Science.gov

Sample records for design basis threat

  1. The neural basis of intergroup threat effect on social attention

    PubMed Central

    Chen, Yujie; Zhao, Yufang; Song, Hongwen; Guan, Lili; Wu, Xin

    2017-01-01

    Previous gaze-cuing studies found that intergroup threat is one of the modulators of gaze cuing. These findings indicate that intergroup threat would gate social attention by activating a network resembling that is thought to be involved in drawing or/and holding attention. The present study tested this hypothesis using a gaze-cuing task in which a particular in-group participants observed threatening out-group and nonthreatening out-group gazes, while undergoing functional magnetic resonance imaging. As expected, greater gaze cuing effect only emerged for threatening out-group when the in-group participants only felt inergroup threat from that out-group. Behaviorally, we found intergroup threatening out-group gazes did not draw attention faster than nonthreatening in-group gazes does. However, participants took more time to suppress the influence of the gaze direction of threatening out-group gazes, compared to nonthreatening in-group gazes, in the incongruent condition, which means intergroup threatening gaze holds attention longer than nonthreatening gaze does. Imaging results demonstrated that threatening cues recruited a fronto-parietal network, previously implicated in holding attention and execution functions. Our results, therefore, suggest that the mechanisms underpinning gaze cuing evolved to be sensitive to intergroup threatening stimuli, possibly because it is hard to disengage from such intergroup threatening cues once they are detected. PMID:28120864

  2. The neural basis of improved cognitive performance by threat of shock

    PubMed Central

    Robinson, Oliver; O’Connell, Katherine; Davis, Andrew; Balderston, Nicholas; Ernst, Monique; Grillon, Christian

    2016-01-01

    Anxiety can have both detrimental and facilitatory cognitive effects. This study investigates the neural substrates of a replicated facilitatory effect of anxiety on sustained attention and response inhibition. This effect consisted of improved performance on the Sustained Attention to Response Task (a Go–NoGo task consisting of 91% Go and 9% NoGo trials) in threat (unpredictable electrical shock) vs safe (no shock) conditions. This study uses the same experimental design with fMRI and relies on an event-related analysis of BOLD signal changes. Findings reveal that threat-related cognitive facilitation (improved NoGo accuracy) is associated with greater activation of a right-lateralized frontoparietal group of regions previously implicated in sustained attention and response inhibition. Moreover, these same regions show decreased activation in the Go trials preceding NoGo errors. During NoGo trials, striatal activity is also greater in the threat vs safe condition, consistent with the notion of enhanced inhibitory processing under threat. These findings identify potential mechanisms by which threat of unpredictable shock can facilitate distinct cognitive functions. A greater understanding of the complex interaction of the anxious state and cognitive processes may have critical clinical implications. PMID:27369069

  3. Experimental Design and Some Threats to Experimental Validity: A Primer

    ERIC Educational Resources Information Center

    Skidmore, Susan

    2008-01-01

    Experimental designs are distinguished as the best method to respond to questions involving causality. The purpose of the present paper is to explicate the logic of experimental design and why it is so vital to questions that demand causal conclusions. In addition, types of internal and external validity threats are discussed. To emphasize the…

  4. PRELIMINARY SELECTION OF MGR DESIGN BASIS EVENTS

    SciTech Connect

    J.A. Kappes

    1999-09-16

    The purpose of this analysis is to identify the preliminary design basis events (DBEs) for consideration in the design of the Monitored Geologic Repository (MGR). For external events and natural phenomena (e.g., earthquake), the objective is to identify those initiating events that the MGR will be designed to withstand. Design criteria will ensure that radiological release scenarios resulting from these initiating events are beyond design basis (i.e., have a scenario frequency less than once per million years). For internal (i.e., human-induced and random equipment failures) events, the objective is to identify credible event sequences that result in bounding radiological releases. These sequences will be used to establish the design basis criteria for MGR structures, systems, and components (SSCs) design basis criteria in order to prevent or mitigate radiological releases. The safety strategy presented in this analysis for preventing or mitigating DBEs is based on the preclosure safety strategy outlined in ''Strategy to Mitigate Preclosure Offsite Exposure'' (CRWMS M&O 1998f). DBE analysis is necessary to provide feedback and requirements to the design process, and also to demonstrate compliance with proposed 10 CFR 63 (Dyer 1999b) requirements. DBE analysis is also required to identify and classify the SSCs that are important to safety (ITS).

  5. System Design and the Safety Basis

    SciTech Connect

    Ellingson, Darrel

    2008-05-06

    The objective of this paper is to present the Bechtel Jacobs Company, LLC (BJC) Lessons Learned for system design as it relates to safety basis documentation. BJC has had to reconcile incomplete or outdated system description information with current facility safety basis for a number of situations in recent months. This paper has relevance in multiple topical areas including documented safety analysis, decontamination & decommissioning (D&D), safety basis (SB) implementation, safety and design integration, potential inadequacy of the safety analysis (PISA), technical safety requirements (TSR), and unreviewed safety questions. BJC learned that nuclear safety compliance relies on adequate and well documented system design information. A number of PIS As and TSR violations occurred due to inadequate or erroneous system design information. As a corrective action, BJC assessed the occurrences caused by systems design-safety basis interface problems. Safety systems reviewed included the Molten Salt Reactor Experiment (MSRE) Fluorination System, K-1065 fire alarm system, and the K-25 Radiation Criticality Accident Alarm System. The conclusion was that an inadequate knowledge of system design could result in continuous non-compliance issues relating to nuclear safety. This was especially true with older facilities that lacked current as-built drawings coupled with the loss of 'historical knowledge' as personnel retired or moved on in their careers. Walkdown of systems and the updating of drawings are imperative for nuclear safety compliance. System design integration with safety basis has relevance in the Department of Energy (DOE) complex. This paper presents the BJC Lessons Learned in this area. It will be of benefit to DOE contractors that manage and operate an aging population of nuclear facilities.

  6. Configuration management after design basis reconstitution

    SciTech Connect

    Purcell, J.J. ); Livingston, B.R. )

    1991-01-01

    Over the last few years, Fort Calhoun station (FCS) has implemented a number of programs to enhance plant operability and readiness. The design basis document (DBD) reconstitution project was the cornerstone of this effort. Vendor manual upgrade, operating procedures upgrade, plant equipment data-base verification, equipment labeling, and warehousing improvements were also implemented as part of this improvement program. With the completion of these programs, plant documentation was current to the baselines established by each program, and a configuration management program (CMP) was established to maintain this level of accuracy throughout the remaining life of FCS. Change control throughout the organization has been reviewed and upgraded to ensure that all changes are evaluated for impact to the design bases.

  7. Computed tomography imaging system design for shape threat detection

    NASA Astrophysics Data System (ADS)

    Masoudi, Ahmad; Thamvichai, Ratchaneekorn; Neifeld, Mark A.

    2017-04-01

    In the first part of this work, we present two methods for improving the shape-threat detection performance of x-ray computed tomography. Our work uses a fixed-gantry system employing 25 x-ray sources. We first utilize Kullback-Leibler divergence and Mahalanobis distance to determine the optimal single-source single-exposure measurement. The second method employs gradient search on Bhattacharyya bound on error rate (Pe) to determine an optimal multiplexed measurement that simultaneously utilizes all available sources in a single exposure. With limited total resources of 106 photons, the multiplexed measurement provides a 41.8× reduction in Pe relative to the single-source measurement. In the second part, we consider multiple exposures and develop an adaptive measurement strategy for x-ray threat detection. Using the adaptive strategy, we design the next measurement based on information retrieved from previous measurements. We determine both optimal "next measurement" and stopping criterion to insure a target Pe using sequential hypothesis testing framework. With adaptive single-source measurements, we can reduce Pe by a factor of 40× relative to the measurements employing all sources in sequence. We also observe that there is a trade-off between measurement SNR and number of detectors when we study the performance of systems with reduced detector numbers.

  8. Factors influencing IUCN threat levels to orchids across Europe on the basis of national red lists.

    PubMed

    Kull, Tiiu; Selgis, Ulvi; Peciña, Miguel Villoslada; Metsare, Mirjam; Ilves, Aigi; Tali, Kadri; Sepp, Kalev; Kull, Kalevi; Shefferson, Richard P

    2016-09-01

    The red list has become a ubiquitous tool in the conservation of species. We analyzed contemporary trends in the threat levels of European orchids, in total 166 species characterized in 27 national red lists, in relation to their reproductive biology and growth form, distribution area, and land cover where they occur. We found that species in central Europe are more threatened than those in the northern, southern, or Atlantic parts of Europe, while species were least threatened in southern Europe. Nectarless and tuberous species are significantly more threatened than nectariferous and rhizomatous taxa. Land cover (ratios of artificial land cover, area of pastures and grasslands, forests and inland wetlands) also significantly impacted the threat level. A bigger share of artificial land cover increases threat, and a bigger share of pasture and grassland lowers it. Unexpectedly, a bigger share of inland wetland area in a country increased threat level, which we believe may be due to the threatened nature of wetlands themselves relative to other natural land cover types. Finally, species occurring in multiple countries are on average less threatened. We believe that large-scale analysis of current IUCN national red lists as based on their specific categories and criteria may particularly inform the development of coordinated regional or larger-scale management strategies. In this case, we advocate for a coordinated EU protection and restoration strategy particularly aimed at central European orchids and those occurring in wetland area.

  9. 10 CFR 72.92 - Design basis external natural events.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Design basis external natural events. 72.92 Section 72.92... Evaluation Factors § 72.92 Design basis external natural events. (a) Natural phenomena that may exist or that... must be adopted for evaluating the design basis external natural events based on the characteristics...

  10. 10 CFR 72.92 - Design basis external natural events.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Design basis external natural events. 72.92 Section 72.92... Evaluation Factors § 72.92 Design basis external natural events. (a) Natural phenomena that may exist or that... must be adopted for evaluating the design basis external natural events based on the characteristics...

  11. 10 CFR 72.92 - Design basis external natural events.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Design basis external natural events. 72.92 Section 72.92... Evaluation Factors § 72.92 Design basis external natural events. (a) Natural phenomena that may exist or that... must be adopted for evaluating the design basis external natural events based on the characteristics...

  12. 10 CFR 72.92 - Design basis external natural events.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Design basis external natural events. 72.92 Section 72.92... Evaluation Factors § 72.92 Design basis external natural events. (a) Natural phenomena that may exist or that... must be adopted for evaluating the design basis external natural events based on the characteristics...

  13. 10 CFR 72.92 - Design basis external natural events.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Design basis external natural events. 72.92 Section 72.92... Evaluation Factors § 72.92 Design basis external natural events. (a) Natural phenomena that may exist or that... must be adopted for evaluating the design basis external natural events based on the characteristics...

  14. System requirements and design description for the document basis database interface (DocBasis)

    SciTech Connect

    Lehman, W.J.

    1997-09-30

    This document describes system requirements and the design description for the Document Basis Database Interface (DocBasis). The DocBasis application is used to manage procedures used within the tank farms. The application maintains information in a small database to track the document basis for a procedure, as well as the current version/modification level and the basis for the procedure. The basis for each procedure is substantiated by Administrative, Technical, Procedural, and Regulatory requirements. The DocBasis user interface was developed by Science Applications International Corporation (SAIC).

  15. Design basis for the NRC Operations Center

    SciTech Connect

    Lindell, M.K.; Wise, J.A.; Griffin, B.N.; Desrosiers, A.E.; Meitzler, W.D.

    1983-05-01

    This report documents the development of a design for a new NRC Operations Center (NRCOC). The project was conducted in two phases: organizational analysis and facility design. In order to control the amount of traffic, congestion and noise within the facility, it is recommended that information flow in the new NRCOC be accomplished by means of an electronic Status Information Management System. Functional requirements and a conceptual design for this system are described. An idealized architectural design and a detailed design program are presented that provide the appropriate amount of space for operations, equipment and circulation within team areas. The overall layout provides controlled access to the facility and, through the use of a zoning concept, provides each team within the NRCOC the appropriate balance of ready access and privacy determined from the organizational analyses conducted during the initial phase of the project.

  16. Advanced Test Reactor Safety Basis Upgrade Lessons Learned Relative to Design Basis Verification and Safety Basis Management

    SciTech Connect

    G. L. Sharp; R. T. McCracken

    2004-05-01

    The Advanced Test Reactor (ATR) is a pressurized light-water reactor with a design thermal power of 250 MW. The principal function of the ATR is to provide a high neutron flux for testing reactor fuels and other materials. The reactor also provides other irradiation services such as radioisotope production. The ATR and its support facilities are located at the Test Reactor Area of the Idaho National Engineering and Environmental Laboratory (INEEL). An audit conducted by the Department of Energy's Office of Independent Oversight and Performance Assurance (DOE OA) raised concerns that design conditions at the ATR were not adequately analyzed in the safety analysis and that legacy design basis management practices had the potential to further impact safe operation of the facility.1 The concerns identified by the audit team, and issues raised during additional reviews performed by ATR safety analysts, were evaluated through the unreviewed safety question process resulting in shutdown of the ATR for more than three months while these concerns were resolved. Past management of the ATR safety basis, relative to facility design basis management and change control, led to concerns that discrepancies in the safety basis may have developed. Although not required by DOE orders or regulations, not performing design basis verification in conjunction with development of the 10 CFR 830 Subpart B upgraded safety basis allowed these potential weaknesses to be carried forward. Configuration management and a clear definition of the existing facility design basis have a direct relation to developing and maintaining a high quality safety basis which properly identifies and mitigates all hazards and postulated accident conditions. These relations and the impact of past safety basis management practices have been reviewed in order to identify lessons learned from the safety basis upgrade process and appropriate actions to resolve possible concerns with respect to the current ATR safety

  17. 14 CFR 121.162 - ETOPS Type Design Approval Basis.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false ETOPS Type Design Approval Basis. 121.162... REQUIREMENTS: DOMESTIC, FLAG, AND SUPPLEMENTAL OPERATIONS Aircraft Requirements § 121.162 ETOPS Type Design Approval Basis. Except for a passenger-carrying airplane with more than two engines manufactured prior to...

  18. Science Underpinning TBC Design to Overcome the CMAS Threat to Progress in Gas Turbine Technology

    DTIC Science & Technology

    2015-09-30

    Science Underpinning TBC Design to Overcome the CMAS Threat to Progress in Gas Turbine Technology Sb. GRANT NUMBER NOOO 14-08-1-0522 Sc. PROGRAM ELEMENT...degradation in current and future gas turbine engines with expected material temperatures :::=:: 1300°C. The overarching goal was to elucidate the...Z39.1t Final Report on ONR Grant No. N00014-08-1-0522 SCIENCE UNDERPINNING TBC DESIGN TO OVERCOME THE CMAS THREAT TO PROGRESS IN GAS TURBINE

  19. A Basis for Determining the Adequacy of Evaluation Designs

    ERIC Educational Resources Information Center

    Sanders, James R.; Nafziger, Dean N.

    2011-01-01

    The purpose of this paper is to provide a basis for judging the adequacy of evaluation plans or, as they are commonly called, evaluation designs. The authors assume that using the procedures suggested in this paper to determine the adequacy of evaluation designs in advance of actually conducting evaluations will lead to better evaluation designs,…

  20. A generalized algorithm to design finite field normal basis multipliers

    NASA Technical Reports Server (NTRS)

    Wang, C. C.

    1986-01-01

    Finite field arithmetic logic is central in the implementation of some error-correcting coders and some cryptographic devices. There is a need for good multiplication algorithms which can be easily realized. Massey and Omura recently developed a new multiplication algorithm for finite fields based on a normal basis representation. Using the normal basis representation, the design of the finite field multiplier is simple and regular. The fundamental design of the Massey-Omura multiplier is based on a design of a product function. In this article, a generalized algorithm to locate a normal basis in a field is first presented. Using this normal basis, an algorithm to construct the product function is then developed. This design does not depend on particular characteristics of the generator polynomial of the field.

  1. The Functional Requirements and Design Basis for Information Barriers

    SciTech Connect

    Fuller, James L.

    2012-05-01

    This report summarizes the results of the Information Barrier Working Group workshop held at Sandia National Laboratory in Albuquerque, NM, February 2-4, 1999. This workshop was convened to establish the functional requirements associated with warhead radiation signature information barriers, to identify the major design elements of any such system or approach, and to identify a design basis for each of these major elements. Such information forms the general design basis to be used in designing, fabricating, and evaluating the complete integrated systems developed for specific purposes.

  2. Experimental Control and Threats to Internal Validity of Concurrent and Nonconcurrent Multiple Baseline Designs

    ERIC Educational Resources Information Center

    Christ, Theodore J.

    2007-01-01

    Single-case research designs are often applied within school psychology. This article provides a critical review of the scientific merit of both concurrent and nonconcurrent multiple baseline (MB) designs, relative to their capacity to assess threats of internal validity and establish experimental control. Distinctions are established between AB…

  3. Experimental Control and Threats to Internal Validity of Concurrent and Nonconcurrent Multiple Baseline Designs

    ERIC Educational Resources Information Center

    Christ, Theodore J.

    2007-01-01

    Single-case research designs are often applied within school psychology. This article provides a critical review of the scientific merit of both concurrent and nonconcurrent multiple baseline (MB) designs, relative to their capacity to assess threats of internal validity and establish experimental control. Distinctions are established between AB…

  4. Advanced Test Reactor Design Basis Reconstitution Project Issue Resolution Process

    SciTech Connect

    Steven D. Winter; Gregg L. Sharp; William E. Kohn; Richard T. McCracken

    2007-05-01

    The Advanced Test Reactor (ATR) Design Basis Reconstitution Program (DBRP) is a structured assessment and reconstitution of the design basis for the ATR. The DBRP is designed to establish and document the ties between the Document Safety Analysis (DSA), design basis, and actual system configurations. Where the DBRP assessment team cannot establish a link between these three major elements, a gap is identified. Resolutions to identified gaps represent configuration management and design basis recovery actions. The proposed paper discusses the process being applied to define, evaluate, report, and address gaps that are identified through the ATR DBRP. Design basis verification may be performed or required for a nuclear facility safety basis on various levels. The process is applicable to large-scale design basis reconstitution efforts, such as the ATR DBRP, or may be scaled for application on smaller projects. The concepts are applicable to long-term maintenance of a nuclear facility safety basis and recovery of degraded safety basis components. The ATR DBRP assessment team has observed numerous examples where a clear and accurate link between the DSA, design basis, and actual system configuration was not immediately identifiable in supporting documentation. As a result, a systematic approach to effectively document, prioritize, and evaluate each observation is required. The DBRP issue resolution process provides direction for consistent identification, documentation, categorization, and evaluation, and where applicable, entry into the determination process for a potential inadequacy in the safety analysis (PISA). The issue resolution process is a key element for execution of the DBRP. Application of the process facilitates collection, assessment, and reporting of issues identified by the DBRP team. Application of the process results in an organized database of safety basis gaps and prioritized corrective action planning and resolution. The DBRP team follows the ATR

  5. SAFETY BASIS DESIGN DEVELOPMENT CHALLENGES IMECE2007-42747

    SciTech Connect

    RYAN GW

    2007-09-24

    'Designing in Safety' is a desired part of the development of any new potentially hazardous system, process, or facility. It is a required part of nuclear safety activities as specified in the U.S. Department of Energy (DOE) Order 420.B, Facility Safety. This order addresses the design of nuclear related facilities developed under federal regulation IOCFR830, Nuclear Safety Management. IOCFR830 requires that safety basis documentation be provided to identify how nuclear safety is being adequately addressed as a condition for system operation (e.g., the safety basis). To support the development of the safety basis, a safety analysis is performed. Although the concept of developing a design that addresses 'Safety is simple, the execution can be complex and challenging. This paper addresses those complexities and challenges for the design activity of a system to treat sludge, a corrosion product of spent nuclear fuel, at DOE's Hanford Site in Washington State. The system being developed is referred to as the Sludge Treatment Project (STP). This paper describes the portion of the safety analysis that addresses the selection of design basis events using the experience gained from the STP and the development of design requirements for safety features associated with those events. Specifically, the paper describes the safety design process and the application of the process for two types of potential design basis accidents associated with the operation of the system, (1) flashing spray leaks and (2) splash and splatter leaks. Also presented are the technical challenges that are being addressed to develop effective safety features to deal with these design basis accidents.

  6. A Design Basis for Spacecraft Cabin Trace Contaminant Control

    NASA Technical Reports Server (NTRS)

    Perry, Jay L.

