, were involved in the process of reviewing and drafting the report and 11 soil threats were identified. The objective of WP2 of the RECARE project was to provide an improved overview of existing information on soil threats and degradation at the European scale. These soil threats are soil erosion by water, soil erosion by wind, decline of organic matter (OM) in peat, decline of OM in minerals soils, soil compaction, soil sealing, soil contamination, soil salinization, desertification, flooding and landslides and decline in soil biodiversity. The final report of WP2 provides a comprehensive thematic information on the major soil threats of Europe with due attention given to the Driving force-Pressure-State-Impact-Response to soil threats. Interrelationships between soil threats, between soil threats and soil functions and between soil threats and Ecosystems Services are made, and will be presented. A synergy between the soil threats is made based on the given information in each of the chapters, where we tried to identify the interactions between the threats. We tried to identify in what way one threat acts as a threat for another threat. Also, the link between soil degradation and Ecosystem Services are identified. Again, based on the information given in each chapter, the major climate

  8. Space Station crew safety alternatives study. Volume 2: Threat development

    NASA Technical Reports Server (NTRS)

    Raasch, R. F.; Peercy, R. L., Jr.; Rockoff, L. A.

    1985-01-01

    The first 15 years of accumulated space station concepts for initial operational capability (IOC) during the early 1990's were considered. Twenty-five threats to the space station are identified and selected threats addressed as impacting safety criteria, escape and rescue, and human factors safety concerns. Of the 25 threats identified, eight are discussed including strategy options for threat control: fire, biological or toxic contamination, injury/illness, explosion, loss of pressurization, radiation, meteoroid penetration, and debris.

  9. Testosterone biases the amygdala toward social threat approach

    PubMed Central

    Radke, Sina; Volman, Inge; Mehta, Pranjal; van Son, Veerle; Enter, Dorien; Sanfey, Alan; Toni, Ivan; de Bruijn, Ellen R. A.; Roelofs, Karin

    2015-01-01

    Testosterone enhances amygdala reactions to social threat, but it remains unclear whether this neuroendocrine mechanism is relevant for understanding its dominance-enhancing properties; namely, whether testosterone biases the human amygdala toward threat approach. This pharmacological functional magnetic-resonance imaging study shows that testosterone administration increases amygdala responses in healthy women during threat approach and decreases it during threat avoidance. These findings support and extend motivational salience models by offering a neuroendocrine mechanism of motivation-specific amygdala tuning. PMID:26601187

  10. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    PubMed

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures.

  11. Culture, Threat, and Mental Illness Stigma: Identifying Culture-Specific Threat among Chinese-American Groups

    PubMed Central

    Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G.; Saw, Anne; Wong, Gloria; Phelan, Jo C.

    2014-01-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one’s family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002–2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. PMID:23702210

  12. Isolating Neural Components of Threat Bias in Pediatric Anxiety

    ERIC Educational Resources Information Center

    Britton, Jennifer C.; Bar-Haim, Yair; Carver, Frederick W.; Holroyd, Tom; Norcross, Maxine A.; Detloff, Allison; Leibenluft, Ellen; Ernst, Monique; Pine, Daniel S.

    2012-01-01

    Background: Attention biases toward threat are often detected in individuals with anxiety disorders. Threat biases can be measured experimentally through dot-probe paradigms, in which individuals detect a probe following a stimulus pair including a threat. On these tasks, individuals with anxiety tend to detect probes that occur in a location…

  13. Death Threat and Death Concerns in the College Student.

    ERIC Educational Resources Information Center

    Tobacyk, Jerome; Eckstein, Daniel

    1980-01-01

    Thanatology students reported significantly lesser death threat and significantly greater death concerns. Trait anxiety was found to be a significant predictor of change in death threat in the Thanatology Group, with lesser anxiety associated with greater decline in death threat. (Author)

  14. Gender, Stereotype Threat, and Anxiety: Psychophysiological and Cognitive Evidence

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2006-01-01

    Introduction: Claude Steele's stereotype threat hypothesis proposed that negative group stereotypes increase individual anxiety levels, hurting performance. However, the role of anxiety in stereotype threat has not been fully explored. This study examined the hypothesis that experimental manipulation of stereotype threat would influence real-time…

  15. Unleashing Latent Ability: Implications of Stereotype Threat for College Admissions

    ERIC Educational Resources Information Center

    Logel, Christine R.; Walton, Gregory M.; Spencer, Steven J.; Peach, Jennifer; Mark, Zanna P.

    2012-01-01

    Social-psychological research conducted over the past 15 years provides compelling evidence that pervasive psychological threats are present in common academic environments--especially threats that originate in negative intellectual stereotypes--and that these threats undermine the real-world academic performance of non-Asian ethnic minority…

  16. 41 CFR 60-741.22 - Direct threat defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60... functions of the position held or desired without posing a direct threat to the health or safety of...

  17. 41 CFR 60-300.22 - Direct threat defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... VETERANS Discrimination Prohibited § 60-300.22 Direct threat defense. The contractor may use as a... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60... position held or desired without posing a direct threat to the health or safety of the individual or...

  18. 41 CFR 60-250.22 - Direct threat defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... VETERANS Discrimination Prohibited § 60-250.22 Direct threat defense. The contractor may use as a... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60... position held or desired without posing a direct threat to the health or safety of the individual or...