    2009-01-01

    Successful trace chemical contamination control is one of the components necessary for achieving good cabin atmospheric quality. While employing seemingly simple process technologies, sizing the active contamination control equipment must employ a reliable design basis for the trace chemical load in the cabin atmosphere. A simplified design basis that draws on experience gained from the International Space Station program is presented. The trace chemical contamination control design load refines generation source magnitudes and includes key chemical functional groups representing both engineering and toxicology challenges.

  7. A Design Basis for Spacecraft Cabin Trace Contaminant Control

    NASA Technical Reports Server (NTRS)

    Perry, Jay L.

    2009-01-01

    Successful trace chemical contamination control is one of the components necessary for achieving good cabin atmospheric quality. While employing seemingly simple process technologies, sizing the active contamination control equipment must employ a reliable design basis for the trace chemical load in the cabin atmosphere. A simplified design basis that draws on experience gained from the International Space Station program is presented. The trace chemical contamination control design load refines generation source magnitudes and includes key chemical functional groups representing both engineering and toxicology challenges.

  8. F-106 data summary and model results relative to threat criteria and protection design analysis

    NASA Technical Reports Server (NTRS)

    Pitts, F. L.; Finelli, G. B.; Perala, R. A.; Rudolph, T. H.

    1986-01-01

    The NASA F-106 has acquired considerable data on the rates-of-change of electromagnetic parameters on the aircraft surface during 690 direct lightning strikes while penetrating thunderstorms at altitudes ranging from 15,000 to 40,000 feet. These in-situ measurements have provided the basis for the first statistical quantification of the lightning electromagnetic threat to aircrat appropriate for determining lightning indirect effects on aircraft. The data are presently being used in updating previous lightning criteria and standards developed over the years from ground-based measurements. The new lightning standards will, therefore, be the first which reflect actual aircraft responses measured at flight altitudes. The modeling technique developed to interpret and understand the direct strike electromagnetic data acquired on the F-106 provides a means to model the interaction of the lightning channel with the F-106. The reasonable results obtained with the model, compared to measured responses, yield confidence that the model may be credibly applied to other aircraft types and uses in the prediction of internal coupling effects in the design of lightning protection for new aircraft.

  9. F-106 data summary and model results relative to threat criteria and protection design analysis

    NASA Technical Reports Server (NTRS)

    Pitts, F. L.; Finelli, G. B.; Perala, R. A.; Rudolph, T. H.

    1986-01-01

    The NASA F-106 has acquired considerable data on the rates-of-change of electromagnetic parameters on the aircraft surface during 690 direct lightning strikes while penetrating thunderstorms at altitudes ranging from 15,000 to 40,000 feet. These in-situ measurements have provided the basis for the first statistical quantification of the lightning electromagnetic threat to aircrat appropriate for determining lightning indirect effects on aircraft. The data are presently being used in updating previous lightning criteria and standards developed over the years from ground-based measurements. The new lightning standards will, therefore, be the first which reflect actual aircraft responses measured at flight altitudes. The modeling technique developed to interpret and understand the direct strike electromagnetic data acquired on the F-106 provides a means to model the interaction of the lightning channel with the F-106. The reasonable results obtained with the model, compared to measured responses, yield confidence that the model may be credibly applied to other aircraft types and uses in the prediction of internal coupling effects in the design of lightning protection for new aircraft.

  10. Solar Power Tower Design Basis Document, Revision 0

    SciTech Connect

    ZAVOICO,ALEXIS B.

    2001-07-01

    This report contains the design basis for a generic molten-salt solar power tower. A solar power tower uses a field of tracking mirrors (heliostats) that redirect sunlight on to a centrally located receiver mounted on top a tower, which absorbs the concentrated sunlight. Molten nitrate salt, pumped from a tank at ground level, absorbs the sunlight, heating it up to 565 C. The heated salt flows back to ground level into another tank where it is stored, then pumped through a steam generator to produce steam and make electricity. This report establishes a set of criteria upon which the next generation of solar power towers will be designed. The report contains detailed criteria for each of the major systems: Collector System, Receiver System, Thermal Storage System, Steam Generator System, Master Control System, and Electric Heat Tracing System. The Electric Power Generation System and Balance of Plant discussions are limited to interface requirements. This design basis builds on the extensive experience gained from the Solar Two project and includes potential design innovations that will improve reliability and lower technical risk. This design basis document is a living document and contains several areas that require trade-studies and design analysis to fully complete the design basis. Project- and site-specific conditions and requirements will also resolve open To Be Determined issues.

  11. `Intelligent Design' Poses ContinuedThreat to Science

    NASA Astrophysics Data System (ADS)

    Geissman, John W.

    2006-01-01

    Science education in the United States has been the subject of more than usual attention, especially since 1 August 2005 when President George W. Bush stoked the fire by responding to a reporter's question about the teaching of `intelligent design' (ID) in science classrooms by saying that ``both sides ought to be properly taught. . . so people can understand what the debate is about.'' Prior to the 20 December 2005 ruling against the teaching of ID in public schools, by U.S. District Judge John E. Jones III in the Pennsylvania case Kitzmiller v. Dover Area School District, anti-evolutionists and ID proponents seemed to be enjoying a new momentum in the aftermath of President Bush's statements. William Dembski, senior fellow with the Discovery Institute's Center for the Renewal of Science and Culture in Seattle, Wash., a group that supports intelligent design, wrote on 4 August 2005 at http://www.designinference.com that President Bush ``is to be commended for his courage, wisdom, and foresight'' for supporting the teaching of ID alongside evolution.

  12. A Simulation Study of Threats to Validity in Quasi-Experimental Designs: Interrelationship between Design, Measurement, and Analysis

    PubMed Central

    Holgado-Tello, Fco. P.; Chacón-Moscoso, Salvador; Sanduvete-Chaves, Susana; Pérez-Gil, José A.

    2016-01-01

    The Campbellian tradition provides a conceptual framework to assess threats to validity. On the other hand, different models of causal analysis have been developed to control estimation biases in different research designs. However, the link between design features, measurement issues, and concrete impact estimation analyses is weak. In order to provide an empirical solution to this problem, we use Structural Equation Modeling (SEM) as a first approximation to operationalize the analytical implications of threats to validity in quasi-experimental designs. Based on the analogies established between the Classical Test Theory (CTT) and causal analysis, we describe an empirical study based on SEM in which range restriction and statistical power have been simulated in two different models: (1) A multistate model in the control condition (pre-test); and (2) A single-trait-multistate model in the control condition (post-test), adding a new mediator latent exogenous (independent) variable that represents a threat to validity. Results show, empirically, how the differences between both the models could be partially or totally attributed to these threats. Therefore, SEM provides a useful tool to analyze the influence of potential threats to validity. PMID:27378991

  13. A Simulation Study of Threats to Validity in Quasi-Experimental Designs: Interrelationship between Design, Measurement, and Analysis.

    PubMed

    Holgado-Tello, Fco P; Chacón-Moscoso, Salvador; Sanduvete-Chaves, Susana; Pérez-Gil, José A

    2016-01-01

    The Campbellian tradition provides a conceptual framework to assess threats to validity. On the other hand, different models of causal analysis have been developed to control estimation biases in different research designs. However, the link between design features, measurement issues, and concrete impact estimation analyses is weak. In order to provide an empirical solution to this problem, we use Structural Equation Modeling (SEM) as a first approximation to operationalize the analytical implications of threats to validity in quasi-experimental designs. Based on the analogies established between the Classical Test Theory (CTT) and causal analysis, we describe an empirical study based on SEM in which range restriction and statistical power have been simulated in two different models: (1) A multistate model in the control condition (pre-test); and (2) A single-trait-multistate model in the control condition (post-test), adding a new mediator latent exogenous (independent) variable that represents a threat to validity. Results show, empirically, how the differences between both the models could be partially or totally attributed to these threats. Therefore, SEM provides a useful tool to analyze the influence of potential threats to validity.

  14. Cold Vacuum Drying (CVD) Facility Design Basis Accident Analysis Documentation

    SciTech Connect

    PIEPHO, M.G.

    1999-10-20

    This document provides the detailed accident analysis to support HNF-3553, Annex B, Spent Nuclear Fuel Project Final Safety Analysis Report, ''Cold Vacuum Drying Facility Final Safety Analysis Report (FSAR).'' All assumptions, parameters and models used to provide the analysis of the design basis accidents are documented to support the conclusions in the FSAR.

  15. Canister storage building design basis accident analysis documentation

    SciTech Connect

    KOPELIC, S.D.

    1999-02-25

    This document provides the detailed accident analysis to support HNF-3553, Spent Nuclear Fuel Project Final Safety Analysis Report, Annex A, ''Canister Storage Building Final Safety Analysis Report.'' All assumptions, parameters, and models used to provide the analysis of the design basis accidents are documented to support the conclusions in the Canister Storage Building Final Safety Analysis Report.

  16. Breeder Spent Fuel Handling Program multipurpose cask design basis document

    SciTech Connect

    Duckett, A.J.; Sorenson, K.B.

    1985-09-01

    The Breeder Spent Fuel Handling (BSFH) Program multipurpose cask Design Basis Document defines the performance requirements essential to the development of a legal weight truck cask to transport FFTF spent fuel from reactor to a reprocessing facility and the resultant High Level Waste (HLW) to a repository. 1 ref.

  17. Canister Storage Building (CSB) Design Basis Accident Analysis Documentation

    SciTech Connect

    CROWE, R.D.

    1999-09-09

    This document provides the detailed accident analysis to support ''HNF-3553, Spent Nuclear Fuel Project Final Safety, Analysis Report, Annex A,'' ''Canister Storage Building Final Safety Analysis Report.'' All assumptions, parameters, and models used to provide the analysis of the design basis accidents are documented to support the conclusions in the Canister Storage Building Final Safety Analysis Report.

  18. Canister Storage Building (CSB) Design Basis Accident Analysis Documentation

    SciTech Connect

    CROWE, R.D.; PIEPHO, M.G.

    2000-03-23

    This document provided the detailed accident analysis to support HNF-3553, Spent Nuclear Fuel Project Final Safety Analysis Report, Annex A, ''Canister Storage Building Final Safety Analysis Report''. All assumptions, parameters, and models used to provide the analysis of the design basis accidents are documented to support the conclusions in the Canister Storage Building Final Safety Analysis Report.

  19. Participatory action research designs in applied disability and rehabilitation science: protecting against threats to social validity.

    PubMed

    Seekins, Tom; White, Glen W

    2013-01-01

    Researchers and disability advocates have been debating consumer involvement in disability and rehabilitation science since at least 1972. Despite the length of this debate, much confusion remains. Consumer involvement may represent a spirit of democracy or even empowerment, but as a tool of science, it is necessary to understand how to judge its application. To realize consumer involvement as a design element in science, researchers need a framework for understanding how it can contribute to the scientific process. The thesis of this article is that a primary scientific function of consumer involvement is to reduce threats to the social validity of research, the extent to which those expected to use or benefit from research products judge them as useful and actually use them. Social validity has traditionally not been treated with the same rigor as concerns for internal and external validity. This article presents a framework that describes 7 threats to social validity and explains how 15 forms of consumer involvement protect against those threats. We also suggest procedures for reporting and reviewing consumer involvement in proposals and manuscripts. This framework offers tools familiar to all scientists for identifying threats to the quality of research, and for judging the effectiveness of strategies for protecting against those threats. It may also enhance the standing of consumer involvement strategies as tools for protecting research quality by organizing them in a way that allows for systematic criticism of their effectiveness and subsequent improvement.

  20. Basis for NGNP Reactor Design Down-Selection

    SciTech Connect

    L.E. Demick

    2010-08-01

    The purpose of this paper is to identify the extent of technology development, design and licensing maturity anticipated to be required to credibly identify differences that could make a technical choice practical between the prismatic and pebble bed reactor designs. This paper does not address a business decision based on the economics, business model and resulting business case since these will vary based on the reactor application. The selection of the type of reactor, the module ratings, the number of modules, the configuration of the balance of plant and other design selections will be made on the basis of optimizing the Business Case for the application. These are not decisions that can be made on a generic basis.

  1. Technical Details on Beyond Design Basis Event Pilot Evaluations

    SciTech Connect

    None, None

    2013-01-01

    The primary focus of the BDBE pilot project was the review of BDBE analysis and mitigation features at four DOE nuclear facilities representing a range of DOE sites, nuclear facility types/activities, and responsible program offices. The pilots looked at (1) how beyond design basis accidents were evaluated and documented in the facility Documented Safety Analysis, (2) potential BDBE vulnerabilities and margins to failure of facility safety features as obtained from general area and specific system walkdowns and design documents reviews, and (3) preparations made in facility and site emergency management programs to respond to severe accidents. It also evaluated whether draft BDBE guidance on safety analysis and emergency management could be used to improve the analysis of and preparations for mitigating severe and beyond design basis accidents. The details of these activities are organized in this report as described below.

  2. Basis for NGNP Reactor Design Down-Selection

    SciTech Connect

    L.E. Demick

    2011-11-01

    The purpose of this paper is to identify the extent of technology development, design and licensing maturity anticipated to be required to credibly identify differences that could make a technical choice practical between the prismatic and pebble bed reactor designs. This paper does not address a business decision based on the economics, business model and resulting business case since these will vary based on the reactor application. The selection of the type of reactor, the module ratings, the number of modules, the configuration of the balance of plant and other design selections will be made on the basis of optimizing the Business Case for the application. These are not decisions that can be made on a generic basis.

  3. Design-Load Basis for LANL Structures, Systems, and Components

    SciTech Connect

    I. Cuesta

    2004-09-01

    This document supports the recommendations in the Los Alamos National Laboratory (LANL) Engineering Standard Manual (ESM), Chapter 5--Structural providing the basis for the loads, analysis procedures, and codes to be used in the ESM. It also provides the justification for eliminating the loads to be considered in design, and evidence that the design basis loads are appropriate and consistent with the graded approach required by the Department of Energy (DOE) Code of Federal Regulation Nuclear Safety Management, 10, Part 830. This document focuses on (1) the primary and secondary natural phenomena hazards listed in DOE-G-420.1-2, Appendix C, (2) additional loads not related to natural phenomena hazards, and (3) the design loads on structures during construction.

  4. AN APPROACH TO SAFETY DESIGN BASIS DOCUMENTATION CHANGE CONTROL

    SciTech Connect

    RYAN GW

    2008-05-15

    This paper describes a safety design basis documentation change control process. The process identifies elements that can be used to manage the project/facility configuration during design evolution through the Initiation, Definition, and Execution project phases. The project phases addressed by the process are defined in US Department of Energy (DOE) Order (O) 413.3A, Program and Project Management for the Acquisition of Capital Assets, in support of DOE project Critical Decisions (CD). This approach has been developed for application to two Hanford Site projects in their early CD phases and is considered to be a key element of safety and design integration. As described in the work that has been performed, the purpose of change control is to maintain consistency among design requirements, the physical configuration, related facility documentation, and the nuclear safety basis during the evolution of the design. The process developed (1) ensures an appropriate level of rigor is applied at each project phase and (2) is considered to implement the requirements and guidance provided in DOE-STD-1189-2008, Integration of Safety into the Design Process. Presentation of this work is expected to benefit others in the DOE Complex that may be implementing DOE-STD-1189-2008 or managing nuclear safety documentation in support of projects in-process.

  5. Advances in the physics basis for the European DEMO design

    NASA Astrophysics Data System (ADS)

    Wenninger, R.; Arbeiter, F.; Aubert, J.; Aho-Mantila, L.; Albanese, R.; Ambrosino, R.; Angioni, C.; Artaud, J.-F.; Bernert, M.; Fable, E.; Fasoli, A.; Federici, G.; Garcia, J.; Giruzzi, G.; Jenko, F.; Maget, P.; Mattei, M.; Maviglia, F.; Poli, E.; Ramogida, G.; Reux, C.; Schneider, M.; Sieglin, B.; Villone, F.; Wischmeier, M.; Zohm, H.

    2015-06-01

    In the European fusion roadmap, ITER is followed by a demonstration fusion power reactor (DEMO), for which a conceptual design is under development. This paper reports the first results of a coherent effort to develop the relevant physics knowledge for that (DEMO Physics Basis), carried out by European experts. The program currently includes investigations in the areas of scenario modeling, transport, MHD, heating & current drive, fast particles, plasma wall interaction and disruptions.

  6. Combinatorial library-based design with Basis Products

    NASA Astrophysics Data System (ADS)

    Zhou, Joe Zhongxiang; Shi, Shenghua; Na, Jim; Peng, Zhengwei; Thacher, Tom

    2009-10-01

    Uncovering useful lead compounds from a vast virtual library of synthesizable compounds continues to be of tremendous interest to pharmaceutical researchers. Here we present the concept of Basis Products (BPs), a new and broadly applicable method for achieving efficient selections from a combinatorial library. By definition, Basis Products are a strategically selected subset of compounds from a potentially very large combinatorial library, and any compound in a combinatorial library can represented by its BPs. In this article we will show how to use BP docking scores to find the top compounds of a combinatorial library. Compared with the brute-force docking of an entire virtual library, docking with BPs are much more efficient because of the substantial size reduction, saving both time and resources. We will also demonstrate how BPs can be used for property-based combinatorial library designs. Furthermore, BPs can also be considered as fragments carrying chemistry knowledge, hence they can potentially be used in combination with any fragment-based design method. Therefore, BPs can be used to integrate combinatorial design with structure-based design and/or fragment-based design. Other potential applications of BPs include lead hopping and consensus core building, which we will describe briefly as well in this report.

  7. The influence of military threats on the design and use of the Royal Naval Hospital Haslar.

    PubMed

    Buxton, P J

    2008-01-01

    The twin demands of the medical and security requirements influenced the original design of RNH Haslar. Over time the structure was altered to accommodate changes in the military threat and these changes can be identified from original plans and the extant structures. The use of spatial analysis, through the use of justified access graphs, can provide insights into the way the building was used and how it influenced the relationships between the staff and the patients.

  8. Archaeological data as a basis for repository marker design

    SciTech Connect

    Kaplan, M.F.

    1982-10-01

    This report concerns the development of a marking system for a nuclear waste repository which is very likely to survive for 10,000 years. In order to provide a background on the subject, and for the preliminary design presented in this report, a discussion is presented about the issues involved in human interference with the repository system and the communication of information. A separate chapter summarizes six ancient man-made monuments including: materials, effects of associated textual information on our understanding of the monument, and other features of the ancient monument relevant to marking a repository site. The information presented in the two chapters is used to provide the basis and rationale for a preliminary marker system design presented in a final chapter. 86 refs., 22 figs., 1 tab.

  9. Cold Vacuum Drying facility design basis accident analysis documentation

    SciTech Connect

    CROWE, R.D.

    2000-08-08

    This document provides the detailed accident analysis to support HNF-3553, Annex B, Spent Nuclear Fuel Project Final Safety Analysis Report (FSAR), ''Cold Vacuum Drying Facility Final Safety Analysis Report.'' All assumptions, parameters, and models used to provide the analysis of the design basis accidents are documented to support the conclusions in the FSAR. The calculations in this document address the design basis accidents (DBAs) selected for analysis in HNF-3553, ''Spent Nuclear Fuel Project Final Safety Analysis Report'', Annex B, ''Cold Vacuum Drying Facility Final Safety Analysis Report.'' The objective is to determine the quantity of radioactive particulate available for release at any point during processing at the Cold Vacuum Drying Facility (CVDF) and to use that quantity to determine the amount of radioactive material released during the DBAs. The radioactive material released is used to determine dose consequences to receptors at four locations, and the dose consequences are compared with the appropriate evaluation guidelines and release limits to ascertain the need for preventive and mitigative controls.

  10. The neural basis of self-face recognition after self-concept threat and comparison with important others.

    PubMed

    Guan, Lili; Qi, Mingming; Zhang, Qinglin; Yang, Juan

    2014-01-01

    The implicit positive association (IPA) theory attributed self-face advantage to the IPA with self-concept. Previous behavioral study has found that self-concept threat (SCT) could eliminate the self-advantage in face recognition over familiar-face, without taking levels of facial familiarity into account. The current event-related potential study aimed to investigate whether SCT could eliminate the self-face advantage over stranger-face. Fifteen participants completed a "self-friend" comparison task in which participants identified the face orientation of self-face and friend-face after SCT and non-self-concept threat (NSCT) priming, and a "self-stranger" comparison task was also completed in which participants identified the face orientation of self-face and stranger-face after SCT and NSCT priming. The results showed that the N2 amplitudes were more negative for processing friend-face than self-face after NSCT priming, but there was no significant difference between them after SCT priming. Moreover, the N2 amplitudes were more negative for processing stranger-face than self-face both after SCT priming and after NSCT priming. Furthermore, SCT manipulated the N2 amplitudes of friend-face rather than self-face. Overall, the present study made a supplementary to the current IPA theory and further indicated that SCT would only eliminate this self-face recognition advantage when comparing with important others.

  11. Theoretical basis for design of thermal-stress-free fasteners

    NASA Technical Reports Server (NTRS)

    Blosser, M. L.; Mcwithey, R. R.

    1983-01-01

    A theoretical basis was developed for the design of fasteners which are free of thermal stress. A fastener can be shaped to eliminate the thermal stress which would otherwise result from differential thermal expansion between dissimilar fastener and sheet materials for many combinations of isotropic and orthotropic materials. The resulting joint remains snug, yet free of thermal stress at any temperature, if the joint is uniform in temperature, if it is frictionless, and if the coefficients of thermal expansion of the materials do not change with temperature. In general, such a fastener has curved sides; however, if both materials have isotropic coefficients of thermal expansion, a conical fastener is free of thermal stress. Equations are presented for thermal stress free shapes at both initial and final temperature, and typical fastener shapes are shown.

  12. A parametric design of ceramic faced composite armor subject to air weapon threats

    NASA Astrophysics Data System (ADS)

    Guo, Y. N.; Sun, Q.

    2015-12-01

    By taking into consideration the two categories of military projectile threats to aircraft structures, an optimal layer configuration of ceramic faced composite armor was designed in this paper. Using numerical simulations and the same layer arrangement of ceramic, UHMWPE, and carbon fiber laminates, a parametric finite element model using LS-DYNA code was built. Several thickness combinations were analyzed in order to determine the final lightest configuration that is capable of supporting a high-speed impact load and HEI blast wave load, which implements a high anti-penetration design for aircraft armor. This configuration can be used to improve the anti-impact ability of aircraft structures as well as achieve a structure/function integration design that considers a lighter weight.

  13. Exploring Operational Safeguards, Safety, and Security by Design to Address Real Time Threats in Nuclear Facilities

    SciTech Connect

    Schanfein, Mark J.; Mladineo, Stephen V.

    2015-07-07

    Over the last few years, significant attention has been paid to both encourage application and provide domestic and international guidance for designing in safeguards and security in new facilities.1,2,3 However, once a facility is operational, safeguards, security, and safety often operate as separate entities that support facility operations. This separation is potentially a serious weakness should insider or outsider threats become a reality.Situations may arise where safeguards detects a possible loss of material in a facility. Will they notify security so they can, for example, check perimeter doors for tampering? Not doing so might give the advantage to an insider who has already, or is about to, move nuclear material outside the facility building. If outsiders break into a facility, the availability of any information to coordinate the facility’s response through segregated alarm stations or a failure to include all available radiation sensors, such as safety’s criticality monitors can give the advantage to the adversary who might know to disable camera systems, but would most likely be unaware of other highly relevant sensors in a nuclear facility.This paper will briefly explore operational safeguards, safety, and security by design (3S) at a high level for domestic and State facilities, identify possible weaknesses, and propose future administrative and technical methods, to strengthen the facility system’s response to threats.

  14. Reactivity accidents: A reassessment of the design-basis events

    SciTech Connect

    Diamond, D. J.; Hsu, C. J.; Fitzpatrick, R.

    1990-01-01

    This report documents a study of light water reactor event sequences which have been investigated for their potential to result in reactivity accident with severe consequences. The study is an outgrowth of the concern which arose after the accident at Chernobyl and was recommended by the report of the US Nuclear Regulatory Commission (NRC) on the implications of that accident (NUREG-1251). The work was done for the NRC to reconfirm or bring into question previous judgements on reactivity events which must be analyzed for licensing. Event sequences were defined and then a probabilistic assessment was completed to estimate the frequency of the reactivity event and/or a deterministic calculation was completed to estimate the consequences to the fuel. Using the results of this analysis done by others, and set of screening criteria developed within this study, judgements were made for each sequence as to its importance, and recommendations were made as to whether the NRC ought to be considering the important sequences as part of the design basis or for further, more detailed investigation. 66 refs., 25 figs., 13 tabs.

  15. Spacecraft Mission Design for the Mitigation of the 2017 PDC Hypothetical Asteroid Threat

    NASA Technical Reports Server (NTRS)

    Barbee, Brent W.; Sarli, Bruno V.; Lyzhoft, Josh; Chodas, Paul W.; Englander, Jacob A.

    2017-01-01

    This paper presents a detailed mission design analysis results for the 2017 Planetary Defense Conference (PDC) Hypothetical Asteroid Impact Scenario, documented at https:cneos.jpl.nasa.govpdcspdc17. The mission design includes campaigns for both reconnaissance (flyby or rendezvous) of the asteroid (to characterize it and the nature of the threat it poses to Earth) and mitigation of the asteroid, via kinetic impactor deflection, nuclear explosive device (NED) deflection, or NED disruption. Relevant scenario parameters are varied to assess the sensitivity of the design outcome, such as asteroid bulk density, asteroid diameter, momentum enhancement factor, spacecraft launch vehicle, and mitigation system type. Different trajectory types are evaluated in the mission design process from purely ballistic to those involving optimal midcourse maneuvers, planetary gravity assists, and/or low-thrust solar electric propulsion. The trajectory optimization is targeted around peak deflection points that were found through a novel linear numerical technique method. The optimization process includes constrain parameters, such as Earth departure date, launch declination, spacecraft, asteroid relative velocity and solar phase angle, spacecraft dry mass, minimum/maximum spacecraft distances from Sun and Earth, and Earth-spacecraft communications line of sight. Results show that one of the best options for the 2017 PDC deflection is solar electric propelled rendezvous mission with a single spacecraft using NED for the deflection.

  16. Spacecraft Mission Design for the Mitigation of the 2017 PDC Hypothetical Asteroid Threat

    NASA Technical Reports Server (NTRS)

    Barbee, Brent W.; Sarli, Bruno V.; Lyzhoft, Joshua; Chodas, Paul W.; Englander, Jacob A.

    2017-01-01

    This paper presents a detailed mission design analysis results for the 2017 Planetary Defense Conference (PDC) Hypothetical Asteroid Impact Scenario, documented at https://cneos.jpl.nasa.gov/ pd/cs/pdc17/. The mission design includes campaigns for both reconnaissance (flyby or rendezvous) of the asteroid (to characterize it and the nature of the threat it poses to Earth) and mitigation of the asteroid, via kinetic impactor deflection, nuclear explosive device (NED) deflection, or NED disruption. Relevant scenario parameters are varied to assess the sensitivity of the design outcome, such as asteroid bulk density, asteroid diameter, momentum enhancement factor, spacecraft launch vehicle, and mitigation system type. Different trajectory types are evaluated in the mission design process from purely ballistic to those involving optimal midcourse maneuvers, planetary gravity assists, and/or lowthrust solar electric propulsion. The trajectory optimization is targeted around peak deflection points that were found through a novel linear numerical technique method. The optimization process includes constrain parameters, such as Earth departure date, launch declination, spacecraft/asteroid relative velocity and solar phase angle, spacecraft dry mass, minimum/maximum spacecraft distances from Sun and Earth, and Earth/spacecraft communications line of sight. Results show that one of the best options for the 2017 PDC deflection is solar electric propelled rendezvous mission with a single spacecraft using NED for the deflection

  17. MOV motor and gearbox performance under design basis loads

    SciTech Connect

    DeWall, K.G.; Watkins, J.C.; Weidenhamer, G.H.

    1998-06-01

    This paper describes the results of valve testing sponsored by the US Nuclear Regulatory Commission, Office of Nuclear Regulatory Research and conducted at the Idaho National Engineering and Environmental Laboratory. The research objective was to evaluate the capabilities of specific actuator motor and gearbox assemblies under various design basis loading conditions. The testing was performed using the motor-operated valve load simulator, a test fixture that simulates the stem load profiles a valve actuator would experience when closing a valve against flow and pressure loadings. The authors tested five typical motors (four ac motors and one dc motor) with three gearbox assemblies at conditions a motor might experience in a power plant, including such off-normal conditions as operation at high temperature and reduced voltage. The authors also determined the efficiency of the actuator gearbox. The testing produced the following significant results: all five motors operated at or above their rated torque during tests at full voltage and ambient temperature; for all five motors (dc as well as ac), the actual torque loss due to voltage degradation was greater than the torque loss predicted using common methods; startup torques in locked rotor tests compared well with stall torques in dynamometer-type tests; the methods commonly used to predict torque losses due to elevated operating temperatures sometimes bounded the actual losses, but not in all cases; the greatest discrepancy involved the prediction for the dc motor; running efficiencies published by the manufacturer for actuator gearboxes were higher than the actual efficiencies determined from testing, in some instances, the published pullout efficiencies were also higher than the actual values; operation of the gearbox at elevated temperature did not affect the operating efficiency.

  18. Algorithm To Design Finite-Field Normal-Basis Multipliers

    NASA Technical Reports Server (NTRS)

    Wang, Charles C.

    1988-01-01

    Way found to exploit Massey-Omura multiplication algorithm. Generalized algorithm locates normal basis in Galois filed GF(2m) and enables development of another algorithm to construct product function.

  19. Systems thinking as the basis for an ecological design education

    SciTech Connect

    DeKay, M.

    1996-10-01

    Design education is built on a combination of historical models that have little to do with ecological design or contemporary understandings of whole systems. In order to educate designers for ecologically and socially responsible practice, design schools will need to be radically redesigned in their structure, content, and methods. This paper uses a model from the natural sciences, Systems Theory, as a potential model for a foundational framework of design education. Basic tenets of systems thinking are outlined, along with principles of ecosystem function and organization. A series of fifteen suggested shifts in design education, eight as implications of ecosystem principles and seven derived from principles of ecosystem organization, are proposed.

  20. Towards a Basis for Designing Backwater and Side Channel Restorations

    USDA-ARS?s Scientific Manuscript database

    Design criteria for river channel restoration is becoming highly developed with several handbooks and guidance documents available, despite notable differences among various schools of thought. Basic principles of stable channel design and riverine habitat simulation undergird channel reconstructio...

  1. Severe burn injuries caused by bioethanol-design fireplaces-an overview on recreational fire threats.

    PubMed

    Kraemer, Robert; Knobloch, Karsten; Lorenzen, Johan; Breuing, Karl H; Koennecker, Soeren; Rennekampff, Hans-Oliver; Vogt, Peter M

    2011-01-01

    Commercially available bioethanol-fueled fireplaces have become increasingly popular additions for interior home decoration in Europe and more recently in the United States. These fireplaces are advertised as smokeless, ecologically friendly, and do not require professional installation, formal gas lines, or venting. Although manufacturers and businesses promote their safety, recent presentations of injuries have alerted the authors to the relevant danger bioethanol fireplaces can pose for the incautious user. Are bioethanol fireplaces going to become the future threat in domestic burn accidents beside common barbeque burns? A Medline literature search on barbeque and domestic fireplace accidents was performed to compare and stratify the injury patterns reported and to identify a risk profile for contemporary bioethanol-fueled fireplaces. To exemplify, two representative clinical cases of severe burn accidents caused by bioethanol-fueled fireplaces, both treated in the burn unit of the authors, are being presented. Design fireplaces are being recognized as an increasing source of fuel and fire-related danger in the home. This risk may be underestimated by the uninformed customer, resulting in severe burn injuries. Because bioethanol-fueled fireplaces have become more commonplace, they may overtake barbecue-related injury as the most common domestic burn injury.

  2. Modern Prototyping as a Basis for Industrial Design

    NASA Astrophysics Data System (ADS)

    Chekardovskaya, I. A.; Bakanovskaya, L. N.

    2016-10-01

    The paper presents methodological bases for designing object-oriented processes as applied to industrial design via the targeted activity and system approach to make production efficient for the petroleum industry. Possibilities of introducing scientific advancements into practice have been overviewed.

  3. 10 CFR 72.94 - Design basis external man-induced events.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Design basis external man-induced events. 72.94 Section 72... WASTE Siting Evaluation Factors § 72.94 Design basis external man-induced events. (a) The region must be... ISFSI or MRS. The important potential man-induced events that affect the ISFSI or MRS design must...

  4. 10 CFR 72.94 - Design basis external man-induced events.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Design basis external man-induced events. 72.94 Section 72... WASTE Siting Evaluation Factors § 72.94 Design basis external man-induced events. (a) The region must be... ISFSI or MRS. The important potential man-induced events that affect the ISFSI or MRS design must...

  5. 10 CFR 72.94 - Design basis external man-induced events.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Design basis external man-induced events. 72.94 Section 72... WASTE Siting Evaluation Factors § 72.94 Design basis external man-induced events. (a) The region must be... ISFSI or MRS. The important potential man-induced events that affect the ISFSI or MRS design must...

  6. 10 CFR 72.94 - Design basis external man-induced events.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Design basis external man-induced events. 72.94 Section 72... WASTE Siting Evaluation Factors § 72.94 Design basis external man-induced events. (a) The region must be... ISFSI or MRS. The important potential man-induced events that affect the ISFSI or MRS design must...

  7. 10 CFR 72.94 - Design basis external man-induced events.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Design basis external man-induced events. 72.94 Section 72... WASTE Siting Evaluation Factors § 72.94 Design basis external man-induced events. (a) The region must be... ISFSI or MRS. The important potential man-induced events that affect the ISFSI or MRS design must...

  8. 76 FR 63541 - Design-Basis Hurricane and Hurricane Missiles for Nuclear Power Plants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-13

    ...-2010-0288] Design-Basis Hurricane and Hurricane Missiles for Nuclear Power Plants AGENCY: Nuclear... Hurricane Missiles for Nuclear Power Plants.'' This regulatory guide provides licensees and applicants with... hurricane and design-basis hurricane-generated missiles that a nuclear power plant should be designed...

  9. 76 FR 50275 - Guidance for the Assessment of Beyond-Design-Basis Aircraft Impacts

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-12

    ... for Performing Aircraft Impact Assessments for New Plant Designs,'' Revision 8, issued April 2011. The... COMMISSION Guidance for the Assessment of Beyond-Design-Basis Aircraft Impacts AGENCY: Nuclear Regulatory...-Design-Basis Aircraft Impacts.'' This guide describes a method that the staff of NRC considers...

  10. CIF---Design basis for an integrated incineration facility

    SciTech Connect

    Bennett, G.F.

    1991-12-31

    This paper discusses the evolution of chosen technologies that occurred during the design process of the US Department of Energy (DOE) incineration system designated the Consolidated Incineration Facility (CIF) as the Savannah River Plant, Aiken, South Carolina. The Plant is operated for DOE by the Westinghouse Savannah River Company. The purpose of the incineration system is to treat low level radioactive and/or hazardous liquid and solid wastes by combustion. The objective for the facility is to thermally destroy toxic constituents and volume reduce waste material. Design criteria requires operation be controlled within the limits of RCRA`s permit envelope.

  11. CIF---Design basis for an integrated incineration facility

    SciTech Connect

    Bennett, G.F.

    1991-01-01

    This paper discusses the evolution of chosen technologies that occurred during the design process of the US Department of Energy (DOE) incineration system designated the Consolidated Incineration Facility (CIF) as the Savannah River Plant, Aiken, South Carolina. The Plant is operated for DOE by the Westinghouse Savannah River Company. The purpose of the incineration system is to treat low level radioactive and/or hazardous liquid and solid wastes by combustion. The objective for the facility is to thermally destroy toxic constituents and volume reduce waste material. Design criteria requires operation be controlled within the limits of RCRA's permit envelope.

  12. Theoretical Basis for the Design of a DWPF Evacuated Canister

    SciTech Connect

    Routt, K.R.

    2001-09-17

    This report provides the theoretical bases for use of an evacuated canister for draining a glass melter. Design recommendations are also presented to ensure satisfactory performance in future tests of the concept.

  13. Reduced Design Load Basis for Ultimate Blade Loads Estimation in Multidisciplinary Design Optimization Frameworks

    NASA Astrophysics Data System (ADS)

    Pavese, Christian; Tibaldi, Carlo; Larsen, Torben J.; Kim, Taeseong; Thomsen, Kenneth

    2016-09-01

    The aim is to provide a fast and reliable approach to estimate ultimate blade loads for a multidisciplinary design optimization (MDO) framework. For blade design purposes, the standards require a large amount of computationally expensive simulations, which cannot be efficiently run each cost function evaluation of an MDO process. This work describes a method that allows integrating the calculation of the blade load envelopes inside an MDO loop. Ultimate blade load envelopes are calculated for a baseline design and a design obtained after an iteration of an MDO. These envelopes are computed for a full standard design load basis (DLB) and a deterministic reduced DLB. Ultimate loads extracted from the two DLBs with the two blade designs each are compared and analyzed. Although the reduced DLB supplies ultimate loads of different magnitude, the shape of the estimated envelopes are similar to the one computed using the full DLB. This observation is used to propose a scheme that is computationally cheap, and that can be integrated inside an MDO framework, providing a sufficiently reliable estimation of the blade ultimate loading. The latter aspect is of key importance when design variables implementing passive control methodologies are included in the formulation of the optimization problem. An MDO of a 10 MW wind turbine blade is presented as an applied case study to show the efficacy of the reduced DLB concept.

  14. Designing community surveys to provide a basis for noise policy

    NASA Technical Reports Server (NTRS)

    Fields, J. M.

    1980-01-01

    After examining reports from a large number of social surveys, two areas were identified where methodological improvements in the surveys would be especially useful for public policy. The two study areas are: the definition of noise indexes and the assessment of noise impact. Improvements in the designs of surveys are recommended which would increase the validity and reliability of the noise indexes. Changes in interview questions and sample designs are proposed which would enable surveys to provide measures of noise impact which are directly relevant for public policy.

  15. Dialogue as a Basis for the Design of Environmental Pedagogies

    ERIC Educational Resources Information Center

    De Andrade, Daniel Fonseca; Sorrentino, Marcos

    2014-01-01

    Colonizing processes take many forms. Although they are generally related to the use of force, they may also happen through subtler means such as education, and subconsciously, whenever educational proposals are designed to suit a wide variety of contexts. This essay suggests that environmental pedagogies should be based on a dialogical mindset…

  16. Simulant Basis for the Standard High Solids Vessel Design

    SciTech Connect

    Peterson, Reid A.; Fiskum, Sandra K.; Suffield, Sarah R.; Daniel, Richard C.; Gauglitz, Phillip A.; Wells, Beric E.

    2016-09-01

    This document provides the requirements for a test simulant suitable for demonstrating the mixing requirements for the Single High Solids Vessel Design (SHSVD). This simulant has not been evaluated for other purposes such as gas retention and release or erosion. The objective of this work is to provide an underpinning for the simulant properties based on actual waste characterization.

  17. Dialogue as a Basis for the Design of Environmental Pedagogies

    ERIC Educational Resources Information Center

    De Andrade, Daniel Fonseca; Sorrentino, Marcos

    2014-01-01

    Colonizing processes take many forms. Although they are generally related to the use of force, they may also happen through subtler means such as education, and subconsciously, whenever educational proposals are designed to suit a wide variety of contexts. This essay suggests that environmental pedagogies should be based on a dialogical mindset…

  18. A BASIS FOR MODIFYING THE TANK 12 COMPOSITE SAMPLING DESIGN

    SciTech Connect

    Shine, G.