  19. An Examination of Stereotype Threat Effects on Girls' Mathematics Performance

    ERIC Educational Resources Information Center

    Ganley, Colleen M.; Mingle, Leigh A.; Ryan, Allison M.; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-01-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In…

  20. Opportunities and Threats to Learning: Lessons from a Pedagogical Workshop for Faculty at a Higher Education Institution

    ERIC Educational Resources Information Center

    Ssentamu, Proscovia Namubiru

    2014-01-01

    Faculty quality is a key variable in the quality of teaching and learning. However, although learning is the basis for teaching, the circumstances under which faculty learn largely remain unexplained. This paper focuses on the opportunities and threats to learning by faculty at Uganda Management Institute (UMI). The paper is based on a study of…

  1. Negating Stereotype Threat: Autonomy Support and Academic Identification Boost Performance of African American College Students

    ERIC Educational Resources Information Center

    Nadler, Dustin R.; Komarraju, Meera

    2016-01-01

    Using a 2 × 2 factorial design, we examined the effects of stereotype threat and autonomy support on the test performance of 190 African American college students. Participants completed a set of 7 easy and 7 difficult problems from Raven's Progressive Matrices and a survey including measures of Academic Self-Concept, Learning Climate, and…

  2. Sticks, Stones, Words, and Broken Bones: New Field and Lab Evidence on Stereotype Threat

    ERIC Educational Resources Information Center

    Wei, Thomas E.

    2012-01-01

    Stereotype threat is frequently purported to be an important determinant of gender gaps in math. Unlike prior studies, which mostly occur in lab settings, I use data from the National Assessment of Educational Progress (NAEP)--a large, representative assessment of U.S. children--where through a design quirk, students are randomly assigned test…

  3. Radioactive Waste Management Basis

    SciTech Connect

    Perkins, B K

    2009-06-03

    The purpose of this Radioactive Waste Management Basis is to describe the systematic approach for planning, executing, and evaluating the management of radioactive waste at LLNL. The implementation of this document will ensure that waste management activities at LLNL are conducted in compliance with the requirements of DOE Order 435.1, Radioactive Waste Management, and the Implementation Guide for DOE Manual 435.1-1, Radioactive Waste Management Manual. Technical justification is provided where methods for meeting the requirements of DOE Order 435.1 deviate from the DOE Manual 435.1-1 and Implementation Guide.

  4. Overview of Threats and Failure Models for Safety-Relevant Computer-Based Systems

    NASA Technical Reports Server (NTRS)

    Torres-Pomales, Wilfredo

    2015-01-01

    This document presents a high-level overview of the threats to safety-relevant computer-based systems, including (1) a description of the introduction and activation of physical and logical faults; (2) the propagation of their effects; and (3) function-level and component-level error and failure mode models. These models can be used in the definition of fault hypotheses (i.e., assumptions) for threat-risk mitigation strategies. This document is a contribution to a guide currently under development that is intended to provide a general technical foundation for designers and evaluators of safety-relevant systems.

  5. Nonpoint sources as external threats to coastal water quality: lessons from Park Service experience

    USGS Publications Warehouse

    Burroughs, R.H.

    1993-01-01

    Program design for nonpoint source control was considered through an analogous problem, external threats to national parks. Nonpoint sources are diffuse land activities that degrade water quality, and recent federal legislation seeks to limit them in coastal areas. External threats occur outside a park boundary but affect the purposes for, or resources within, a park. They have been subject to federal management for many decades. Nonpoint sources are a class of external threat. Therefore, programs to limit them should consider techniques used in part protection. These park techniques include 'hard approaches', which rely on power, usually through legal devices, and 'soft approaches', which utilize shared values and objectives. A linked approach, as exemplified at the Cape Cod National Seashore, appears most promising. In a linked approach, if a soft approach fails, the manager of the protected unit is empowered to take an alternative hard action to protect the resource.

  6. Stereotype threat can reduce older adults' memory errors.

    PubMed

    Barber, Sarah J; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research, we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment. Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 and 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well.

  7. Examining the relationships between challenge and threat cognitive appraisals and coaching behaviours in football coaches.

    PubMed

    Dixon, Martin; Turner, Martin J; Gillman, Jamie

    2016-12-26

    Previous research demonstrates that sports coaching is a stressful activity. This article investigates coaches' challenge and threat cognitive appraisals of stressful situations and their impact on coaching behaviour, using Blascovich and Mendes' (2000) biopsychosocial model as a theoretical framework. A cross-sectional correlational design was utilised to examine the relationships between irrational beliefs (Shortened general attitude and belief scale), challenge and threat appraisals (Appraisal of life events scale), and coaching behaviours (Leadership scale for sports) of 105 professional football academy coaches. Findings reveal significant positive associations between challenge appraisals and social support, and between threat appraisals and autocratic behaviour, and a significant negative association between threat appraisals and positive feedback. Results also show that higher irrational beliefs are associated with greater threat, and lesser challenge cognitive appraisals. However, no associations were revealed between irrational beliefs and challenge cognitive appraisals. Additionally, findings demonstrate a positive relationship between age and training and instruction. Results suggest that practitioners should help coaches to appraise stressful situations as a challenge to promote positive coaching behaviours.

  8. Storm in a coffee cup: caffeine modifies brain activation to social signals of threat

    PubMed Central

    Lawrence, Andrew D.; Diukova, Ana; Wise, Richard G.; Rogers, Peter J.

    2012-01-01

    Caffeine, an adenosine A1 and A2A receptor antagonist, is the most popular psychostimulant drug in the world, but it is also anxiogenic. The neural correlates of caffeine-induced anxiety are currently unknown. This study investigated the effects of caffeine on brain regions implicated in social threat processing and anxiety. Participants were 14 healthy male non/infrequent caffeine consumers. In a double-blind placebo-controlled crossover design, they underwent blood oxygenation level-dependent functional magnetic resonance imaging (fMRI) while performing an emotional face processing task 1 h after receiving caffeine (250 mg) or placebo in two fMRI sessions (counterbalanced, 1-week washout). They rated anxiety and mental alertness, and their blood pressure was measured, before and 2 h after treatment. Results showed that caffeine induced threat-related (angry/fearful faces > happy faces) midbrain-periaqueductal gray activation and abolished threat-related medial prefrontal cortex wall activation. Effects of caffeine on extent of threat-related amygdala activation correlated negatively with level of dietary caffeine intake. In concurrence with these changes in threat-related brain activation, caffeine increased self-rated anxiety and diastolic blood pressure. Caffeine did not affect primary visual cortex activation. These results are the first to demonstrate potential neural correlates of the anxiogenic effect of caffeine, and they implicate the amygdala as a key site for caffeine tolerance. PMID:21972425

  9. Protection without detection: a threat mitigation technique

    NASA Astrophysics Data System (ADS)

    White, Joshua; McCoy, Joseph R.; Ratazzi, Paul

    2012-05-01

    Networking systems and individual applications have traditionally been defended using signature-based tools that protect the perimeter, many times to the detriment of service, performance, and information flow. These tools require knowledge of both the system on which they run and the attack they are preventing. As such, by their very definition, they only account for what is known to be malicious and ignore the unknown. The unknown, or zero day threat, can occur when defenses have yet to be immunized via a signature or other identifier of the threat. In environments where execution of the mission is paramount, the networks and applications must perform their function of information delivery without endangering the enterprise or losing the salient information, even when facing zero day threats. In this paper we, describe a new defensive strategy that provides a means to more deliberately balance the oft mutually exclusive aspects of protection and availability. We call this new strategy Protection without Detection, since it focuses on network protection without sacrificing information availability. The current instantiation analyzes the data stream in real time as it passes through an in-line device. Critical files are recognized, and mission-specific trusted templates are applied as they are forwarded to their destination. The end result is a system which eliminates the opportunity for propagation of malicious or unnecessary payloads via the various containers that are inherent in the definition of standard file types. In some cases, this method sacrifices features or functionality that is typically inherent in these files. However, with the flexibility of the template approach, inclusion or exclusion of these features becomes a deliberate choice of the mission owners, based on their needs and amount of acceptable risk. The paper concludes with a discussion of future extensions and applications.

  10. The threat of nuclear war: Some responses

    PubMed Central

    Marcattilio, A. J. M.; Nevin, John A.

    1986-01-01

    The possibility of nuclear holocaust threatens the very existence of the world community. Biologists, earth scientists, educators, lawyers, philosophers, physicists, physicians, and social scientists have addressed the problem from their special perspectives, and have had substantial impact on the public. Behavior analysts, however, have not as a whole contributed a great deal to the goal of preventing nuclear catastrophe. We argue that the threat of nuclear war is primarily a behavioral problem, and present an analysis of that problem. In addition, we address the difficulty of implementing behavioral interventions that would contribute to the survival of the World. PMID:22478648

  11. Harbor Threat Detection, Classification, and Identification

    DTIC Science & Technology

    2007-09-30

    ed ta rg et Partcile Filter based Tracking of the Closed Circuit Run #2 38 43 48 53 58 63 68 73 78 83 88 380 400 420 440 460 Ping Indices R an ge o...The priority ranking of threats to be studied is (1) diver with commercial rebreathers , (2) diver with diver assisted propulsors, and (3) small...successfully extended the laboratory database to include additional rebreather types and conditions, adding to the database originating in FY06. The FY06/07

  12. Cutaneous leishmaniasis: an increasing threat for travellers.

    PubMed

    Antinori, S; Gianelli, E; Calattini, S; Longhi, E; Gramiccia, M; Corbellino, M

    2005-05-01

    Analysis of the literature on cutaneous leishmaniasis in low-prevalence countries suggests an increase in imported cases that is attributable to the growing phenomenon of international tourism, migration and military operations in highly endemic regions. Cases of imported cutaneous leishmaniasis are often missed initially, but diagnosis can be made non-invasively by PCR using skin scrapings of lesions as starting material. Cutaneous leishmaniasis is an emerging threat for travellers and should be considered in all patients presenting with slow-to-heal ulcers.

  13. Threats and opportunities of plant pathogenic bacteria.

    PubMed

    Tarkowski, Petr; Vereecke, Danny

    2014-01-01

    Plant pathogenic bacteria can have devastating effects on plant productivity and yield. Nevertheless, because these often soil-dwelling bacteria have evolved to interact with eukaryotes, they generally exhibit a strong adaptivity, a versatile metabolism, and ingenious mechanisms tailored to modify the development of their hosts. Consequently, besides being a threat for agricultural practices, phytopathogens may also represent opportunities for plant production or be useful for specific biotechnological applications. Here, we illustrate this idea by reviewing the pathogenic strategies and the (potential) uses of five very different (hemi)biotrophic plant pathogenic bacteria: Agrobacterium tumefaciens, A. rhizogenes, Rhodococcus fascians, scab-inducing Streptomyces spp., and Pseudomonas syringae.

  14. Lyssaviruses and Bats: Emergence and Zoonotic Threat

    PubMed Central

    Banyard, Ashley C.; Evans, Jennifer S.; Luo, Ting Rong; Fooks, Anthony R.