    2014-11-25

    The SRR sampling campaign to obtain residual solids material from the Savannah River Site (SRS) Tank Farm Tank 12 primary vessel resulted in obtaining appreciable material in all 6 planned source samples from the mound strata but only in 5 of the 6 planned source samples from the floor stratum. Consequently, the design of the compositing scheme presented in the Tank 12 Sampling and Analysis Plan, Pavletich (2014a), must be revised. Analytical Development of SRNL statistically evaluated the sampling uncertainty associated with using various compositing arrays and splitting one or more samples for compositing. The variance of the simple mean of composite sample concentrations is a reasonable standard to investigate the impact of the following sampling options. Composite Sample Design Option (a). Assign only 1 source sample from the floor stratum and 1 source sample from each of the mound strata to each of the composite samples. Each source sample contributes material to only 1 composite sample. Two source samples from the floor stratum would not be used. Composite Sample Design Option (b). Assign 2 source samples from the floor stratum and 1 source sample from each of the mound strata to each composite sample. This infers that one source sample from the floor must be used twice, with 2 composite samples sharing material from this particular source sample. All five source samples from the floor would be used. Composite Sample Design Option (c). Assign 3 source samples from the floor stratum and 1 source sample from each of the mound strata to each composite sample. This infers that several of the source samples from the floor stratum must be assigned to more than one composite sample. All 5 source samples from the floor would be used. Using fewer than 12 source samples will increase the sampling variability over that of the Basic Composite Sample Design, Pavletich (2013). Considering the impact to the variance of the simple mean of the composite sample concentrations

  19. 40 CFR 228.15 - Dumping sites designated on a final basis.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Dumping sites designated on a final basis. 228.15 Section 228.15 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) OCEAN DUMPING CRITERIA FOR THE MANAGEMENT OF DISPOSAL SITES FOR OCEAN DUMPING § 228.15 Dumping sites designated on a final basis. (a)(1) The...

  20. 46 CFR 177.310 - Satisfactory service as a design basis.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Satisfactory service as a design basis. 177.310 Section... (UNDER 100 GROSS TONS) CONSTRUCTION AND ARRANGEMENT Hull Structure § 177.310 Satisfactory service as a design basis. When scantlings for the hull, deckhouse, and frames of the vessel differ from...

  1. 46 CFR 177.310 - Satisfactory service as a design basis.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 7 2011-10-01 2011-10-01 false Satisfactory service as a design basis. 177.310 Section... (UNDER 100 GROSS TONS) CONSTRUCTION AND ARRANGEMENT Hull Structure § 177.310 Satisfactory service as a design basis. When scantlings for the hull, deckhouse, and frames of the vessel differ from those...

  2. 46 CFR 177.310 - Satisfactory service as a design basis.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 7 2014-10-01 2014-10-01 false Satisfactory service as a design basis. 177.310 Section... design basis. When scantlings for the hull, deckhouse, and frames of the vessel differ from those... scantlings and has been in satisfactory service insofar as structural adequacy is concerned for a period of...

  3. 46 CFR 177.310 - Satisfactory service as a design basis.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 7 2013-10-01 2013-10-01 false Satisfactory service as a design basis. 177.310 Section... design basis. When scantlings for the hull, deckhouse, and frames of the vessel differ from those... scantlings and has been in satisfactory service insofar as structural adequacy is concerned for a period of...

  4. Laser design basis for the National Ignition Facility

    SciTech Connect

    Hunt, J.T.; Manes, K.R.; Murray, J.R.; Renard, P.A.; Sawicki, R.; Trenholme, J.B.; Williams, W.

    1994-06-01

    Controlled nuclear fusion initiated by highly intense laser beams has been the subject of experiment for many years. The National Ignition Facility (NIF) represents the culmination of design efforts to provide a laser facility that will successfully demonstrate fusion ignition in the laboratory. In this so-called inertial confinement approach, energetic driver beams (laser, X-ray, or charged particle) heat the outer surface of a spherical capsule containing deuterium and tritium (DT) fuel. As the capsule surface explosively evaporates, reaction pressure compresses the DT fuel causing the central core of the fuel to reach extreme density and temperature. When the central temperature is high enough, DT fusion reactions occur. The energy released from these reactions further heats the compressed fuel, and fusion burn propagates outward through the colder regions of the capsule much more rapidly than the inertially confined capsule can expand. The resulting fusion reactions yield many times more energy than was absorbed from the driver beams.

  5. Laser design basis for the National Ignition Facility

    SciTech Connect

    Hunt, J.T.; Manes, K.R.; Murray, J.R.; Renard, P.A.; Sawicki, R.; Trenholme, J.B.; Williams, W.

    1994-11-01

    Controlled nuclear fusion initiated by highly intense laser beams has been the subject of experiment for many years. The National Ignition Facility (NIF) represents the culmination of design efforts to provide a laser facility that will successfully demonstrate fusion ignition in the laboratory. In this so-called inertial confinement approach, energetic driver beams (laser, X ray, or charged particle) heat the outer surface of a spherical capsule containing deuterium and tritium (DT) fuel. As the capsule surface explosively evaporates, reaction pressure compresses the DT fuel causing the central core of the fuel to reach extreme density and temperature. When the central temperature is high enough, DT fusion reactions occur. The energy released from these reactions further heats the compressed fuel, and fusion burn propagates outward through the colder regions of the capsule much more rapidly than the inertially confined capsule can expand. The resulting fusion reactions yield many times more energy than was absorbed from the driver beams.

  6. Breckinridge Project, initial effort. Report II. Breckinridge Project design basis

    SciTech Connect

    1982-01-01

    The Breckinridge Project is a pioneer endeavor involving the engineering, construction, and operation of a commercial facility that will convert 23,000 tons per day of run-of-mine, high-sulfur coal into 50,000 barrels per day of liquid hydrocarbons equivalent to those produced from crude oil. The Initial Effort, now complete, was executed under Cooperative Agreement No. DE-FC05-80OR20717 between the Department of Energy and the Participants, Ashland Synthetic Fuels, Inc., and Airco Energy Company, Inc. The Initial Effort produced a preliminary design, capital estimate, and economic analysis of the commercial plant, as well as a plan for the design, construction, and operation of that plant. The extensive and rigorous attention given to environmental, socioeconomic, safety, and health considerations is indicative of the high priority these issues will continue to receive throughout the life of the project. The Breckinridge Energy Company, a partnership of several major corporations, is being formed to finance, own, and manage the Breckinridge Project. Report II is intended for the reader who is primarily interested in less detailed discussion of the coal liquefaction process and Breckinridge facility than presented in the eleven volumes of Reports IV and V. The overview section describes the project goals and briefly introduces the coal liquefaction process. The report continues with a discussion of the history of the project and the H-COAL process from its concept to the proposed commercialization technology. The report describes the site, the Breckinridge Facility, and concludes with a summary of the eleven reports that contain the deliverable documentation of the Initial Effort or Development Phase of the project.

  7. A concise colorimetric and fluorimetric probe for sarin related threats designed via the "covalent-assembly" approach.

    PubMed

    Lei, Zuhai; Yang, Youjun

    2014-05-07

    A turn-on signal from zero background allows sensitive detection of a weak signal and is highly desired. The "covalent-assembly" probe design principle is powerful in this regard. Herein, we report an embodiment of this principle (NA570) for detection of Sarin related threats, based on a phenylogous Vilsmeier-Haack reaction. NA570 bears a concise molecular construct, exhibits a colorimetric and a fluorimetric signal, and has potential for real applications.

  8. Design of Multi-Parameter Steerable Functions Using Cascade Basis Reduction

    NASA Technical Reports Server (NTRS)

    Teo, P.; Hel-Or, Y.; Null, Cynthia H. (Technical Monitor)

    1996-01-01

    A new cascade basis reduction method of computing the optimal least-squares set of basis functions steering a given function is presented. The method combines the Lie group-theoretic and the singular value decomposition approaches in such a way that their respective strengths complement each other. Since the Lie group-theoretic approach is used, the set of basis and steering functions computed can be expressed analytically. Because the singular value decomposition method is used, this set of basis and steering functions is optimal in the least-squares sense. Furthermore, the computational complexity in designing basis functions for transformation groups with large numbers of parameters is significantly reduced. The efficiency of the cascade basis reduction method is demonstrated by designing a set of basis functions that steers a Gabor function under the four-parameter linear transformation group.

  9. Implications of the high-power microwave weapon threat in electronic system design

    NASA Astrophysics Data System (ADS)

    van Keuren, E.; Knighten, J.

    The current status of high-power microwave (HPM) weapon is discussed with particular attention given to threats, sources, and possible protective techniques. Due to the GHz band frequencies involved, HPM is capable of penetrating not only radio front ends, but also the most minute shielding penetrations throughout the equipment.

  10. An algorithm to design finite field multipliers using a self-dual normal basis

    NASA Technical Reports Server (NTRS)

    Wang, Charles C.

    1989-01-01

    The concept of using a self-dual normal basis to design the Massey-Omura finite-field multiplier is presented. An algorithm is given to locate a self-dual normal basis for GF(2m) for odd m. A method to construct the product function for designing the Massey-Omura multiplier is developed. It is shown that the construction of the product function based on a self-dual basis is simpler than that based on an arbitrary normal basis.

  11. Structural design and analysis of a mixer pump for beyond-design- basis load

    SciTech Connect

    Rezvani, M.A.; Strehlow, J.P.; Baliga, R.; Kok, S.B.

    1994-03-01

    This paper presents the results of the structural evaluation of a mixer pump for a postulated drop accident. The mixer pump will be installed in a double-shell tank at the Hanford Site, near Richland, Washington. This tank has a 1,000,000-gallon (3,785,000 liter) capacity and is used to store radioactive waste before final disposal. The beyond-design-basis load case presented here is a postmulated drop of the pump during installation or removal. It is assumed that the pump assembly might be dropped approximateely 140 ft (15 m) from a height at which the bottom of the pump assembly is slightly above the top of the access riser to the bottom of the tank. The acceptance criterion for this load case is that the pump assembly shall not penetrate the primary tank liner. To ensure the integrity of the liner, the kinetic energy (developed in the pump drop) must be absorbed by some means to limit the impact force on the tank dome and thereby keep the pump from contacting the bottom of the tank. The limited clearance near the mounting assembly warranted an innovative two-step design of the energy absorbing system to limit the impact force on the tank dome to an acceptable value. This innovative design incorporates two energy absorbers in a unique series arrangement, one with the pump assembly and tile other in the pump pit.

  12. Drain Tank Information for Developing Design Basis of the Preliminary Design - R00

    SciTech Connect

    Ferrada, Juan J

    2011-01-01

    Tokamak Cooling Water System (TCWS) drain tanks (DTs) serve two functions: normal operation and safety operation. Normal DTs are used for regular maintenance operations when draining is necessary. Safety DTs are used to receive the water leaked into the Vacuum Vessel (VV) after an in-vessel loss of cooling accident (LOCA) event. The preliminary design of the DTs shall be based on the information provided by this document. The capacity of the normal DTs is estimated based on the internal volume of in-vessel components [e.g., First Wall/Blanket (FW/BLK) and Divertor (DIV)], Neutral Beam Injector (NBI) components, and TCWS piping, heat exchangers, electric heaters, pump casing, pressurizers, and valves. Water volumes have been updated based on 2004 design information, changes adopted because of approved Project Change Requests (PCRs), and data verification by U.S. ITER. Two tanks will store water from normal draining operations of the FW/BLK and DIV Primary Heat Transfer Systems (PHTSs). One tank will store water from normal draining operations of the NBI PHTS. The capacity of the safety DTs is based on analysis of a design-basis accident:1 a large leak from in-vessel components. There are two safety DTs that will receive water from a VV LOCA event and drainage from the VV, as needed. In addition, there is one sump tank for the DIV that will be used for collecting drain water from the draining and drying processes and specifically for draining the DIV system as the DIV cassettes lines are at a lower elevation than the DT connection point. Information documented in this report must be refined and verified during the preliminary design of the DTs, and there are several aspects to be considered to complete the preliminary design. Input to these design considerations is discussed in this report and includes, but is not limited to, water inventory; operating procedures/maintenance; Failure Modes and Effects Analysis (FMEA); tank layout anddimensions, including design

  13. Drain Tank Information for Developing Design Basis of the Preliminary Design

    SciTech Connect

    Ferrada, Juan J

    2012-02-01

    Tokamak Cooling Water System (TCWS) drain tanks (DTs) serve two functions: normal operation and safety operation. Normal DTs are used for regular maintenance operations when draining is necessary. Safety DTs are used to receive the water leaked into the Vacuum Vessel (VV) after an in-vessel loss of coolant accident (LOCA) event. The preliminary design of the DTs shall be based on the information provided by this document. The capacity of the normal DTs is estimated based on the internal volume of in-vessel components [e.g., First Wall/Blanket (FW/BLK) and Divertor (DIV)]; Neutral Beam Injector (NBI) components; and TCWS piping, heat exchangers, electric heaters, pump casing, pressurizers, and valves. Water volumes have been updated based on 2004-design information, changes adopted because of approved Project Change Requests (PCRs), and data verification by US ITER and AREVA Federal Services, the US ITER A and E Company. Two tanks will store water from normal draining operations of the FW/BLK and DIV Primary Heat Transfer Systems (PHTSs). One tank will store water from normal draining operations of the NBI PHTS. The capacity of the safety DTs is based on analysis of a design basis accident: a large leak from in-vessel components. There are two safety DTs that will receive water from a VV LOCA event and drainage from the VV, as needed. In addition, there is one sump tank for the DIV that will be used for collecting drain water from the draining and drying processes and specifically for draining the DIV system as the DIV cassette lines are at a lower elevation than the DT connection point. Information documented in this report must be refined and verified during the preliminary design of the DTs, and there are several aspects to be considered to complete the preliminary design. Input to these design considerations is discussed in this report and includes, but is not limited to, water inventory; operating procedures/maintenance; Failure Modes and Effects Analysis (FMEA

  14. Threats to Validity in the Design and Conduct of Preclinical Efficacy Studies: A Systematic Review of Guidelines for In Vivo Animal Experiments

    PubMed Central

    Henderson, Valerie C.; Kimmelman, Jonathan; Fergusson, Dean; Grimshaw, Jeremy M.; Hackam, Dan G.

    2013-01-01

    Background The vast majority of medical interventions introduced into clinical development prove unsafe or ineffective. One prominent explanation for the dismal success rate is flawed preclinical research. We conducted a systematic review of preclinical research guidelines and organized recommendations according to the type of validity threat (internal, construct, or external) or programmatic research activity they primarily address. Methods and Findings We searched MEDLINE, Google Scholar, Google, and the EQUATOR Network website for all preclinical guideline documents published up to April 9, 2013 that addressed the design and conduct of in vivo animal experiments aimed at supporting clinical translation. To be eligible, documents had to provide guidance on the design or execution of preclinical animal experiments and represent the aggregated consensus of four or more investigators. Data from included guidelines were independently extracted by two individuals for discrete recommendations on the design and implementation of preclinical efficacy studies. These recommendations were then organized according to the type of validity threat they addressed. A total of 2,029 citations were identified through our search strategy. From these, we identified 26 guidelines that met our eligibility criteria—most of which were directed at neurological or cerebrovascular drug development. Together, these guidelines offered 55 different recommendations. Some of the most common recommendations included performance of a power calculation to determine sample size, randomized treatment allocation, and characterization of disease phenotype in the animal model prior to experimentation. Conclusions By identifying the most recurrent recommendations among preclinical guidelines, we provide a starting point for developing preclinical guidelines in other disease domains. We also provide a basis for the study and evaluation of preclinical research practice. Please see later in the article

  15. Threats to validity in the design and conduct of preclinical efficacy studies: a systematic review of guidelines for in vivo animal experiments.

    PubMed

    Henderson, Valerie C; Kimmelman, Jonathan; Fergusson, Dean; Grimshaw, Jeremy M; Hackam, Dan G

    2013-01-01

    The vast majority of medical interventions introduced into clinical development prove unsafe or ineffective. One prominent explanation for the dismal success rate is flawed preclinical research. We conducted a systematic review of preclinical research guidelines and organized recommendations according to the type of validity threat (internal, construct, or external) or programmatic research activity they primarily address. We searched MEDLINE, Google Scholar, Google, and the EQUATOR Network website for all preclinical guideline documents published up to April 9, 2013 that addressed the design and conduct of in vivo animal experiments aimed at supporting clinical translation. To be eligible, documents had to provide guidance on the design or execution of preclinical animal experiments and represent the aggregated consensus of four or more investigators. Data from included guidelines were independently extracted by two individuals for discrete recommendations on the design and implementation of preclinical efficacy studies. These recommendations were then organized according to the type of validity threat they addressed. A total of 2,029 citations were identified through our search strategy. From these, we identified 26 guidelines that met our eligibility criteria--most of which were directed at neurological or cerebrovascular drug development. Together, these guidelines offered 55 different recommendations. Some of the most common recommendations included performance of a power calculation to determine sample size, randomized treatment allocation, and characterization of disease phenotype in the animal model prior to experimentation. By identifying the most recurrent recommendations among preclinical guidelines, we provide a starting point for developing preclinical guidelines in other disease domains. We also provide a basis for the study and evaluation of preclinical research practice. Please see later in the article for the Editors' Summary.

  16. Operational Design and Convergent Threats: A Comparison Case Study of Plan Colombia and Afghanistan Aimed to Enhance the Fight Against Narcotic-Funded Insurgencies

    DTIC Science & Technology

    2012-05-17

    Monograph JUN 2011- MAY 2012 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Operational Design and Convergent Threats: A Comparison Case Study of...in the strength government that enforces the law , provides services, and uphold the social contract established by people and their government. The...Operational Design and Convergent Threats: A Comparison Case Study of Plan Colombia and Afghanistan Aimed to Enhance the Fight against Narcotic

  17. The Mixed Waste Management Facility. Design basis integrated operations plan (Title I design)

    SciTech Connect

    1994-12-01

    The Mixed Waste Management Facility (MWMF) will be a fully integrated, pilotscale facility for the demonstration of low-level, organic-matrix mixed waste treatment technologies. It will provide the bridge from bench-scale demonstrated technologies to the deployment and operation of full-scale treatment facilities. The MWMF is a key element in reducing the risk in deployment of effective and environmentally acceptable treatment processes for organic mixed-waste streams. The MWMF will provide the engineering test data, formal evaluation, and operating experience that will be required for these demonstration systems to become accepted by EPA and deployable in waste treatment facilities. The deployment will also demonstrate how to approach the permitting process with the regulatory agencies and how to operate and maintain the processes in a safe manner. This document describes, at a high level, how the facility will be designed and operated to achieve this mission. It frequently refers the reader to additional documentation that provides more detail in specific areas. Effective evaluation of a technology consists of a variety of informal and formal demonstrations involving individual technology systems or subsystems, integrated technology system combinations, or complete integrated treatment trains. Informal demonstrations will typically be used to gather general operating information and to establish a basis for development of formal demonstration plans. Formal demonstrations consist of a specific series of tests that are used to rigorously demonstrate the operation or performance of a specific system configuration.

  18. Diplomatic advantages and threats in global health program selection, design, delivery and implementation: development and application of the Kevany Riposte.

    PubMed

    Kevany, Sebastian

    2015-05-27

    Global health programs, as supported by organizations such as the Global Fund to Fight AIDS, Tuberculosis and Malaria and the President's Emergency Plan for AIDS Relief (PEPFAR), stand to make significant contributions to international medical outcomes. Traditional systems of monitoring and evaluation, however, fail to capture downstream, indirect, or collateral advantages (and threats) of intervention selection, design, and implementation from broader donor perspectives, including those of the diplomatic and foreign policy communities, which these programs also generate. This paper describes the development a new métier under which assessment systems designed to consider the diplomatic value of global health initiatives are described and applied based on previously-identified "Top Ten" criteria. The "Kevany Riposte" and the "K-Score" were conceptualized based on a retrospective and collective assessment of the author's participation in the design, implementation and delivery of a range of global health interventions related to the HIV/AIDS epidemic. Responses and associated scores reframe intervention worth or value in terms of global health diplomacy criteria such as "adaptability", "interdependence", "training," and "neutrality". Response options ranged from "highly advantageous" to "significant potential threat". Global health initiatives under review were found to generate significant advantages from the diplomatic perspective. These included (1) intervention visibility and associations with donor altruism and prestige, (2) development of international non-health collaborations and partnerships, (3) adaptability and responsiveness of service delivery to local needs, and (4) advancement of broader strategic goals of the international community. Corresponding threats included (1) an absence of formal training of project staff on broader political and international relations roles and responsibilities, (2) challenges to recipient cultural and religious practices

  19. Persistent threats to validity in single-group interrupted time series analysis with a cross over design.

    PubMed

    Linden, Ariel

    2017-04-01

    The basic single-group interrupted time series analysis (ITSA) design has been shown to be susceptible to the most common threat to validity-history-the possibility that some other event caused the observed effect in the time series. A single-group ITSA with a crossover design (in which the intervention is introduced and withdrawn 1 or more times) should be more robust. In this paper, we describe and empirically assess the susceptibility of this design to bias from history. Time series data from 2 natural experiments (the effect of multiple repeals and reinstatements of Louisiana's motorcycle helmet law on motorcycle fatalities and the association between the implementation and withdrawal of Gorbachev's antialcohol campaign with Russia's mortality crisis) are used to illustrate that history remains a threat to ITSA validity, even in a crossover design. Both empirical examples reveal that the single-group ITSA with a crossover design may be biased because of history. In the case of motorcycle fatalities, helmet laws appeared effective in reducing mortality (while repealing the law increased mortality), but when a control group was added, it was shown that this trend was similar in both groups. In the case of Gorbachev's antialcohol campaign, only when contrasting the results against those of a control group was the withdrawal of the campaign found to be the more likely culprit in explaining the Russian mortality crisis than the collapse of the Soviet Union. Even with a robust crossover design, single-group ITSA models remain susceptible to bias from history. Therefore, a comparable control group design should be included, whenever possible. © 2016 John Wiley & Sons, Ltd.