    2014-01-01

    The continued detection of zoonotic viral infections in bats has led to the microbial fauna of these mammals being studied at a greater level than ever before. Whilst numerous pathogens have been discovered in bat species, infection with lyssaviruses is of particular significance from a zoonotic perspective as, where human infection has been reported, it is invariably fatal. Here we review the detection of lyssaviruses within different bat species and overview what is understood regarding their maintenance and transmission following both experimental and natural infection. We discuss the relevance of these pathogens as zoonotic agents and the threat of newly discovered viruses to human populations. PMID:25093425

  15. Threat Posed by Mounting Vigilantism in Mexico

    DTIC Science & Technology

    2011-09-01

    Perro’s body was found in the trunk of a vehicle occu- pied by Ismael Quintero Oliver, 32, and Marcos Érik Pérez Mora, 21, who belonged to a”Drivers...POSED BY MOUNTING VIGILANTISM IN MEXICO George W. Grayson U.S. ARMY WAR COLLEGE ,....~ .... :!iO.L STRATEGIC STUDIES INSTITUTE Report...TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE Threat Posed by Mounting Vigilantism in Mexico 5a. CONTRACT NUMBER 5b

  16. Status and threats analysis for the Florida manatee (Trichechus manatus latirostris), 2012

    USGS Publications Warehouse

    Runge, Michael C.; Langtimm, Catherine A.; Martin, Julien; Fonnesbeck, Christopher J.

    2015-01-01

    The endangered West Indian manatee (Trichechus manatus), especially the Florida subspecies (T. m. latirostris), has been the focus of conservation efforts and extensive research since its listing under the Endangered Species Act. On the basis of the best information available as of December 2012, the threats facing the Florida manatee were determined to be less severe than previously thought, either because the conservation efforts have been successful, or because our knowledge of the demographic effects of those threats is increased, or both. Using the manatee Core Biological Model, we estimated the probability of the Florida manatee population on either the Atlantic or Gulf coast falling below 500 adults in the next 150 years to be 0.92 percent. The primary threats remain watercraft-related mortality and long-term loss of warm-water habitat. Since 2009, however, there have been a number of unusual events that have not yet been incorporated into this analysis, including several severely cold winters, a severe red-tide die off, and substantial loss of seagrass habitat in Brevard County, Fla. Further, the version of the Core Biological Model used in 2012 makes a number of assumptions that are under investigation. A revision of the Core Biological Model and an update of this quantitative threats analysis are underway as of 2015.

  17. Conservation priorities for Ethiopian sheep breeds combining threat status, breed merits and contributions to genetic diversity

    PubMed Central

    Gizaw, Solomon; Komen, Hans; Windig, Jack J; Hanotte, Olivier; van Arendonk, Johan AM

    2008-01-01

    Prioritizing livestock breeds for conservation needs to incorporate both genetic and non-genetic aspects important for the survival of the breeds. Here, we apply a maximum-utility-strategy to prioritize 14 traditional Ethiopian sheep breeds based on their threat status, contributions to farmer livelihoods (current breed merits) and contributions to genetic diversity. Contributions of the breeds to genetic diversity were quantified using Eding's marker-estimated kinship approaches. Non-genetic aspects included threats (e.g. low population size, low preferences by farmers) and current merits (economic, ecological and cultural merits). Threat analysis identified eight of the 14 breeds as threatened. Analysis of current merits showed that sub-alpine and arid-lowland breeds contribute most to farmer livelihoods in comparison to other breeds. The highest contribution to the genetic diversity conserved was from the Simien breed. Simien showed high between-breed (low between-breed kinship = 0.04) as well as high within-breed diversity (low within-breed kinship = 0.09 and high HE = 0.73 and allelic richness = 6.83). We combined the results on threat status, current breed merits and contributions to genetic diversity to produce a ranking of the 14 breeds for conservation purposes. Our results balance the trade-offs between conserving breeds as insurance against future uncertainties and current sustainable utilization. The ranking of breeds provides a basis for conservation strategies for Ethiopian sheep and contributes to a regional or global conservation plan. PMID:18558075

  18. Taking the sting out of the nuclear threat

    SciTech Connect

    Ravenal, E.C.

    1983-10-01

    A policy of incentives to discourage the first use of nuclear weapons can help to reduce the threat of nuclear war, but the author takes issue with the logic of those who propose requiring a conventional buildup in Europe as a condition for a no-first-use policy because it would be costly and could still lead to an escalation to nuclear war. Inherent questions about deterrence and alliance reflect the cost of pursuing invulnerability and maintaining crisis stability. Since unnecessary and tempting targets encourage first use, the author feels that the US should design a foreign policy of war avoidance and self-reliance that accommodates both short-run utilitarian action and long-term ethical principles, both of which are necessary to relieve tensions. (DCK)

  19. Modifying threat-related interpretive bias in adolescents.

    PubMed

    Salemink, Elske; Wiers, Reinout W

    2011-10-01

    Socially anxious feelings sharply increase during adolescence and such feelings have been associated with interpretive biases. Studies in adults have shown that interpretive biases can be modified using Cognitive Bias Modification procedures (CBM-I) and subsequent effects on anxiety have been observed. The current study was designed to examine whether the CBM-I procedure has similar effects in adolescents. Unselected adolescents were randomly allocated to either a positive interpretation training (n = 88) or a placebo-control condition (n = 82). Results revealed that the training was successful in modifying interpretations and effects generalized to a new task. The interpretive bias effects were most pronounced in individuals with a threat-related interpretive bias at pre-test. No effects on state anxiety were observed. The current findings are promising with regard to applying bias modification procedures to adolescents, while further research is warranted regarding emotional effects.