  20. Biggest Threats

    MedlinePlus

    ... specific CDC activities are tailored to meet the epidemiology of the infectious agent and to address any gaps in the ability to detect resistance and to protect against infections. On this Page Urgent Threats Serious Threats Concerning ...

  1. An algorithm to design finite field multipliers using a self-dual normal basis

    NASA Technical Reports Server (NTRS)

    Wang, C. C.

    1987-01-01

    Finite field multiplication is central in the implementation of some error-correcting coders. Massey and Omura have presented a revolutionary design for multiplication in a finite field. In their design, a normal base is utilized to represent the elements of the field. The concept of using a self-dual normal basis to design the Massey-Omura finite field multiplier is presented. Presented first is an algorithm to locate a self-dual normal basis for GF(2 sup m) for odd m. Then a method to construct the product function for designing the Massey-Omura multiplier is developed. It is shown that the construction of the product function base on a self-dual basis is simpler than that based on an arbitrary normal base.

  2. 77 FR 64564 - Implementation of Regulatory Guide 1.221 on Design-Basis Hurricane and Hurricane Missiles

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-22

    ... COMMISSION Implementation of Regulatory Guide 1.221 on Design-Basis Hurricane and Hurricane Missiles AGENCY....221 on Design-Basis Hurricane and Hurricane Missiles.'' The purpose of this ISG is to supplement the guidance regarding the application of Regulatory Guide 1.221, ``Design-Basis Hurricane and...

  3. 75 FR 54918 - Draft Regulatory Guide, DG-1247, “Design-Basis Hurricane and Hurricane Missiles for Nuclear Power...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-09

    ... COMMISSION Draft Regulatory Guide, DG-1247, ``Design-Basis Hurricane and Hurricane Missiles for Nuclear Power... issuance and availability of Draft Regulatory Guide (DG)--1247, ``Design-Basis Hurricane and Hurricane... permits and licenses. The draft regulatory guide (DG), entitled, ``Design-Basis Hurricane and...

  4. 78 FR 31614 - Implementation of Regulatory Guide 1.221 on Design-Basis Hurricane and Hurricane Missiles

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ....221 on Design-Basis Hurricane and Hurricane Missiles AGENCY: Nuclear Regulatory Commission. ACTION... guidance regarding the application of Regulatory Guide (RG) 1.221, ``Design-Basis Hurricane and Hurricane... ML13015A688 Interim Staff Guidance-024 on Implementation of Regulatory Guide 1.221 on Design-Basis...

  5. Design-Basis Flood Estimation for Site Characterization at Nuclear Power Plants in the United States of America

    SciTech Connect

    Prasad, Rajiv; Hibler, Lyle F.; Coleman, Andre M.; Ward, Duane L.

    2011-11-01

    The purpose of this document is to describe approaches and methods for estimation of the design-basis flood at nuclear power plant sites. Chapter 1 defines the design-basis flood and lists the U.S. Nuclear Regulatory Commission's (NRC) regulations that require estimation of the design-basis flood. For comparison, the design-basis flood estimation methods used by other Federal agencies are also described. A brief discussion of the recommendations of the International Atomic Energy Agency for estimation of the design-basis floods in its member States is also included.

  6. Reconfigurable Flight Control Design using a Robust Servo LQR and Radial Basis Function Neural Networks

    NASA Technical Reports Server (NTRS)

    Burken, John J.

    2005-01-01

    This viewgraph presentation reviews the use of a Robust Servo Linear Quadratic Regulator (LQR) and a Radial Basis Function (RBF) Neural Network in reconfigurable flight control designs in adaptation to a aircraft part failure. The method uses a robust LQR servomechanism design with model Reference adaptive control, and RBF neural networks. During the failure the LQR servomechanism behaved well, and using the neural networks improved the tracking.

  7. The power of simplification: Operator interface with the AP1000{sup R} during design-basis and beyond design-basis events

    SciTech Connect

    Williams, M. G.; Mouser, M. R.; Simon, J. B.

    2012-07-01

    The AP1000{sup R} plant is an 1100-MWe pressurized water reactor with passive safety features and extensive plant simplifications that enhance construction, operation, maintenance, safety and cost. The passive safety features are designed to function without safety-grade support systems such as component cooling water, service water, compressed air or HVAC. The AP1000 passive safety features achieve and maintain safe shutdown in case of a design-basis accident for 72 hours without need for operator action, meeting the expectations provided in the European Utility Requirements and the Utility Requirement Document for passive plants. Limited operator actions may be required to maintain safe conditions in the spent fuel pool (SFP) via passive means. This safety approach therefore minimizes the reliance on operator action for accident mitigation, and this paper examines the operator interaction with the Human-System Interface (HSI) as the severity of an accident increases from an anticipated transient to a design basis accident and finally, to a beyond-design-basis event. The AP1000 Control Room design provides an extremely effective environment for addressing the first 72 hours of design-basis events and transients, providing ease of information dissemination and minimal reliance upon operator actions. Symptom-based procedures including Emergency Operating Procedures (EOPs), Abnormal Operating Procedures (AOPs) and Alarm Response Procedures (ARPs) are used to mitigate design basis transients and accidents. Use of the Computerized Procedure System (CPS) aids the operators during mitigation of the event. The CPS provides cues and direction to the operators as the event progresses. If the event becomes progressively worse or lasts longer than 72 hours, and depending upon the nature of failures that may have occurred, minimal operator actions may be required outside of the control room in areas that have been designed to be accessible using components that have been

  8. Improving Department of Energy capabilities for Mitigating Beyond Design Basis Events

    SciTech Connect

    None, None

    2013-04-01

    The purpose of this Operating Experience (OE) document is to (1) provide results from U.S. Department of Energy (DOE), including the National Nuclear Security Administration, initiatives related to beyond design basis events (BDBEs), and (2) provide direction for enhancing capabilities for mitigating BDBEs at DOE sites

  9. NDARC-NASA Design and Analysis of Rotorcraft Theoretical Basis and Architecture

    NASA Technical Reports Server (NTRS)

    Johnson, Wayne

    2010-01-01

    The theoretical basis and architecture of the conceptual design tool NDARC (NASA Design and Analysis of Rotorcraft) are described. The principal tasks of NDARC are to design (or size) a rotorcraft to satisfy specified design conditions and missions, and then analyze the performance of the aircraft for a set of off-design missions and point operating conditions. The aircraft consists of a set of components, including fuselage, rotors, wings, tails, and propulsion. For each component, attributes such as performance, drag, and weight can be calculated. The aircraft attributes are obtained from the sum of the component attributes. NDARC provides a capability to model general rotorcraft configurations, and estimate the performance and attributes of advanced rotor concepts. The software has been implemented with low-fidelity models, typical of the conceptual design environment. Incorporation of higher-fidelity models will be possible, as the architecture of the code accommodates configuration flexibility, a hierarchy of models, and ultimately multidisciplinary design, analysis and optimization.

  10. Safeguards and security by design (SSBD) for the domestic threat - theft and sabotage

    SciTech Connect

    Demuth, Scott F; Mullen, Mark

    2011-10-05

    Safeguards by Design (SBD) is receiving significant interest with respect to international safeguards objectives. However, less attention has been focused on the equally important topic of domestic Safeguards and Security by Design (SSBD), which addresses requirements such as those of the Nuclear Regulatory Commission (NRC) in the United States. While international safeguards are concerned with detecting State diversion of nuclear material from peaceful to nuclear explosives purposes, domestic Material Protection, Control and Accounting measures (MPC&A) are focused on non-State theft and sabotage. The International Atomic Energy Agency (IAEA) has described the Safeguards by Design (SBD) concept as an approach in which 'international safeguards are fully integrated into the design process of a new nuclear facility from the initial planning through design, construction, operation, and decommissioning.' This same concept is equally applicable to SSBD for domestic requirements. The United States Department of Energy (DOE) has initiated a project through its Office of Nuclear Energy (NE) and more specifically its Fuel Cycle Research and Development (FCRD) program, to develop a domestic SSBD discipline and methodology in parallel with similar efforts sponsored by the DOE Next Generation Safeguards Initiative (NGSI) and the IAEA for international safeguards. This activity includes the participation of industry (through DOE-sponsored contracts) and DOE National Laboratories. This paper will identify the key domestic safeguards and security requirements (i.e. MC&A and physical protection) and explain how and why Safeguards and Security by Design (SSBD) is important and beneficial for the design of future US nuclear energy systems.

  11. Stereotype Threat.

    PubMed

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  12. Design, Development, and Innovation of an Interactive Multimedia Training Simulator for Responding to Air Transportation Bomb Threats

    NASA Technical Reports Server (NTRS)

    Chung, Christopher A.; Marwaha, Shweta

    2005-01-01

    This paper describes an interactive multimedia simulator for air transportation bomb threat training. The objective of this project is to improve the air transportation sector s capability to respond to bomb threats received by commercial airports and aircraft. The simulator provides realistic training on receiving and responding to a variety of bomb threats that might not otherwise be possible due to time, cost, or operational constraints. Validation analysis indicates that the use of the simulator resulted in statistically significant increases in individual ability to respond to these types of bomb threats.

  13. Current trends in pharmacy benefit designs: a threat to disease management in chronic complex diseases.

    PubMed

    Owens, Gary; Emons, Matthew F; Christian-Herman, Jennifer; Lawless, Grant

    2007-04-01

    With a focus on those patients who are candidates for treatment with biologic agents, we review the impact that current pharmacy benefit trends have on patients with chronic complex diseases and how they affect opportunities for disease management in this unique patient population. Dramatic increases in health care costs have led to a variety of strategies to manage cost. Many of these strategies either limit access to care or increase the patient's responsibility for choosing and paying for care, especially for medications. These strategies have a disproportionate impact on patients with chronic complex diseases, particularly those who require the use of biologic medications. A fundamental prerequisite of disease management has been coverage of disease-modifying therapies. If current pharmacy benefit trends continue, unintended consequences will likely occur including lost opportunities for disease management. Current pharmacy benefit trends could adversely impact disease management, particularly for patients requiring the use of biologic agents. Health plans should consider innovative benefit designs that reflect an appropriate level of cost sharing across all key stake-holders, ensuring appropriate access to needed therapies. Additional research is needed to clarify the value of newer approaches to therapies or benefit design changes.

  14. Comparison of CRBR design-basis events with those of foreign LMFBR plants

    SciTech Connect

    Agrawal, A.K.

    1983-04-01

    As part of the Construction Permit (CP) review of the Clinch River Breeder Reactor Plant (CRBR), the Brookhaven National Laboratory was asked to compare the Design Basis Accidents that are considered in CRBR Preliminary Safety Analysis Report with those of the foreign contemporary plants (PHENIX, SUPER-PHENIX, SNR-300, PFR, and MONJU). A brief introductory review of any special or unusual characteristics of these plants is given. This is followed by discussions of the design basis accidents and their acceptance criteria. In spite of some discrepancies due either to semantics or to licensing decisions, there appears to be a considerable degree of unanimity in the selection (definition) of DBAs in all of these plants.

  15. Ground motion following selection of SRS design basis earthquake and associated deterministic approach

    SciTech Connect

    Not Available

    1991-03-01

    This report summarizes the results of a deterministic assessment of earthquake ground motions at the Savannah River Site (SRS). The purpose of this study is to assist the Environmental Sciences Section of the Savannah River Laboratory in reevaluating the design basis earthquake (DBE) ground motion at SRS during approaches defined in Appendix A to 10 CFR Part 100. This work is in support of the Seismic Engineering Section's Seismic Qualification Program for reactor restart.

  16. Advanced Information Systems Design: Technical Basis and Human Factors Review Guidance

    DTIC Science & Technology

    2000-03-01

    H^ NUREG /CR-6633 BNL- NUREG -52563 Advanced Information Systems Design: Technical Basis and Human Factors Review Guidance Brookhaven National...AVAILABILITY NOTICE Availability of Reference Materials Cited in NRC Publications NRC publications in the NUREG series, NRC regu- lations, and Title...Information Service Springfield, VA 22161 -0002 <http://www.ntis.gov> 1 -800-553-6847 or locally 703-605-6000 The NUREG series comprises (1) brochures

  17. An Inventory Designed To Measure the Impact of the Threat of Nuclear War on Adolescents: Dimensions of Fear, Futurelessness, and Powerlessness.

    ERIC Educational Resources Information Center

    Hanley, C. Patricia; Christie, Daniel J.

    This document reports on the history of social and behavioral research studies concerning nuclear war since 1945, highlighting those studies that focused on adolescents and their feelings of fear, hopelessness, powerlessness, and denial. A study, designed to assess the reactions of adolescents in grades six to eight to the threat of nuclear war is…

  18. Characterisation of Liquefaction Effects for Beyond-Design Basis Safety Assessment of Nuclear Power Plants

    NASA Astrophysics Data System (ADS)

    Bán, Zoltán; Győri, Erzsébet; János Katona, Tamás; Tóth, László

    2015-04-01

    Preparedness of nuclear power plants to beyond design base external effects became high importance after 11th of March 2011 Great Tohoku Earthquakes. In case of some nuclear power plants constructed at the soft soil sites, liquefaction should be considered as a beyond design basis hazard. The consequences of liquefaction have to be analysed with the aim of definition of post-event plant condition, identification of plant vulnerabilities and planning the necessary measures for accident management. In the paper, the methodology of the analysis of liquefaction effects for nuclear power plants is outlined. The case of Nuclear Power Plant at Paks, Hungary is used as an example for demonstration of practical importance of the presented results and considerations. Contrary to the design, conservatism of the methodology for the evaluation of beyond design basis liquefaction effects for an operating plant has to be limited to a reasonable level. Consequently, applicability of all existing methods has to be considered for the best estimation. The adequacy and conclusiveness of the results is mainly limited by the epistemic uncertainty of the methods used for liquefaction hazard definition and definition of engineering parameters characterizing the consequences of liquefaction. The methods have to comply with controversial requirements. They have to be consistent and widely accepted and used in the practice. They have to be based on the comprehensive database. They have to provide basis for the evaluation of dominating engineering parameters that control the post-liquefaction response of the plant structures. Experience of Kashiwazaki-Kariwa plant hit by Niigata-ken Chuetsu-oki earthquake of 16 July 2007 and analysis of site conditions and plant layout at Paks plant have shown that the differential settlement is found to be the dominating effect in case considered. They have to be based on the probabilistic seismic hazard assessment and allow the integration into logic

  19. Reducing Uncertainty in the Seismic Design Basis for the Waste Treatment Plant, Hanford, Washington

    SciTech Connect

    Brouns, T.M.; Rohay, A.C.; Reidel, S.P.; Gardner, M.G.

    2007-07-01

    The seismic design basis for the Waste Treatment Plant (WTP) at the Department of Energy's (DOE) Hanford Site near Richland was re-evaluated in 2005, resulting in an increase by up to 40% in the seismic design basis. The original seismic design basis for the WTP was established in 1999 based on a probabilistic seismic hazard analysis completed in 1996. The 2005 analysis was performed to address questions raised by the Defense Nuclear Facilities Safety Board (DNFSB) about the assumptions used in developing the original seismic criteria and adequacy of the site geotechnical surveys. The updated seismic response analysis used existing and newly acquired seismic velocity data, statistical analysis, expert elicitation, and ground motion simulation to develop interim design ground motion response spectra which enveloped the remaining uncertainties. The uncertainties in these response spectra were enveloped at approximately the 84. percentile to produce conservative design spectra, which contributed significantly to the increase in the seismic design basis. A key uncertainty identified in the 2005 analysis was the velocity contrasts between the basalt flows and sedimentary interbeds below the WTP. The velocity structure of the upper four basalt flows (Saddle Mountains Basalt) and the inter-layered sedimentary interbeds (Ellensburg Formation) produces strong reductions in modeled earthquake ground motions propagating through them. Uncertainty in the strength of velocity contrasts between these basalts and interbeds primarily resulted from an absence of measured shear wave velocities (Vs) in the interbeds. For this study, Vs in the interbeds was estimated from older, limited compressional wave velocity (Vp) data using estimated ranges for the ratio of the two velocities (Vp/Vs) based on analogues in similar materials. A range of possible Vs for the interbeds and basalts was used and produced additional uncertainty in the resulting response spectra. Because of the

  20. Fission Product Appearance Rate Coefficients in Design Basis Source Term Determinations - Past and Present

    NASA Astrophysics Data System (ADS)

    Perez, Pedro B.; Hamawi, John N.

    2017-09-01

    Nuclear power plant radiation protection design features are based on radionuclide source terms derived from conservative assumptions that envelope expected operating experience. Two parameters that significantly affect the radionuclide concentrations in the source term are failed fuel fraction and effective fission product appearance rate coefficients. Failed fuel fraction may be a regulatory based assumption such as in the U.S. Appearance rate coefficients are not specified in regulatory requirements, but have been referenced to experimental data that is over 50 years old. No doubt the source terms are conservative as demonstrated by operating experience that has included failed fuel, but it may be too conservative leading to over-designed shielding for normal operations as an example. Design basis source term methodologies for normal operations had not advanced until EPRI published in 2015 an updated ANSI/ANS 18.1 source term basis document. Our paper revisits the fission product appearance rate coefficients as applied in the derivation source terms following the original U.S. NRC NUREG-0017 methodology. New coefficients have been calculated based on recent EPRI results which demonstrate the conservatism in nuclear power plant shielding design.

  1. Demonstrating Structural Adequacy of Nuclear Power Plant Containment Structures for Beyond Design-Basis Pressure Loadings

    SciTech Connect

    Braverman, J.I.; Morante, R.

    2010-07-18

    ABSTRACT Demonstrating the structural integrity of U.S. nuclear power plant (NPP) containment structures, for beyond design-basis internal pressure loadings, is necessary to satisfy Nuclear Regulatory Commission (NRC) requirements and performance goals. This paper discusses methods for demonstrating the structural adequacy of the containment for beyond design-basis pressure loadings. Three distinct evaluations are addressed: (1) estimating the ultimate pressure capacity of the containment structure (10 CFR 50 and US NRC Standard Review Plan, Section 3.8) ; (2) demonstrating the structural adequacy of the containment subjected to pressure loadings associated with combustible gas generation (10 CFR 52 and 10 CFR 50); and (3) demonstrating the containment structural integrity for severe accidents (10 CFR 52 as well as SECY 90-016, SECY 93-087, and related NRC staff requirements memoranda (SRMs)). The paper describes the technical basis for specific aspects of the methods presented. It also presents examples of past issues identified in licensing activities related to these evaluations.

  2. Breckinridge Project, initial effort. Report XI, Volume V. Critical review of the design basis. [Critical review

    SciTech Connect

    1982-01-01

    Report XI, Technical Audit, is a compendium of research material used during the Initial Effort in making engineering comparisons and decisions. Volumes 4 and 5 of Report XI present those studies which provide a Critical Review of the Design Basis. The Critical Review Report, prepared by Intercontinental Econergy Associates, Inc., summarizes findings from an extensive review of the data base for the H-Coal process design. Volume 4 presents this review and assessment, and includes supporting material; specifically, Design Data Tabulation (Appendix A), Process Flow Sheets (Appendix B), and References (Appendix C). Volume 5 is a continuation of the references of Appendix C. Studies of a proprietary nature are noted and referenced, but are not included in these volumes. They are included in the Limited Access versions of these reports and may be reviewed by properly cleared personnel in the offices of Ashland Synthetic Fuels, Inc.

  3. Heterogeneous minimal surface porous scaffold design using the distance field and radial basis functions.

    PubMed

    Yoo, Dongjin

    2012-06-01

    This paper presented an effective method for the 3D heterogeneous porous scaffold design of human tissue using triply periodic minimal surface (TPMS) internal pore architectures. First, an implicit solid representing the smooth 3D scalar field for the porosity distribution was reconstructed by interpolating the geometric positions of control points and porosity values defined at those points using an implicit interpolation algorithm based on the thin-plate radial basis function. After generating the implicit solid representing the smooth 3D scalar field for the porosity distribution, a functionally graded tissue scaffold with accurately controlled porosity distribution was designed using the TPMS-based unit cell libraries. Numerical results showed that the proposed scaffold design method has the potential benefits for accurately controlling the spatial porosity distribution within an arbitrarily shaped scaffold while keeping the advantage of the TPMS-based unit cell libraries.

  4. Breckinridge Project, initial effort. Report XI, Volume IV. Critical review of the design basis. [Critical review

    SciTech Connect

    1981-05-01

    Report XI, Technical Audit, is a compendium of research material used during the Initial Effort in making engineering comparisons and decisions. Volumes 4 and 5 of Report XI present those studies which provide a Critical Review of the Design Basis. The Critical Review Report, prepared by Intercontinental Econergy Associates, Inc., summarizes findings from an extensive review of the data base for the H-Coal process design. Volume 4 presents this review and assessment, and includes supporting material; specifically, Design Data Tabulation (Appendix A), Process Flow Sheets (Appendix B), and References (Appendix C). Volume 5 is a continuation of the references of Appendix C. Studies of a proprietary nature are noted and referenced, but are not included in these volumes. They are included in the Limited Access versions of these reports and may be reviewed by properly cleared personnel in the offices of Ashland Synthetic Fuels, Inc.

  5. Design of a Threat-Based Gunnery Performance Test: Issues and Procedures for Crew and Platoon Tank Gunnery

    DTIC Science & Technology

    1990-06-01

    the primary threat. The driver performs random evasive maneuvers while moving to the nearest covered concealed position. The gunner engages the enemy...The crew effectively avoids 1 2 3 4 5 NO anti-tank fires by evasive maneuver and/or the use of smoke. B-9 Crew CONTACT REPORTS Contact reports are...accurately reports threat by evasive maneuvers . data. ___-rew accurately reports location CONTACT REPORTS. (within 200 meters). Crew immediately reports

  6. Development of Probabilistic Design Basis Earthquake (DBE) Parameters for Moderate and High Hazard Facilities at INEEL

    SciTech Connect

    S. M. Payne; V. W. Gorman; S. A. Jensen; M. E. Nitzel; M. J. Russell; R. P. Smith

    2000-03-01

    Design Basis Earthquake (DBE) horizontal and vertical response spectra are developed for moderate and high hazard facilities or Performance Categories (PC) 3 and 4, respectively, at the Idaho National Engineering and Environmental Laboratory (INEEL). The probabilistic DBE response spectra will replace the deterministic DBE response spectra currently in the U.S. Department of Energy Idaho Operations Office (DOE-ID) Architectural Engineering Standards that govern seismic design criteria for several facility areas at the INEEL. Probabilistic DBE response spectra are recommended to DOE Naval Reactors for use at the Naval Reactor Facility at INEEL. The site-specific Uniform Hazard Spectra (UHS) developed by URS Greiner Woodward Clyde Federal Services are used as the basis for developing the DBE response spectra. In 1999, the UHS for all INEEL facility areas were recomputed using more appropriate attenuation relationships for the Basin and Range province. The revised UHS have lower ground motions than those produced in the 1996 INEEL site-wide probabilistic ground motion study. The DBE response spectra were developed by incorporating smoothed broadened regions of the peak accelerations, velocities, and displacements defined by the site-specific UHS. Portions of the DBE response spectra were adjusted to ensure conservatism for the structural design process.

  7. Structural basis for specific single-stranded RNA recognition by designer pentatricopeptide repeat proteins

    PubMed Central

    Shen, Cuicui; Zhang, Delin; Guan, Zeyuan; Liu, Yexing; Yang, Zhao; Yang, Yan; Wang, Xiang; Wang, Qiang; Zhang, QunXia; Fan, Shilong; Zou, Tingting; Yin, Ping

    2016-01-01

    As a large family of RNA-binding proteins, pentatricopeptide repeat (PPR) proteins mediate multiple aspects of RNA metabolism in eukaryotes. Binding to their target single-stranded RNAs (ssRNAs) in a modular and base-specific fashion, PPR proteins can serve as designable modules for gene manipulation. However, the structural basis for nucleotide-specific recognition by designer PPR (dPPR) proteins remains to be elucidated. Here, we report four crystal structures of dPPR proteins in complex with their respective ssRNA targets. The dPPR repeats are assembled into a right-handed superhelical spiral shell that embraces the ssRNA. Interactions between different PPR codes and RNA bases are observed at the atomic level, revealing the molecular basis for the modular and specific recognition patterns of the RNA bases U, C, A and G. These structures not only provide insights into the functional study of PPR proteins but also open a path towards the potential design of synthetic sequence-specific RNA-binding proteins. PMID:27088764

  8. Game Theoretic Evaluation of Threat Detection Problems-The Central Role of the Adversary

    SciTech Connect

    Heasler, Patrick G.; Wood, Thomas W.; Reichmuth, Barbara A.

    2007-01-01

    A wide variety of security problems hinge on the detection of threats and discrimination of threats from innocuous objects. The theory that frames these problems is common among medical diagnostics, radar and sonar imaging, and detection of radiological, chemical, and biological agents. In many of these problems, the nature of the threat is subject to control by a malicious adversary, and the choice of a reference (or "design basis") threat is a very diffcult, and often intractable, aspect of the problem. It is this class of problems that this report considers.

  9. Science, education and industry information resources complementarity as a basis for design of knowledge management systems

    NASA Astrophysics Data System (ADS)

    Maksimov, N. V.; Tikhomirov, G. V.; Golitsyna, O. L.

    2017-01-01

    The main problems and circumstances that influence the processes of creating effective knowledge management systems were described. These problems particularly include high species diversity of instruments for knowledge representation, lack of adequate lingware, including formal representation of semantic relationships. For semantic data descriptions development a conceptual model of the subject area and a conceptual-lexical system should be designed on proposals of ISO-15926 standard. It is proposed to conduct an information integration of educational and production processes on the basis of information systems technologies. Integrated knowledge management system information environment combines both traditional information resources and specific information resources of subject domain including task context and implicit/tacit knowledge.

  10. Adaptive critic autopilot design of bank-to-turn missiles using fuzzy basis function networks.

    PubMed

    Lin, Chuan-Kai

    2005-04-01

    A new adaptive critic autopilot design for bank-to-turn missiles is presented. In this paper, the architecture of adaptive critic learning scheme contains a fuzzy-basis-function-network based associative search element (ASE), which is employed to approximate nonlinear and complex functions of bank-to-turn missiles, and an adaptive critic element (ACE) generating the reinforcement signal to tune the associative search element. In the design of the adaptive critic autopilot, the control law receives signals from a fixed gain controller, an ASE and an adaptive robust element, which can eliminate approximation errors and disturbances. Traditional adaptive critic reinforcement learning is the problem faced by an agent that must learn behavior through trial-and-error interactions with a dynamic environment, however, the proposed tuning algorithm can significantly shorten the learning time by online tuning all parameters of fuzzy basis functions and weights of ASE and ACE. Moreover, the weight updating law derived from the Lyapunov stability theory is capable of guaranteeing both tracking performance and stability. Computer simulation results confirm the effectiveness of the proposed adaptive critic autopilot.

  11. Design of chemical space networks on the basis of Tversky similarity

    NASA Astrophysics Data System (ADS)

    Wu, Mengjun; Vogt, Martin; Maggiora, Gerald M.; Bajorath, Jürgen

    2016-01-01

    Chemical space networks (CSNs) have been introduced as a coordinate-free representation of chemical space. In CSNs, nodes represent compounds and edges pairwise similarity relationships. These network representations are mostly used to navigate sections of biologically relevant chemical space. Different types of CSNs have been designed on the basis of alternative similarity measures including continuous numerical similarity values or substructure-based similarity criteria. CSNs can be characterized and compared on the basis of statistical concepts from network science. Herein, a new CSN design is introduced that is based upon asymmetric similarity assessment using the Tversky coefficient and termed TV-CSN. Compared to other CSNs, TV-CSNs have unique features. While CSNs typically contain separate compound communities and exhibit small world character, many TV-CSNs are also scale-free in nature and contain hubs, i.e., extensively connected central compounds. Compared to other CSNs, these hubs are a characteristic of TV-CSN topology. Hub-containing compound communities are of particular interest for the exploration of structure-activity relationships.

  12. Design of chemical space networks on the basis of Tversky similarity.

    PubMed

    Wu, Mengjun; Vogt, Martin; Maggiora, Gerald M; Bajorath, Jürgen

    2016-01-01

    Chemical space networks (CSNs) have been introduced as a coordinate-free representation of chemical space. In CSNs, nodes represent compounds and edges pairwise similarity relationships. These network representations are mostly used to navigate sections of biologically relevant chemical space. Different types of CSNs have been designed on the basis of alternative similarity measures including continuous numerical similarity values or substructure-based similarity criteria. CSNs can be characterized and compared on the basis of statistical concepts from network science. Herein, a new CSN design is introduced that is based upon asymmetric similarity assessment using the Tversky coefficient and termed TV-CSN. Compared to other CSNs, TV-CSNs have unique features. While CSNs typically contain separate compound communities and exhibit small world character, many TV-CSNs are also scale-free in nature and contain hubs, i.e., extensively connected central compounds. Compared to other CSNs, these hubs are a characteristic of TV-CSN topology. Hub-containing compound communities are of particular interest for the exploration of structure-activity relationships.

  13. Laser Threat Analysis System (LTAS)

    NASA Astrophysics Data System (ADS)

    Pfaltz, John M.; Richardson, Christina E.; Ruiz, Abel; Barsalou, Norman; Thomas, Robert J.

    2002-11-01

    LTAS is a totally integrated modeling and simulation environment designed for the purpose of ascertaining the susceptibility of Air Force pilots and air crews to optical radiation threats. Using LTAS, mission planners can assess the operational impact of optically directed energy weapons and countermeasures. Through various scenarios, threat analysts are able to determine the capability of laser threats and their impact on operational missions including the air crew's ability to complete their mission effectively. Additionally, LTAS allows the risk of laser use on training ranges and the requirement for laser protection to be evaluated. LTAS gives mission planners and threat analysts complete control of the threat environment including threat parameter control and placement, terrain mapping (line-of-site), atmospheric conditions, and laser eye protection (LEP) selection. This report summarizes the design of the final version of LTAS, and the modeling methodologies implemented to accomplish analysis.

  14. Technical Basis for Certification of Seismic Design Criteria for the Waste Treatment Plant, Hanford, Washington

    SciTech Connect

    Brouns, Thomas M.; Rohay, Alan C.; Youngs, Robert R.; Costantino, Carl J.; Miller, Lewis F.

    2008-02-28

    In August 2007, Secretary of Energy Samuel W. Bodman approved the final seismic and ground motion criteria for the Waste Treatment and Immobilization Plant (WTP) at the Department of Energy’s (DOE) Hanford Site. Construction of the WTP began in 2002 based on seismic design criteria established in 1999 and a probabilistic seismic hazard analysis completed in 1996. The design criteria were re-evaluated in 2005 to address questions from the Defense Nuclear Facilities Safety Board (DNFSB), resulting in an increase by up to 40% in the seismic design basis. DOE announced in 2006 the suspension of construction on the pretreatment and high-level waste vitrification facilities within the WTP to validate the design with more stringent seismic criteria. In 2007, the U.S. Congress mandated that the Secretary of Energy certify the final seismic and ground motion criteria prior to expenditure of funds on construction of these two facilities. With the Secretary’s approval of the final seismic criteria this past summer, DOE authorized restart of construction of the pretreatment and high-level waste vitrification facilities.

  15. Design and realization of functional metamaterial basis structures through optical phase manipulation based interference lithography

    NASA Astrophysics Data System (ADS)

    Behera, Saraswati; Joseph, Joby

    2017-10-01

    Functional metamaterials are of interest to research due to their exotic response to electromagnetic field, leading to interesting properties and wide applications that are unachievable in nature. Most of the study in this field is limited to theory and currently there are certain multi-step experimental studies reported. However, there is not much exploration of an interference lithography technique that is rapid and cost effective to realize such structures over a large area and in bulk (3D) for real world applications. We present the design of 2D and 3D periodic functional metamaterial basis structures arranged in a square and hexagonal lattice using the interference of multiple phase manipulated plane beams. The designed structures are realized in a single step using a phase only spatial light modulator (SLM) assisted Fourier filtering experimental setup in a few seconds. The phase and amplitude of the individual interfering beams are manipulated computationally using MATLAB to generate an irradiance profile for metamaterial structures of different basis features and orientations. The designed structures are: a linearly packed rectangular array, a hexagonally packed rectangular array, ta riangular lattice array, a star, U, V, C, dual-symmetric and dual-asymmetric shaped structures. Three dimensional stacks of such structures can also be realized involving an axial beam into the plane of interference. Templates of some of the microstructures are realized on a positive photoresist that have a spatial periodicity of 6.5 μm. The transfer of the realized patterns to a suitable metallodielectric medium may find interesting applications reported so far in the literature or may lead to some interesting applications.

  16. Threat processing: models and mechanisms.

    PubMed

    Bentz, Dorothée; Schiller, Daniela

    2015-01-01

    The experience of fear is closely linked to the survival of species. Fear can be conceptualized as a brain state that orchestrates defense reactions to threats. To avoid harm, an organism must be equipped with neural circuits that allow learning, detecting, and rapidly responding to threats. Past experience with threat can transform neutral stimuli present at the time of experience into learned threat-related stimuli via associative learning. Pavlovian threat conditioning is the central experimental paradigm to study associative learning. Once learned, these stimulus-response associations are not always expressed depending on context or new experiences with the conditioned stimuli. Neural circuits mediating threat learning have the inherent plasticity to adapt to changing environmental threats. Encounters devoid of danger pave the way for extinction or reconsolidation to occur. Extinction and reconsolidation can both lead to changes in the expression of threat-induced defense responses, but differ in stability and have a different neural basis. This review presents the behavioral models and the system-level neural mechanisms in animals and humans of threat learning and modulation.

  17. Post Test Analysis of a PCCV Model Dynamically Tested Under Simulated Design-Basis Earthquakes

    SciTech Connect

    Cherry, J.; Chokshi, N.; James, R.J.; Rashid, Y.R.; Tsurumaki, S.; Zhang, L.

    1998-11-09

    In a collaborative program between the United States Nuclear Regulatory Commission (USNRC) and the Nuclear Power Engineering Corporation (NUPEC) of Japan under sponsorship of the Ministry of International Trade and Ihdustry, the seismic behavior of Prestressed Concrete Containment Vessels (PCCV) is being investigated. A 1:10 scale PCCV model has been constructed by NUPEC and subjected to seismic simulation tests using the high performance shaking table at the Tadotsu Engineering Laboratory. A primary objective of the testing program is to demonstrate the capability of the PCCV to withstand design basis earthquakes with a significant safety margin against major damage or failure. As part of the collaborative program, Sandia National Laboratories (SNL) is conducting research in state-of-the-art analytical methods for predicting the seismic behavior of PCCV structures, with the eventual goal of understanding, validating, and improving calculations dated to containment structure performance under design and severe seismic events. With the increased emphasis on risk-informed- regulatory focus, more accurate ch&@erization (less uncertainty) of containment structural and functional integri~ is desirable. This paper presents results of post-test calculations conducted at ANATECH to simulate the design level scale model tests.

  18. Design Methodology of a New Wavelet Basis Function for Fetal Phonocardiographic Signals

    PubMed Central

    Chourasia, Vijay S.; Tiwari, Anil Kumar

    2013-01-01

    Fetal phonocardiography (fPCG) based antenatal care system is economical and has a potential to use for long-term monitoring due to noninvasive nature of the system. The main limitation of this technique is that noise gets superimposed on the useful signal during its acquisition and transmission. Conventional filtering may result into loss of valuable diagnostic information from these signals. This calls for a robust, versatile, and adaptable denoising method applicable in different operative circumstances. In this work, a novel algorithm based on wavelet transform has been developed for denoising of fPCG signals. Successful implementation of wavelet theory in denoising is heavily dependent on selection of suitable wavelet basis function. This work introduces a new mother wavelet basis function for denoising of fPCG signals. The performance of newly developed wavelet is found to be better when compared with the existing wavelets. For this purpose, a two-channel filter bank, based on characteristics of fPCG signal, is designed. The resultant denoised fPCG signals retain the important diagnostic information contained in the original fPCG signal. PMID:23766693

  19. Safety Design Requirements for Active Hazard Mitigation Device (AHMD) Employed to Address Fast and Slow Cook-off Thermal Threats

    DTIC Science & Technology

    2014-12-18

    Hazard Mitigation Device (AHMD) Employed to Address Fast and Slow Cook -off Thermal Threats 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM...environments. 15. SUBJECT TERMS Active Hazard Mitigation Device insensitive munitions fast cook -off slow... cook -off 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF PAGES 14 19a. NAME

  20. Criteria for calculating the efficiency of HEPA filters during and after design basis accidents

    SciTech Connect

    Bergman, W.; First, M.W.; Anderson, W.L.; Gilbert, H.; Jacox, J.W.

    1994-12-01

    We have reviewed the literature on the performance of high efficiency particulate air (HEPA) filters under normal and abnormal conditions to establish criteria for calculating the efficiency of HEPA filters in a DOE nonreactor nuclear facility during and after a Design Basis Accident (DBA). The literature review included the performance of new filters and parameters that may cause deterioration in the filter performance such as filter age, radiation, corrosive chemicals, seismic and rough handling, high temperature, moisture, particle clogging, high air flow and pressure pulses. The deterioration of the filter efficiency depends on the exposure parameters; in severe exposure conditions the filter will be structurally damaged and have a residual efficiency of 0%. Despite the many studies on HEPA filter performance under adverse conditions, there are large gaps and limitations in the data that introduce significant error in the estimates of HEPA filter efficiencies under DBA conditions. Because of this limitation, conservative values of filter efficiency were chosen when there was insufficient data.

  1. Maximal design basis accident of fusion neutron source DEMO-TIN

    NASA Astrophysics Data System (ADS)

    Kolbasov, B. N.

    2015-12-01

    When analyzing the safety of nuclear (including fusion) facilities, the maximal design basis accident at which the largest release of activity is expected must certainly be considered. Such an accident is usually the failure of cooling systems of the most thermally stressed components of a reactor (for a fusion facility, it is the divertor or the first wall). The analysis of safety of the ITER reactor and fusion power facilities (including hybrid fission-fusion facilities) shows that the initial event of such a design basis accident is a large-scale break of a pipe in the cooling system of divertor or the first wall outside the vacuum vessel of the facility. The greatest concern is caused by the possibility of hydrogen formation and the inrush of air into the vacuum chamber (VC) with the formation of a detonating mixture and a subsequent detonation explosion. To prevent such an explosion, the emergency forced termination of the fusion reaction, the mounting of shutoff valves in the cooling systems of the divertor and the first wall or blanket for reducing to a minimum the amount of water and air rushing into the VC, the injection of nitrogen or inert gas into the VC for decreasing the hydrogen and oxygen concentration, and other measures are recommended. Owing to a continuous feed-out of the molten-salt fuel mixture from the DEMO-TIN blanket with the removal period of 10 days, the radioactivity release at the accident will mainly be determined by tritium (up to 360 PBq). The activity of fission products in the facility will be up to 50 PBq.

  2. Maximal design basis accident of fusion neutron source DEMO-TIN

    SciTech Connect

    Kolbasov, B. N.