  20. A triclade DNA vaccine designed on the basis of a comprehensive serologic study elicits neutralizing antibody responses against all clades and subclades of highly pathogenic avian influenza H5N1 viruses.

    PubMed

    Zhou, Fan; Wang, Guiqin; Buchy, Philippe; Cai, Zhipeng; Chen, Honglin; Chen, Zhiwei; Cheng, Genhong; Wan, Xiu-Feng; Deubel, Vincent; Zhou, Paul

    2012-06-01

    Because of their rapid evolution, genetic diversity, broad host range, ongoing circulation in birds, and potential human-to-human transmission, H5N1 influenza viruses remain a major global health concern. Their high degree of genetic diversity also poses enormous burdens and uncertainties in developing effective vaccines. To overcome this, we took a new approach, i.e., the development of immunogens based on a comprehensive serologic study. We constructed DNA plasmids encoding codon-optimized hemagglutinin (HA) from 17 representative strains covering all reported clades and subclades of highly pathogenic avian influenza H5N1 viruses. Using DNA plasmids, we generated the corresponding H5N1 pseudotypes and immune sera. We performed an across-the-board pseudotype-based neutralization assay and determined antigenic clusters by cartography. We then designed a triclade DNA vaccine and evaluated its immunogenicity and protection in mice. We report here that (sub)clades 0, 1, 3, 4, 5, 6, 7.1, and 9 were grouped into antigenic cluster 1, (sub)clades 2.1.3.2, 2.3.4, 2.4, 2.5, and 8 were grouped into another antigenic cluster, with subclade 2.2.1 loosely connected to it, and each of subclades 2.3.2.1 and 7.2 was by itself. Importantly, the triclade DNA vaccine encoding HAs of (sub)clades 0, 2.3.2.1, and 7.2 elicited broadly neutralizing antibody responses against all H5 clades and subclades and protected mice against high-lethal-dose heterologous H5N1 challenge. Thus, we conclude that broadly neutralizing antibodies against all H5 clades and subclades can indeed be elicited with immunogens on the basis of a comprehensive serologic study. Further evaluation and optimization of such an approach in ferrets and in humans is warranted.

  1. A Triclade DNA Vaccine Designed on the Basis of a Comprehensive Serologic Study Elicits Neutralizing Antibody Responses against All Clades and Subclades of Highly Pathogenic Avian Influenza H5N1 Viruses

    PubMed Central

    Zhou, Fan; Wang, Guiqin; Buchy, Philippe; Cai, Zhipeng; Chen, Honglin; Chen, Zhiwei; Cheng, Genhong; Wan, Xiu-Feng; Deubel, Vincent

    2012-01-01

    Because of their rapid evolution, genetic diversity, broad host range, ongoing circulation in birds, and potential human-to-human transmission, H5N1 influenza viruses remain a major global health concern. Their high degree of genetic diversity also poses enormous burdens and uncertainties in developing effective vaccines. To overcome this, we took a new approach, i.e., the development of immunogens based on a comprehensive serologic study. We constructed DNA plasmids encoding codon-optimized hemagglutinin (HA) from 17 representative strains covering all reported clades and subclades of highly pathogenic avian influenza H5N1 viruses. Using DNA plasmids, we generated the corresponding H5N1 pseudotypes and immune sera. We performed an across-the-board pseudotype-based neutralization assay and determined antigenic clusters by cartography. We then designed a triclade DNA vaccine and evaluated its immunogenicity and protection in mice. We report here that (sub)clades 0, 1, 3, 4, 5, 6, 7.1, and 9 were grouped into antigenic cluster 1, (sub)clades 2.1.3.2, 2.3.4, 2.4, 2.5, and 8 were grouped into another antigenic cluster, with subclade 2.2.1 loosely connected to it, and each of subclades 2.3.2.1 and 7.2 was by itself. Importantly, the triclade DNA vaccine encoding HAs of (sub)clades 0, 2.3.2.1, and 7.2 elicited broadly neutralizing antibody responses against all H5 clades and subclades and protected mice against high-lethal-dose heterologous H5N1 challenge. Thus, we conclude that broadly neutralizing antibodies against all H5 clades and subclades can indeed be elicited with immunogens on the basis of a comprehensive serologic study. Further evaluation and optimization of such an approach in ferrets and in humans is warranted. PMID:22496212

  2. True Experimental Design.

    ERIC Educational Resources Information Center

    Huck, Schuyler W.

    1991-01-01

    This poem, with stanzas in limerick form, refers humorously to the many threats to validity posed by problems in research design, including problems of sample selection, data collection, and data analysis. (SLD)

  3. Deterring regional threats from nuclear proliferation

    SciTech Connect

    Spector, L.S.

    1992-03-12

    The most prominent shift in the National Military Strategy is from the global Soviet threat to a new focus on regional contingencies. No threat looms larger in these contingencies than the proliferation of nuclear weapons and ballistic missiles. This study examines proliferation trends and proposes a predominately diplomatic strategy for containing the problem. Dr. Spector identifies three waves of proliferation: the first is the five states with declared weapons and doctrine-the United States, Russia, Great Britain, France, and China; the second includes a less visible group that developed a covert capability, without testing weapons or declaring a doctrine of deterrence-for example, Israel, India, and probably Pakistan; and, a third wave of would-be proliferators includes radical states like Iraq, Iran, Libya, and North Korea. Spector's political approach is based on the common interest of wave one and two states to prevent further proliferation. Political-economic incentives have already worked in the cases of Brazil, Argentina, Taiwan, and South Africa-states which appear to have abandoned their nuclear weapons programs. Spector does not rule out the option of military force. Force, especially under international sanctions, can be a powerful tool to back diplomatic efforts. Use of force, however, remains a last resort.

  4. In Brief: Threats to species continue

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2009-11-01

    Of 47,677 assessed species, 17,291 are threatened with extinction, according to the latest update of the Red List of Threatened Species issued by the International Union for Conservation of Nature (IUCN) on 3 November. The list indicates that amphibians are the most threatened group of species known to date, with 1895 (nearly 30%) of 6285 amphibians in danger of extinction. Thirty-nine are already extinct or extinct in the wild, 484 are critically endangered, 754 are endangered, and 657 are vulnerable, according to IUCN. Under threat are 21% of mammals, 30% of amphibians, 12% of birds, 28% of reptiles, 37% of freshwater fishes, 70% of plants, and 35% of invertebrates assessed to date. “We have only managed to assess 47,663 species so far; there are many more millions out there which could be under serious threat,” according to IUCN Red List Unit Manager Craig Hilton-Taylor. For more information, visit http://www.iucnredlist.org.

  5. Passive acoustic threat detection in estuarine environments

    NASA Astrophysics Data System (ADS)

    Borowski, Brian; Sutin, Alexander; Roh, Heui-Seol; Bunin, Barry

    2008-04-01

    The Maritime Security Laboratory (MSL) at Stevens Institute of Technology supports research in a range of areas relevant to harbor security, including passive acoustic detection of underwater threats. The difficulties in using passive detection in an urban estuarine environment include intensive and highly irregular ambient noise and the complexity of sound propagation in shallow water. MSL conducted a set of tests in the Hudson River near Manhattan in order to measure the main parameters defining the detection distance of a threat: source level of a scuba diver, transmission loss of acoustic signals, and ambient noise. The source level of the diver was measured by comparing the diver's sound with a reference signal from a calibrated emitter placed on his path. Transmission loss was measured by comparing noise levels of passing ships at various points along their routes, where their distance from the hydrophone was calculated with the help of cameras and custom software. The ambient noise in the Hudson River was recorded under varying environmental conditions and amounts of water traffic. The passive sonar equation was then applied to estimate the range of detection. Estimations were done for a subset of the recorded noise levels, and we demonstrated how variations in the noise level, attenuation, and the diver's source level influence the effective range of detection. Finally, we provided analytic estimates of how an array improves upon the detection distance calculated by a single hydrophone.

  6. Mitigating Inadvertent Insider Threats with Incentives

    NASA Astrophysics Data System (ADS)

    Liu, Debin; Wang, Xiaofeng; Camp, L. Jean

    Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a malicious outsider to use the privileges of the inattentive insider to implement an insider attack. This risk is as old as conversion of a weak user password into root access, but the term inadvertent insider is recently coined to identify the link between the behavior and the vulnerability. In this paper, we propose to mitigate this threat using a novel risk budget mechanism that offers incentives to an insider to behave according to the risk posture set by the organization. We propose assigning an insider a risk budget, which is a specific allocation of risk points, allowing employees to take a finite number of risk-seeking choice. In this way, the employee can complete her tasks without subverting the security system, as with absolute prohibitions. In the end, the organization penalizes the insider if she fails to accomplish her task within the budget while rewards her in the presence of a surplus. Most importantly. the risk budget requires that the user make conscious visible choices to take electronic risks. We describe the theory behind the system, including specific work on the insider threats. We evaluated this approach using human-subject experiments, which demonstrate the effectiveness of our risk budget mechanism. We also present a game theoretic analysis of the mechanism.

  7. Prefrontal control of attention to threat.

    PubMed

    Peers, Polly V; Simons, Jon S; Lawrence, Andrew D

    2013-01-01

    Attentional control refers to the regulatory processes that ensure that our actions are in accordance with our goals. Dual-system accounts view temperament as consisting of both individual variation in emotionality (e.g., trait anxiety) and variation in regulatory attentional mechanisms that act to modulate emotionality. Increasing evidence links trait variation in attentional control to clinical mood and anxiety disorder symptoms, independent of trait emotionality. Attentional biases to threat have been robustly linked to mood and anxiety disorders. However, the role of variation in attentional control in influencing such biases, and the neural underpinnings of trait variation in attentional control, are unknown. Here, we show that individual differences in trait attentional control, even when accounting for trait and state anxiety, are related to the magnitude of an attentional blink (AB) following threat-related targets. Moreover, we demonstrate that activity in dorso-lateral prefrontal cortex (DLPFC), is observed specifically in relation to control of attention over threatening stimuli, in line with neural theories of attentional control, such as guided activation theory. These results have key implications for neurocognitive theories of attentional bias and emotional resilience.