    2015-12-15

    When analyzing the safety of nuclear (including fusion) facilities, the maximal design basis accident at which the largest release of activity is expected must certainly be considered. Such an accident is usually the failure of cooling systems of the most thermally stressed components of a reactor (for a fusion facility, it is the divertor or the first wall). The analysis of safety of the ITER reactor and fusion power facilities (including hybrid fission–fusion facilities) shows that the initial event of such a design basis accident is a large-scale break of a pipe in the cooling system of divertor or the first wall outside the vacuum vessel of the facility. The greatest concern is caused by the possibility of hydrogen formation and the inrush of air into the vacuum chamber (VC) with the formation of a detonating mixture and a subsequent detonation explosion. To prevent such an explosion, the emergency forced termination of the fusion reaction, the mounting of shutoff valves in the cooling systems of the divertor and the first wall or blanket for reducing to a minimum the amount of water and air rushing into the VC, the injection of nitrogen or inert gas into the VC for decreasing the hydrogen and oxygen concentration, and other measures are recommended. Owing to a continuous feed-out of the molten-salt fuel mixture from the DEMO-TIN blanket with the removal period of 10 days, the radioactivity release at the accident will mainly be determined by tritium (up to 360 PBq). The activity of fission products in the facility will be up to 50 PBq.

  3. Threat expert system technology advisor

    NASA Technical Reports Server (NTRS)

    Kurrasch, E. R.; Tripp, L. R.

    1987-01-01

    A prototype expert system was developed to determine the feasibility of using expert system technology to enhance the performance and survivability of helicopter pilots in a combat threat environment while flying NOE (Nap of the Earth) missions. The basis for the concept is the potential of using an Expert System Advisor to reduce the extreme overloading of the pilot who flies NOE mission below treetop level at approximately 40 knots while performing several other functions. The ultimate goal is to develop a Threat Expert System Advisor which provides threat information and advice that are better than even a highly experienced copilot. The results clearly show that the NOE pilot needs all the help in decision aiding and threat situation awareness that he can get. It clearly shows that heuristics are important and that an expert system for combat NOE helicopter missions can be of great help to the pilot in complex threat situations and in making decisions.

  4. Application of the MELCOR code to design basis PWR large dry containment analysis.

    SciTech Connect

    Phillips, Jesse; Notafrancesco, Allen; Tills, Jack Lee

    2009-05-01

    The MELCOR computer code has been developed by Sandia National Laboratories under USNRC sponsorship to provide capability for independently auditing analyses submitted by reactor manufactures and utilities. MELCOR is a fully integrated code (encompassing the reactor coolant system and the containment building) that models the progression of postulated accidents in light water reactor power plants. To assess the adequacy of containment thermal-hydraulic modeling incorporated in the MELCOR code for application to PWR large dry containments, several selected demonstration designs were analyzed. This report documents MELCOR code demonstration calculations performed for postulated design basis accident (DBA) analysis (LOCA and MSLB) inside containment, which are compared to other code results. The key processes when analyzing the containment loads inside PWR large dry containments are (1) expansion and transport of high mass/energy releases, (2) heat and mass transfer to structural passive heat sinks, and (3) containment pressure reduction due to engineered safety features. A code-to-code benchmarking for DBA events showed that MELCOR predictions of maximum containment loads were equivalent to similar predictions using a qualified containment code known as CONTAIN. This equivalency was found to apply for both single- and multi-cell containment models.

  5. Design and utilisation of protocols to characterise dynamic PET uptake of two tracers using basis pursuit

    NASA Astrophysics Data System (ADS)

    Bell, Christopher; Puttick, Simon; Rose, Stephen; Smith, Jye; Thomas, Paul; Dowson, Nicholas

    2017-06-01

    Imaging using more than one biological process using PET could be of great utility, but despite previously proposed approaches to dual-tracer imaging, it is seldom performed. The alternative of performing multiple scans is often infeasible for clinical practice or even in research studies. Dual-tracer PET scanning allows for multiple PET radiotracers to be imaged within the same imaging session. In this paper we describe our approach to utilise the basis pursuit method to aid in the design of dual-tracer PET imaging experiments, and later in separation of the signals. The advantage of this approach is that it does not require a compartment model architecture to be specified or even that both signals are distinguishable in all cases. This means the method for separating dual-tracer signals can be used for many feasible and useful combinations of biology or radiotracer, once an appropriate scanning protocol has been decided upon. Following a demonstration in separating the signals from two consecutively injected radionuclides in a controlled experiment, phantom and list-mode mouse experiments demonstrated the ability to test the feasibility of dual-tracer imaging protocols for multiple injection delays. Increases in variances predicted for kinetic macro-parameters V D and K I in brain and tumoral tissue were obtained when separating the synthetically combined data. These experiments confirmed previous work using other approaches that injections delays of 10-20 min ensured increases in variance were kept minimal for the test tracers used. On this basis, an actual dual-tracer experiment using a 20 min delay was performed using these radio tracers, with the kinetic parameters (V D and K I) extracted for each tracer in agreement with the literature. This study supports previous work that dual-tracer PET imaging can be accomplished provided certain constraints are adhered to. The utilisation of basis pursuit techniques, with its removed need to specify a model

  6. Design and utilisation of protocols to characterise dynamic PET uptake of two tracers using basis pursuit.

    PubMed

    Bell, Christopher Michael; Puttick, Simon; Rose, Stephen; Smith, Jye; Thomas, Paul; Dowson, Nicholas

    2017-04-04

    Imaging using more than one biological process using PET could be of great utility, but despite previously proposed approaches to dual-tracer imaging, it is seldom performed. The alternative of performing multiple scans is often infeasible for clinical practice or even in research studies. Dual-tracer PET scanning allows for multiple PET radiotracers to be imaged within the same imaging session. In this paper we describe our approach to utilise the basis pursuit method to aid in the R2.9 design of dual-tracer PET imaging experiments, and later in separation of the signals. The advantage of this approach is that it does not require a compartment model architecture to be specified or even that both signals are distinguishable in all cases. This means the R2.16 method for separating dual-tracer signals can be used for many feasible and useful combinations of biology or radiotracer, once an appropriate scanning protocol has been decided upon. Following a demonstration in separating the signals from two consecutively injected radionuclides in a controlled experiment, phantom and list-mode mouse experiments demonstrated the ability to test the R2.13feasibility of dual-tracer imaging protocols for multiple injection delays. Increases in variances predicted for kinetic macro-parameters VD and KI in brain and tumoral tissue were obtained when R2.14 separating the synthetically combined data. R2.2 These experiments confirmed previous work using other approaches that injections delays of 10-20 minutes ensured increases in variance were kept minimal for the test tracers used. On this basis, an actual dual-tracer experiment using a 20-minute delay was performed using these radio tracers, with the kinetic parameters (VD and KI) extracted for each tracer in agreement with the literature. This R2.4, 2.8 study supports previous work that dual-tracer PET imaging can be accomplished provided certain constraints are adhered to. The utilisation of basis pursuit techniques, with its

  7. Categorizing threat : building and using a generic threat matrix.

    SciTech Connect

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  8. SRS BEDROCK PROBABILISTIC SEISMIC HAZARD ANALYSIS (PSHA) DESIGN BASIS JUSTIFICATION (U)

    SciTech Connect

    , R

    2005-12-14

    This represents an assessment of the available Savannah River Site (SRS) hard-rock probabilistic seismic hazard assessments (PSHAs), including PSHAs recently completed, for incorporation in the SRS seismic hazard update. The prior assessment of the SRS seismic design basis (WSRC, 1997) incorporated the results from two PSHAs that were published in 1988 and 1993. Because of the vintage of these studies, an assessment is necessary to establish the value of these PSHAs considering more recently collected data affecting seismic hazards and the availability of more recent PSHAs. This task is consistent with the Department of Energy (DOE) order, DOE O 420.1B and DOE guidance document DOE G 420.1-2. Following DOE guidance, the National Map Hazard was reviewed and incorporated in this assessment. In addition to the National Map hazard, alternative ground motion attenuation models (GMAMs) are used with the National Map source model to produce alternate hazard assessments for the SRS. These hazard assessments are the basis for the updated hard-rock hazard recommendation made in this report. The development and comparison of hazard based on the National Map models and PSHAs completed using alternate GMAMs provides increased confidence in this hazard recommendation. The alternate GMAMs are the EPRI (2004), USGS (2002) and a regional specific model (Silva et al., 2004). Weights of 0.6, 0.3 and 0.1 are recommended for EPRI (2004), USGS (2002) and Silva et al. (2004) respectively. This weighting gives cluster weights of .39, .29, .15, .17 for the 1-corner, 2-corner, hybrid, and Greens-function models, respectively. This assessment is judged to be conservative as compared to WSRC (1997) and incorporates the range of prevailing expert opinion pertinent to the development of seismic hazard at the SRS. The corresponding SRS hard-rock uniform hazard spectra are greater than the design spectra developed in WSRC (1997) that were based on the LLNL (1993) and EPRI (1988) PSHAs. The

  9. Simulation of a beyond design-basis-accident with RELAP5/MOD3.1

    SciTech Connect

    Banati, J.

    1995-09-01

    This paper summarizes the results of analyses, parametric and sensitivity studies, performed using the RELAP5/MOD3.1 computer code for the 4th IAEA Standard Problem Exercise (SPE-4). The test, conducted on the PMK-2 facility in Budapest, involved simulation of a Small Break Loss Of Coolant Accident (SBLOCA) with a 7.4% break in the cold leg of a VVER-440 type pressurized water reactor. According to the scenario, the unavailability of the high pressure injection system led to a beyond design basis accident. For prevention of core damage, secondary side bleed-and-feed accident management measures were applied. A brief description of the PMK-2 integral type test facility is presented, together with the profile and some key phenomenological aspects of this particular experiment. Emphasis is placed on the ability of the code to predict the main trends observed in the test and thus, an assessment is given for the code capabilities to represent the system transient.

  10. On the structural basis and design guidelines for type II topoisomerase-targeting anticancer drugs

    PubMed Central

    Wu, Chyuan-Chuan; Li, Yi-Ching; Wang, Ying-Ren; Li, Tsai-Kun; Chan, Nei-Li

    2013-01-01

    Type II topoisomerases (Top2s) alter DNA topology via the formation of an enzyme–DNA adduct termed cleavage complex, which harbors a transient double-strand break in one DNA to allow the passage of another. Agents targeting human Top2s are clinically active anticancer drugs whose trapping of Top2-mediated DNA breakage effectively induces genome fragmentation and cell death. To understand the structural basis of this drug action, we previously determined the structure of human Top2 β-isoform forming a cleavage complex with the drug etoposide and DNA, and described the insertion of drug into DNA cleavage site and drug-induced decoupling of catalytic groups. By developing a post-crystallization drug replacement procedure that simplifies structural characterization of drug-stabilized cleavage complexes, we have extended the analysis toward other structurally distinct drugs, m-AMSA and mitoxantrone. Besides the expected drug intercalation, a switch in ribose puckering in the 3′-nucleotide of the cleavage site was robustly observed in the new structures, representing a new mechanism for trapping the Top2 cleavage complex. Analysis of drug-binding modes and the conformational landscapes of the drug-binding pockets provide rationalization of the drugs’ structural-activity relationships and explain why Top2 mutants exhibit differential effects toward each drug. Drug design guidelines were proposed to facilitate the development of isoform-specific Top2-targeting anticancer agents. PMID:24038465

  11. On the structural basis and design guidelines for type II topoisomerase-targeting anticancer drugs.

    PubMed

    Wu, Chyuan-Chuan; Li, Yi-Ching; Wang, Ying-Ren; Li, Tsai-Kun; Chan, Nei-Li

    2013-12-01

    Type II topoisomerases (Top2s) alter DNA topology via the formation of an enzyme-DNA adduct termed cleavage complex, which harbors a transient double-strand break in one DNA to allow the passage of another. Agents targeting human Top2s are clinically active anticancer drugs whose trapping of Top2-mediated DNA breakage effectively induces genome fragmentation and cell death. To understand the structural basis of this drug action, we previously determined the structure of human Top2 β-isoform forming a cleavage complex with the drug etoposide and DNA, and described the insertion of drug into DNA cleavage site and drug-induced decoupling of catalytic groups. By developing a post-crystallization drug replacement procedure that simplifies structural characterization of drug-stabilized cleavage complexes, we have extended the analysis toward other structurally distinct drugs, m-AMSA and mitoxantrone. Besides the expected drug intercalation, a switch in ribose puckering in the 3'-nucleotide of the cleavage site was robustly observed in the new structures, representing a new mechanism for trapping the Top2 cleavage complex. Analysis of drug-binding modes and the conformational landscapes of the drug-binding pockets provide rationalization of the drugs' structural-activity relationships and explain why Top2 mutants exhibit differential effects toward each drug. Drug design guidelines were proposed to facilitate the development of isoform-specific Top2-targeting anticancer agents.

  12. Performance of Metal and Polymeric O-Ring Seals during Beyond-Design-Basis Thermal Conditions.

    PubMed

    Yang, Jiann C; Hnetkovsky, Edward; Rinehart, Doris; Fernandez, Marco; Gonzalez, Felix; Borowsky, Joseph

    2017-04-01

    This paper summarizes the small scale thermal exposure test results of the performance of metallic and polymeric O-ring seals typically used in radioactive material transportation packages. Five different O-ring materials were evaluated: Inconel/silver, ethylene-propylene diene monomer (EPDM), polytetrafluoroethylene (PTFE), silicone, butyl, and Viton. The overall objective of this study is to provide test data and insights to the performance of these Oring seals when exposed to beyond-design-basis temperature conditions due to a severe fire. Tests were conducted using a small-scale stainless steel pressure vessel pressurized with helium to 2 bar or 5 bar at room temperature. The vessel was then heated in an electric furnace to temperatures up to 900 °C for a pre-determined period (typically 8 h to 9 h). The pressure drop technique was used to determine if leakage occurred during thermal exposure. Out of a total of 46 tests performed, leakage (loss of vessel pressure) was detected in 13 tests.

  13. A designed chimeric cyanovirin-N homolog lectin: structure and molecular basis of sucrose binding.

    PubMed

    Koharudin, Leonardus M I; Furey, William; Gronenborn, Angela M

    2009-12-01

    The NMR and X-ray structures of a designed chimeric cyanovirin-N homolog (CVNH) protein were determined. The individual halves of the structure are similar to their counterparts in the parent proteins, with domains A and B resembling the structures of TbCVNH and NcCVNH, respectively. No significant differences between the solution and crystal conformations were observed, although details in loop conformations and distinct crystal packing-induced features are present. Carbohydrate binding studies by NMR revealed affinity and specificity for Glc alpha(1-2)Frc and Man alpha(1-2)Man, and the parental half that is devoid of any sucrose affinity in NcCVNH was transformed into a genuine sucrose binding site in the context of the chimera. The atomic details of sugar recognition are seen in the crystal structure of the protein with two bound Glc alpha(1-2)Frc molecules. Both sugars exhibit different conformations around the glycosidic bond and engage in unique hydrogen bonding networks in the two sites. Although the protein is able to bind two Man alpha(1-2)Man molecules, a property associated with HIV-inactivation, no anti-HIV activity was observed for the hybrid protein. These results provide the structural basis for sugar recognition in the CVNH family and aid in deciphering the relationship between sugar binding and anti-HIV activity. 2009 Wiley-Liss, Inc.

  14. Design of radial basis function neural network classifier realized with the aid of data preprocessing techniques: design and analysis

    NASA Astrophysics Data System (ADS)

    Oh, Sung-Kwun; Kim, Wook-Dong; Pedrycz, Witold

    2016-05-01

    In this paper, we introduce a new architecture of optimized Radial Basis Function neural network classifier developed with the aid of fuzzy clustering and data preprocessing techniques and discuss its comprehensive design methodology. In the preprocessing part, the Linear Discriminant Analysis (LDA) or Principal Component Analysis (PCA) algorithm forms a front end of the network. The transformed data produced here are used as the inputs of the network. In the premise part, the Fuzzy C-Means (FCM) algorithm determines the receptive field associated with the condition part of the rules. The connection weights of the classifier are of functional nature and come as polynomial functions forming the consequent part. The Particle Swarm Optimization algorithm optimizes a number of essential parameters needed to improve the accuracy of the classifier. Those optimized parameters include the type of data preprocessing, the dimensionality of the feature vectors produced by the LDA (or PCA), the number of clusters (rules), the fuzzification coefficient used in the FCM algorithm and the orders of the polynomials of networks. The performance of the proposed classifier is reported for several benchmarking data-sets and is compared with the performance of other classifiers reported in the previous studies.

  15. Performance of NACA Eight-Stage Axial-Flow Compressor Designed on the Basis of Airfoil Theory

    DTIC Science & Technology

    1944-08-01

    TEE BASIS OF AIRFOIL THEORY By John T. Slnnette, Jr., Oscar W. Schey, and J. Austin King Aircraft Engine Research Laboratory Cleveland, Ohio FILE...efficiency can he designed by the proper application of airfoil theory. Aircraft Engine Research laboratory, Hational Advisory Committee for Aeronautlos...Basis of Airfoil Theory AUTHORS): Sinnette, John T.; Schey, Oscar W.; and others ORIGINATING AGENCY: Aircraft Engine Research Laboratory, Cleveland

  16. Benchmarks of improved complete basis set extrapolation schemes designed for standard CCSD(T) atomization energies.

    PubMed

    Feller, David

    2013-02-21

    Simple modifications of complete basis set extrapolation formulas chosen from the literature are examined with respect to their abilities to reproduce a diverse set of 183 reference atomization energies derived primarily from very large basis set standard, frozen core coupled-cluster singles, doubles plus perturbative triples (CCSD(T)) with the aug-cc-pVnZ basis sets. This reference set was augmented with a few larger chemical systems treated with explicitly correlated CCSD(T)-F12b using a quadruple zeta quality basis set followed by extrapolation to complete basis set limit. Tuning the extrapolation formula parameters for the present reference set resulted in substantial reductions in the error metrics. In the case of the best performing approach, the aVnZ extrapolated results are equivalent to or better than results obtained from raw aV(n + 3)Z basis set calculations. To the extent this behavior holds for molecules outside the reference set, it represents an improvement of at least one basis set level over the original formulations and a further significant reduction in the amount of computer time needed to accurately approximate the basis set limit.

  17. Implementation of an Industrial-Based Case Study as the Basis for a Design Project in an Introduction to Mechanical Design Course

    ERIC Educational Resources Information Center

    Lackey, Ellen

    2011-01-01

    The purpose of this paper is to discuss the implementation of an industrial-based case study as the basis for a design project for the Spring 2009 Introduction to Mechanical Design Course at the University of Mississippi. Course surveys documented the lack of student exposure in classes to the types of projects typically experienced by engineers…

  18. Implementation of an Industrial-Based Case Study as the Basis for a Design Project in an Introduction to Mechanical Design Course

    ERIC Educational Resources Information Center

    Lackey, Ellen

    2011-01-01

    The purpose of this paper is to discuss the implementation of an industrial-based case study as the basis for a design project for the Spring 2009 Introduction to Mechanical Design Course at the University of Mississippi. Course surveys documented the lack of student exposure in classes to the types of projects typically experienced by engineers…

  19. Threat driven modeling framework using petri nets for e-learning system.

    PubMed

    Khamparia, Aditya; Pandey, Babita

    2016-01-01

    Vulnerabilities at various levels are main cause of security risks in e-learning system. This paper presents a modified threat driven modeling framework, to identify the threats after risk assessment which requires mitigation and how to mitigate those threats. To model those threat mitigations aspects oriented stochastic petri nets are used. This paper included security metrics based on vulnerabilities present in e-learning system. The Common Vulnerability Scoring System designed to provide a normalized method for rating vulnerabilities which will be used as basis in metric definitions and calculations. A case study has been also proposed which shows the need and feasibility of using aspect oriented stochastic petri net models for threat modeling which improves reliability, consistency and robustness of the e-learning system.

  20. Basis of Design and Seismic Action for Long Suspension Bridges: the case of the Messina Strait Bridge

    SciTech Connect

    Bontempi, Franco

    2008-07-08

    The basis of design for complex structures like suspension bridges is reviewed. Specific attention is devoted to seismic action and to the performance required and to the connected structural analysis. Uncertainty is specially addressed by probabilistic and soft-computing techniques. The paper makes punctual reference to the work end the experience developed during the last years for the re-design of the Messina Strait Bridge.

  1. 28 CFR 35.139 - Direct threat.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Direct threat. 35.139 Section 35.139 Judicial Administration DEPARTMENT OF JUSTICE NONDISCRIMINATION ON THE BASIS OF DISABILITY IN STATE AND LOCAL GOVERNMENT SERVICES General Requirements § 35.139 Direct threat. (a) This part does not require...