  8. When threat to society becomes a threat to oneself: implications for right-wing attitudes and ethnic prejudice.

    PubMed

    Onraet, Emma; Van Hiel, Alain

    2013-01-01

    The relationships between threat on one hand and right-wing attitudes and ethnic prejudice on the other were investigated in a heterogeneous sample (N = 588). Specifically, we considered the perception of economic and terroristic threats in terms of their consequences at the societal and personal levels. Previous studies revealed that societal consequences of threat, rather than personal consequences, are related to right-wing attitudes. However, the present results challenge these findings. More specifically, three important results emerged. First, items probing the distinct threat levels loaded on separate dimensions for economic and terroristic threat, validating the distinction between societal and personal threat consequences. Second, consistent with previous research, this study revealed that perceived societal consequences of threat yield strong and robust relationships with all target variables. However, personal consequences of threat were also associated with higher levels of right-wing authoritarianism (RWA), social dominance orientation (SDO), and ethnic prejudice in particular. Third, societal and personal consequences of threat interacted in explaining the target variables. More specifically, feeling personally threatened by terrorism was only related to higher levels of RWA in the presence of low levels of threat to society, whereas experiencing personal economic threat was only related to higher levels of SDO and ethnic prejudice when high societal economic threat was experienced. In sum, although the perception of societal consequences of threat plays a prominent role in explaining right-wing attitudes and ethnic prejudice, the perception of being personally affected by threat is also associated with higher levels of RWA and SDO, and especially ethnic prejudice.

  9. Feeling the Threat: Stereotype Threat as a Contextual Barrier to Women's Science Career Choice Intentions

    ERIC Educational Resources Information Center

    Deemer, Eric D.; Thoman, Dustin B.; Chase, Justin P.; Smith, Jessi L.

    2014-01-01

    Social cognitive career theory (SCCT; Lent, Brown, & Hackett, 1994, 2000) holds that contextual barriers inhibit self-efficacy and goal choice intentions from points both near and far from the active career development situation. The current study examined the influence of one such proximal barrier, stereotype threat, on attainment of these…

  10. A Lesson Not to Be Learned? Understanding Stereotype Threat Does Not Protect Women from Stereotype Threat

    ERIC Educational Resources Information Center

    Tomasetto, Carlo; Appoloni, Sara

    2013-01-01

    This research examines whether reading a text presenting scientific evidence concerning the phenomenon of stereotype threat improves or disrupts women's performance in a subsequent math task. In two experimental conditions participants (N=118 ) read a text summarizing an experiment in which stereotypes, and not biological differences, were shown…

  11. Identifying key conservation threats to Alpine birds through expert knowledge.

    PubMed

    Chamberlain, Dan E; Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community.

  12. Stress on the dance floor: the cortisol stress response to social-evaluative threat in competitive ballroom dancers.

    PubMed

    Rohleder, Nicolas; Beulen, Silke E; Chen, Edith; Wolf, Jutta M; Kirschbaum, Clemens

    2007-01-01

    The social self-preservation theory states that humans have a fundamental motivation to preserve the social self and that threats to the social self perturb biological markers such as cortisol. Five studies were designed to examine the cortisol response to competitive ballroom dancing as a paradigm for real-life social-evaluative threat. Competitive dancing produced substantial increases in cortisol compared to a control day. These increases were not due to the physical strain of dancing and were greater than those found during social-evaluative laboratory stressors. Responses did not habituate across competitions and were mostly elevated under highly focused conditions of threat (couple vs. group competition). These findings support the notion of a social self-preservation system that is physiologically responsive to threats to the social self.

  13. Towards a Threat Assessment Framework for Ecosystem Services.

    PubMed

    Maron, Martine; Mitchell, Matthew G E; Runting, Rebecca K; Rhodes, Jonathan R; Mace, Georgina M; Keith, David A; Watson, James E M

    2017-04-01

    How can we tell if the ecosystem services upon which we rely are at risk of being lost, potentially permanently? Ecosystem services underpin human well-being, but we lack a consistent approach for categorizing the extent to which they are threatened. We present an assessment framework for assessing the degree to which the adequate and sustainable provision of a given ecosystem service is threatened. Our framework combines information on the states and trends of both ecosystem service supply and demand, with reference to two critical thresholds: demand exceeding supply and ecosystem service 'extinction'. This framework can provide a basis for global, national, and regional assessments of threat to ecosystem services, and accompany existing assessments of threat to species and ecosystems.

  14. A meta-analysis of threats to valid clinical inference in preclinical research of sunitinib.

    PubMed

    Henderson, Valerie C; Demko, Nadine; Hakala, Amanda; MacKinnon, Nathalie; Federico, Carole A; Fergusson, Dean; Kimmelman, Jonathan

    2015-10-13

    Poor study methodology leads to biased measurement of treatment effects in preclinical research. We used available sunitinib preclinical studies to evaluate relationships between study design and experimental tumor volume effect sizes. We identified published animal efficacy experiments where sunitinib monotherapy was tested for effects on tumor volume. Effect sizes were extracted alongside experimental design elements addressing threats to valid clinical inference. Reported use of practices to address internal validity threats was limited, with no experiments using blinded outcome assessment. Most malignancies were tested in one model only, raising concerns about external validity. We calculate a 45% overestimate of effect size across all malignancies due to potential publication bias. Pooled effect sizes for specific malignancies did not show apparent relationships with effect sizes in clinical trials, and we were unable to detect dose-response relationships. Design and reporting standards represent an opportunity for improving clinical inference.

  15. When threats foreign turn domestic: Two ways for distant realistic intergroup threats to carry over into local intolerance.

    PubMed

    Bouman, Thijs; van Zomeren, Martijn; Otten, Sabine

    2015-09-01

    In times of economic downturn, perceived realistic intergroup threats (e.g., labour competition) often dominate political and media discourse. Although local outgroups (e.g., local immigrants) can be experienced as sources of realistic threats, we propose that such threats can also be perceived to be caused by distant outgroups (e.g., European Union members perceiving Greece to threaten their economies) and that such distant threats can carry over into local intolerance (e.g., increasing intolerance towards local immigrant groups). We predicted and found in two studies that perceived distant realistic threats carried over into local intolerance via two different pathways. First, direct reactions towards the distant outgroup can generalize to culturally similar local outgroups (the group-based association pathway). Secondly, Study 2 indicated that when the distant threat was attributed to stereotypical outgroup traits (e.g., being lazy), distant realistic threats activated local realistic threats, which subsequently influenced local intolerance (the threat-based association pathway). Taken together, our studies indicate that perceived realistic threats foreign can turn domestic, but in two different ways.

  16. An Overview of Non-traditional Nuclear Threats

    SciTech Connect

    Geelhood, Bruce D.; Wogman, Ned A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or ''dirty'' bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials entering our borders is considered. The radiation and other signatures or potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.

  17. An Overview of Non-Traditional Nuclear Threats

    SciTech Connect

    Geelhood, Bruce D.; Wogman, Ned A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear war-heads to include radiation dispersal devices (RDD) or “dirty” bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials enter-ing our borders is considered. The radiation and other signatures of potential nuclear and radio-logical threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.

  18. When anticipation beats accuracy: Threat alters memory for dynamic scenes.

    PubMed

    Greenstein, Michael; Franklin, Nancy; Martins, Mariana; Sewack, Christine; Meier, Markus A

    2016-05-01

    Threat frequently leads to the prioritization of survival-relevant processes. Much of the work examining threat-related processing advantages has focused on the detection of static threats or long-term memory for details. In the present study, we examined immediate memory for dynamic threatening situations. We presented participants with visually neutral, dynamic stimuli using a representational momentum (RM) paradigm, and manipulated threat conceptually. Although the participants in both the threatening and nonthreatening conditions produced classic RM effects, RM was stronger for scenarios involving threat (Exps. 1 and 2). Experiments 2 and 3 showed that this effect does not generalize to the nonthreatening objects within a threatening scene, and that it does not extend to arousing happy situations. Although the increased RM effect for threatening objects by definition reflects reduced accuracy, we argue that this reduced accuracy may be offset by a superior ability to predict, and thereby evade, a moving threat.

  19. Impaired Retrieval Inhibition of Threat Material in Generalized Anxiety Disorder.

    PubMed

    Kircanski, Katharina; Johnson, Douglas C; Mateen, Maria; Bjork, Robert A; Gotlib, Ian H

    2016-03-01

    Generalized Anxiety Disorder (GAD) is characterized by cognitive biases toward threat-relevant information, but the underlying mechanisms are unclear. We translated a retrieval-practice paradigm from cognitive science to investigate impaired inhibition of threat information as one such mechanism. Participants diagnosed with GAD and never-disordered control participants learned a series of cue-target pairs; whereas some cues were associated only with neutral targets, others were associated with both neutral and threat targets. Next, participants practiced retrieving neutral targets, which typically suppresses the subsequent recall of unpracticed associated targets (retrieval-induced forgetting; RIF). Finally, participants were tested on their recall of all targets. Despite showing intact RIF of neutral targets, the GAD group failed to exhibit RIF of threat targets. Furthermore, within the GAD group, less RIF of threat targets correlated with greater pervasiveness of worry. Deficits in inhibitory control over threat-relevant information may underlie the cognitive pathology of GAD, which has important treatment implications.

  20. Pollution, habitat loss, fishing, and climate change as critical threats to penguins.

    PubMed

    Trathan, Phil N; García-Borboroglu, Pablo; Boersma, Dee; Bost, Charles-André; Crawford, Robert J M; Crossin, Glenn T; Cuthbert, Richard J; Dann, Peter; Davis, Lloyd Spencer; De La Puente, Santiago; Ellenberg, Ursula; Lynch, Heather J; Mattern, Thomas; Pütz, Klemens; Seddon, Philip J; Trivelpiece, Wayne; Wienecke, Barbara

    2015-02-01

    Cumulative human impacts across the world's oceans are considerable. We therefore examined a single model taxonomic group, the penguins (Spheniscidae), to explore how marine species and communities might be at risk of decline or extinction in the southern hemisphere. We sought to determine the most important threats to penguins and to suggest means to mitigate these threats. Our review has relevance to other taxonomic groups in the southern hemisphere and in northern latitudes, where human impacts are greater. Our review was based on an expert assessment and literature review of all 18 penguin species; 49 scientists contributed to the process. For each penguin species, we considered their range and distribution, population trends, and main anthropogenic threats over the past approximately 250 years. These threats were harvesting adults for oil, skin, and feathers and as bait for crab and rock lobster fisheries; harvesting of eggs; terrestrial habitat degradation; marine pollution; fisheries bycatch and resource competition; environmental variability and climate change; and toxic algal poisoning and disease. Habitat loss, pollution, and fishing, all factors humans can readily mitigate, remain the primary threats for penguin species. Their future resilience to further climate change impacts will almost certainly depend on addressing current threats to existing habitat degradation on land and at sea. We suggest protection of breeding habitat, linked to the designation of appropriately scaled marine reserves, including in the High Seas, will be critical for the future conservation of penguins. However, large-scale conservation zones are not always practical or politically feasible and other ecosystem-based management methods that include spatial zoning, bycatch mitigation, and robust harvest control must be developed to maintain marine biodiversity and ensure that ecosystem functioning is maintained across a variety of scales.