  2. Designing scalable product families by the radial basis function-high-dimensional model representation metamodelling technique

    NASA Astrophysics Data System (ADS)

    Pirmoradi, Zhila; Haji Hajikolaei, Kambiz; Wang, G. Gary

    2015-10-01

    Product family design is cost-efficient for achieving the best trade-off between commonalization and diversification. However, for computationally intensive design functions which are viewed as black boxes, the family design would be challenging. A two-stage platform configuration method with generalized commonality is proposed for a scale-based family with unknown platform configuration. Unconventional sensitivity analysis and information on variation in the individual variants' optimal design are used for platform configuration design. Metamodelling is employed to provide the sensitivity and variable correlation information, leading to significant savings in function calls. A family of universal electric motors is designed for product performance and the efficiency of this method is studied. The impact of the employed parameters is also analysed. Then, the proposed method is modified for obtaining higher commonality. The proposed method is shown to yield design solutions with better objective function values, allowable performance loss and higher commonality than the previously developed methods in the literature.

  3. Airborne Particulate Threat Assessment

    SciTech Connect

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    findings and APICD Gen II subsystems for automated collection, deposition and detection of ambient particulate matter. Key findings from the APTA Program include: Ambient biological PM taxonomy; Demonstration of key subsystems needed for autonomous bioaerosol detection; System design; Efficient electrostatic collection; Automated bioagent recognition; Raman analysis performance validating Td<9 sec; Efficient collection surface regeneration; and Development of a quantitative bioaerosol defection model. The objective of the APTA program was to advance the state of our knowledge of ambient background PM composition. Operation of an automated aerosol detection system was enhanced by a more accurate assessment of background variability, especially for sensitive and specific sensing strategies like Raman detection that are background-limited in performance. Based on this improved knowledge of background, the overall threat detection performance of Raman sensors was improved.

  4. 105-K Basin material design basis feed description for spent nuclear fuel project facilities

    SciTech Connect

    Praga, A.N.

    1998-01-08

    Revisions 0 and 0A of this document provided estimated chemical and radionuclide inventories of spent nuclear fuel and sludge currently stored within the Hanford Site`s 105-K Basins. This Revision (Rev. 1) incorporates the following changes into Revision 0A: (1) updates the tables to reflect: improved cross section data, a decision to use accountability data as the basis for total Pu, a corrected methodology for selection of the heat generation basis fee, and a revised decay date; (2) adds section 3.3.3.1 to expand the description of the approach used to calculate the inventory values and explain why that approach yields conservative results; (3) changes the pre-irradiation braze beryllium value.

  5. Practical aspects of variable reduction formulations and reduced basis algorithms in multidisciplinary design optimization

    NASA Technical Reports Server (NTRS)

    Lewis, Robert Michael

    1995-01-01

    This paper discusses certain connections between nonlinear programming algorithms and the formulation of optimization problems for systems governed by state constraints. The major points of this paper are the detailed calculation of the sensitivities associated with different formulations of optimization problems and the identification of some useful relationships between different formulations. These relationships have practical consequences; if one uses a reduced basis nonlinear programming algorithm, then the implementations for the different formulations need only differ in a single step.

  6. Design solutions for water treatment plants constructed on the basis of membrane technologies

    NASA Astrophysics Data System (ADS)

    Panteleev, A. A.; Ryabchikov, B. E.; Zhadan, A. V.; Khoruzhii, O. V.

    2012-07-01

    Two process circuits for demineralizing makeup water for power units at thermal power stations are considered. One of them is constructed on the basis of a combined plant comprising reverse-osmosis and ion-exchange apparatuses and the other comprises reverse-osmosis and electric deionization apparatuses. The considered circuits are analyzed by way of comparing them with the traditional chemical water demineralization system. Advantages and drawbacks of the new technologies for treating natural water are pointed out.

  7. Design basis for protection of light water nuclear power plants against effects of postulated pipe rupture

    SciTech Connect

    Not Available

    1981-01-01

    This standard addresses the design bases for light water reactor, nuclear power plant structures and components essential for the protection of public health and safety from the potential adverse effects of pipe whip, jet impingement, pressurization of compartments outside containment, environmental conditions and flooding associated with a postulated pipe rupture. The design bases for missile protection and the design bases for containment pressurization are not within this standard.

  8. When Students Make Threats

    ERIC Educational Resources Information Center

    Kanan, Linda M.

    2010-01-01

    Much has been written about the use of threat assessment. Schools are encouraged to have threat assessment teams and a threat assessment process as part of a comprehensive safe schools effort. Encouraging and enabling members of the school community to report possible threats in a timely manner is an essential component of an effective threat…

  9. When Students Make Threats

    ERIC Educational Resources Information Center

    Kanan, Linda M.

    2010-01-01

    Much has been written about the use of threat assessment. Schools are encouraged to have threat assessment teams and a threat assessment process as part of a comprehensive safe schools effort. Encouraging and enabling all members of the school community to report possible threats in a timely manner is an essential component of an effective threat…

  10. Basis of Accreditation for Educational Programs in Designated Health Science Professions.

    ERIC Educational Resources Information Center

    Canadian Medical Association, Ottawa (Ontario).

    Designed as a guide to accreditation for educational programs in designated health science professions in Canada, this report provides educators with guidelines, general requirements, and requirements for specific programs. Following information on the organization, structure, goals, mission, values, philosophy, and terminology of accreditation of…

  11. Basis of Accreditation for Educational Programs in Designated Health Science Professions.

    ERIC Educational Resources Information Center

    Canadian Medical Association, Ottawa (Ontario).

    Designed as a guide to accreditation for educational programs in designated health science professions in Canada, this report provides educators with guidelines, general requirements, and requirements for specific programs. Following information on the organization, structure, goals, mission, values, philosophy, and terminology of accreditation of…

  12. Cyber threat metrics.

    SciTech Connect

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  13. Probabilistic risk assessment for the Los Alamos Meson Physics Facility worst-case design-basis accident

    SciTech Connect

    Sharirli, M.; Butner, J.M.; Rand, J.L.; Macek, R.J. ); McKinney, S.J. ); Roush, M.L. . Center for Reliability Engineering)

    1992-01-01

    This paper presents results from a Los Alamos National Laboratory Engineering and Safety Analysis Group assessment of the worse-case design-basis accident associated with the Clinton P. Anderson Meson Physics Facility (LAMPF)/Weapons Neutron Research (WNR) Facility. The primary goal of the analysis was to quantify the accident sequences that result in personnel radiation exposure in the WNR Experimental Hall following the worst-case design-basis accident, a complete spill of the LAMPF accelerator 1L beam. This study also provides information regarding the roles of hardware systems and operators in these sequences, and insights regarding the areas where improvements can increase facility-operation safety. Results also include confidence ranges to incorporate combined effects of uncertainties in probability estimates and importance measures to determine how variations in individual events affect the frequencies in accident sequences.

  14. Probabilistic risk assessment for the Los Alamos Meson Physics Facility worst-case design-basis accident

    SciTech Connect

    Sharirli, M.; Butner, J.M.; Rand, J.L.; Macek, R.J.; McKinney, S.J.; Roush, M.L.

    1992-12-01

    This paper presents results from a Los Alamos National Laboratory Engineering and Safety Analysis Group assessment of the worse-case design-basis accident associated with the Clinton P. Anderson Meson Physics Facility (LAMPF)/Weapons Neutron Research (WNR) Facility. The primary goal of the analysis was to quantify the accident sequences that result in personnel radiation exposure in the WNR Experimental Hall following the worst-case design-basis accident, a complete spill of the LAMPF accelerator 1L beam. This study also provides information regarding the roles of hardware systems and operators in these sequences, and insights regarding the areas where improvements can increase facility-operation safety. Results also include confidence ranges to incorporate combined effects of uncertainties in probability estimates and importance measures to determine how variations in individual events affect the frequencies in accident sequences.

  15. Designing an underground car park fire scenarios on a probabilistic basis.

    PubMed

    Jug, Aleš; Petelin, Stojan; Bukovec, Peter

    2010-03-01

    Designing a fire safety measures can be usually achieved in a two ways. One or we should say more conservative way is the use of prescriptive based codes, where all design prerequisites are mainly written in codes. Other or second option is the use of performance based design, where the group of designers, building owners and authorities having jurisdiction are setting up a milestone and design requirements. Simulation of fire and its consequences constitutes a cornerstone of modern fire safety engineering: the simulations enable to examine computationally the adequacy of the design with respect to a wide range of fire safety objectives including safety of life, directly exposed or neighboring property and infrastructure as well as the environment. Each simulation must be based on a realistic fire scenario, which technically formulates social expectation of safety. Designing realistic fire scenarios is even more important when underground car park is chosen as the subject of analysis. Setting the realistic goals and outcomes is a real technical problem that requires realistic and reliable inputs. It is found that fire scenario inputs can be statistical weighted and analyzed.

  16. Somatic mutations in PI3K[alpha]: Structural basis for enzyme activation and drug design

    SciTech Connect

    Gabelli, Sandra B.; Mandelker, Diana; Schmidt-Kittler, Oleg; Vogelstein, Bert; Amzel, L. Mario

    2011-09-06

    The PI3K pathway is a communication hub coordinating critical cell functions including cell survival, cell growth, proliferation, motility and metabolism. Because PI3K{alpha} harbors recurrent somatic mutations resulting in gains of function in human cancers, it has emerged as an important drug target for many types of solid tumors. Various PI3K isoforms are also being evaluated as potential therapeutic targets for inflammation, heart disease, and hematological malignancies. Structural biology is providing insights into the flexibility of the PI3Ks, and providing basis for understanding the effects of mutations, drug resistance and specificity.

  17. Somatic Mutations in PI3Kalpha: Structural Basis for Enzyme Activation and Drug Design

    SciTech Connect

    S Gabelli; D Mandelker; O Schmidt-Kittler; B Vogelstein; L Amzel

    2011-12-31

    The PI3K pathway is a communication hub coordinating critical cell functions including cell survival, cell growth, proliferation, motility and metabolism. Because PI3K{alpha} harbors recurrent somatic mutations resulting in gains of function in human cancers, it has emerged as an important drug target for many types of solid tumors. Various PI3K isoforms are also being evaluated as potential therapeutic targets for inflammation, heart disease, and hematological malignancies. Structural biology is providing insights into the flexibility of the PI3Ks, and providing basis for understanding the effects of mutations, drug resistance and specificity.

  18. The Concept of Fashion Design on the Basis of Color Coordination Using White LED Lighting

    NASA Astrophysics Data System (ADS)

    Mizutani, Yumiko; Taguchi, Tsunemasa

    This thesis focuses on the development of fashion design, especially a dress coordinated with White LED Lighting (=LED). As for the design concept a fusion of the advanced science and local culture was aimed for. For such a reason this development is a very experimental one. Here in particular I handled an Imperial Court dinner dress for the last Japanese First Lady, Mrs. Akie Abe who wore it at the Imperial Court dinner for the Indonesian First Couple held on November 2006 to. This dress made by Prof. T. Taguchi and I open up a new field in the dress design.

  19. Ground motion following selection of SRS design basis earthquake and associated deterministic approach. Final report: Revision 1

    SciTech Connect

    Not Available

    1991-03-01

    This report summarizes the results of a deterministic assessment of earthquake ground motions at the Savannah River Site (SRS). The purpose of this study is to assist the Environmental Sciences Section of the Savannah River Laboratory in reevaluating the design basis earthquake (DBE) ground motion at SRS during approaches defined in Appendix A to 10 CFR Part 100. This work is in support of the Seismic Engineering Section`s Seismic Qualification Program for reactor restart.

  20. Designing Smart Artifacts for Adaptive Mediation of Social Viscosity: Triadic Actor-Network Enactments as a Basis for Interaction Design

    ERIC Educational Resources Information Center

    Salamanca, Juan

    2012-01-01

    With the advent of ubiquitous computing, interaction design has broadened its object of inquiry into how smart computational artifacts inconspicuously act in people's everyday lives. Although user-centered design approaches remains useful for exploring how people cope with interactive systems, they cannot explain how this new breed of…

  1. Designing Smart Artifacts for Adaptive Mediation of Social Viscosity: Triadic Actor-Network Enactments as a Basis for Interaction Design

    ERIC Educational Resources Information Center

    Salamanca, Juan

    2012-01-01

    With the advent of ubiquitous computing, interaction design has broadened its object of inquiry into how smart computational artifacts inconspicuously act in people's everyday lives. Although user-centered design approaches remains useful for exploring how people cope with interactive systems, they cannot explain how this new breed of…

  2. Forest landscape description and inventories - a basis for landplanning and design

    Treesearch

    R. Burton Litton

    1968-01-01

    Describes six analytical factors and seven compositional types useful in recognition and description of scenic resources. Illustrates their application in two inventories made to aid managers and landscape architects in planning and design.

  3. Mechatronic design of strongly nonlinear systems on a basis of three wheeled mobile platform

    NASA Astrophysics Data System (ADS)

    Kaliński, Krzysztof J.; Buchholz, Cezary

    2015-02-01

    Remarkable grow in demand both of mobile platform operability performance and reduction of project leading time development encourage to apply modern algorithms and reliable engineering tools for the design process. The paper discusses the mechatronic design applied for the surveillance system based on the energy performance index algorithm. The exploited mechatronic techniques i.e. virtual prototyping, Hardware-In-the-Loop Simulation (HILS) and rapid prototyping on target object, supported by the LabVIEW, allowed for integration of the developed control system and strongly nonlinear mobile platform, built simultaneously for the research purposes. Mathematical complexity of on-line algorithm and sophisticated model description affected all the process design. In order to boost mobile platform performance and handle its real time motion surveillance the authors implemented the Real Time controller. The presented design approach allowed authors to achieve the highest level of a mobile platform performance and increased probability of the final concept success.

  4. 40 CFR 228.15 - Dumping sites designated on a final basis.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... materials. Designation of these sites was based on environmental studies conducted in accordance with the... for any ongoing long-term studies), including the identification of alternatives to open-water...

  5. 40 CFR 228.15 - Dumping sites designated on a final basis.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... materials. Designation of these sites was based on environmental studies conducted in accordance with the... for any ongoing long-term studies), including the identification of alternatives to open-water...

  6. 40 CFR 228.15 - Dumping sites designated on a final basis.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... materials. Designation of these sites was based on environmental studies conducted in accordance with the... for any ongoing long-term studies), including the identification of alternatives to open-water...

  7. Theoretical Basis of the Test-Negative Study Design for Assessment of Influenza Vaccine Effectiveness.

    PubMed

    Sullivan, Sheena G; Tchetgen Tchetgen, Eric J; Cowling, Benjamin J

    2016-09-01

    Influenza viruses undergo frequent antigenic changes. As a result, the viruses circulating change within and between seasons, and the composition of the influenza vaccine is updated annually. Thus, estimation of the vaccine's effectiveness is not constant across seasons. In order to provide annual estimates of the influenza vaccine's effectiveness, health departments have increasingly adopted the "test-negative design," using enhanced data from routine surveillance systems. In this design, patients presenting to participating general practitioners with influenza-like illness are swabbed for laboratory testing; those testing positive for influenza virus are defined as cases, and those testing negative form the comparison group. Data on patients' vaccination histories and confounder profiles are also collected. Vaccine effectiveness is estimated from the odds ratio comparing the odds of testing positive for influenza among vaccinated patients and unvaccinated patients, adjusting for confounders. The test-negative design is purported to reduce bias associated with confounding by health-care-seeking behavior and misclassification of cases. In this paper, we use directed acyclic graphs to characterize potential biases in studies of influenza vaccine effectiveness using the test-negative design. We show how studies using this design can avoid or minimize bias and where bias may be introduced with particular study design variations. © The Author 2016. Published by Oxford University Press on behalf of the Johns Hopkins Bloomberg School of Public Health. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  8. Physics basis for an axicell design for the end plugs of MFTF-B

    SciTech Connect

    Baldwin, D.E.; Logan, B.G.

    1982-04-21

    The primary motivation for conversion of MFTF-B to an axicell configuration lies in its engineering promise as a reactor geometry based on circular high-magnetic-field coils. In comparing this configuration to the previous A-cell geometry, we find a number of differences that might significantly affect the physics performance. The purpose of the present document is to examine those features and to assess their impact on the performance of the axicell, as compared to the A-cell configuration, for MFTF-B. In so doing, we address only those issues thought to be affected by the change in geometry and refer to the original report Physics Basis for MFTF-B, for discussion of those issues thought not to be affected. In Sec. 1, we summarize these physics issues. In Sec. 2, we describe operating scenarios in the new configuration. In the Appendices, we discuss those physics issues that require more detailed treatment.

  9. Higher Education Curricula Designing on the Basis of the Regional Labour Market Demands

    ERIC Educational Resources Information Center

    Cai, Jing; Youngblood, Valery T.; Khodyreva, Elena A.; Khuziakhmetov, Anvar N.

    2017-01-01

    The relevance of the research problem is reasoned by the need to develop conceptual approaches and technologies for designing educational curricula based on current and prospective order for specialists' training from educational services' consumers--regional entities of the labor market. The goal of the article lies in justification of the…

  10. Groundwork: Preparing an Effective Basis for Communication and Shared Learning in Design and Technology Education

    ERIC Educational Resources Information Center

    Looijenga, Annemarie; Klapwijk, Remke; de Vries, Marc J.

    2016-01-01

    In Dutch Design and Technology Education the beginning of a process of learning is usually determined by the teacher. In this paper it is argued that a beginning, determined in interaction with the students, is more profitable as the interaction will lead to joined-up exploring, creating and thinking and an increased motivation to learn.…

  11. Biological basis for space-variant sensor design I: parameters of monkey and human spatial vision

    NASA Astrophysics Data System (ADS)

    Rojer, Alan S.; Schwartz, Eric L.

    1991-02-01

    Biological sensor design has long provided inspiration for sensor design in machine vision. However relatively little attention has been paid to the actual design parameters provided by biological systems as opposed to the general nature of biological vision architectures. In the present paper we will provide a review of current knowledge of primate spatial vision design parameters and will present recent experimental and modeling work from our lab which demonstrates that a numerical conformal mapping which is a refinement of our previous complex logarithmic model provides the best current summary of this feature of the primate visual system. In this paper we will review recent work from our laboratory which has characterized some of the spatial architectures of the primate visual system. In particular we will review experimental and modeling studies which indicate that: . The global spatial architecture of primate visual cortex is well summarized by a numerical conformal mapping whose simplest analytic approximation is the complex logarithm function . The columnar sub-structure of primate visual cortex can be well summarized by a model based on a band-pass filtered white noise. We will also refer to ongoing work in our lab which demonstrates that: . The joint columnar/map structure of primate visual cortex can be modeled and summarized in terms of a new algorithm the ''''proto-column'''' algorithm. This work provides a reference-point for current engineering approaches to novel architectures for

  12. Reducing Production Basis Risk through Rainfall Intensity Frequency (RIF) Indexes: Global Sensitivity Analysis' Implication on Policy Design

    NASA Astrophysics Data System (ADS)

    Muneepeerakul, Chitsomanus; Huffaker, Ray; Munoz-Carpena, Rafael

    2016-04-01

    The weather index insurance promises financial resilience to farmers struck by harsh weather conditions with swift compensation at affordable premium thanks to its minimal adverse selection and moral hazard. Despite these advantages, the very nature of indexing causes the presence of "production basis risk" that the selected weather indexes and their thresholds do not correspond to actual damages. To reduce basis risk without additional data collection cost, we propose the use of rain intensity and frequency as indexes as it could offer better protection at the lower premium by avoiding basis risk-strike trade-off inherent in the total rainfall index. We present empirical evidences and modeling results that even under the similar cumulative rainfall and temperature environment, yield can significantly differ especially for drought sensitive crops. We further show that deriving the trigger level and payoff function from regression between historical yield and total rainfall data may pose significant basis risk owing to their non-unique relationship in the insured range of rainfall. Lastly, we discuss the design of index insurance in terms of contract specifications based on the results from global sensitivity analysis.

  13. Environment as a basis for the design of advertising structures by forming

    NASA Astrophysics Data System (ADS)

    Khmelevsky, Y. P.; Seryakov, V. A.; Mamontov, G. Y.; Tsarenko, D. T.

    2017-01-01

    A few different neighbouring styles of architectural forms are quite frequent in the cities of great historical past. As a result, a designer or architect has to solve the complex problem while designing the objects within such environment, i.e. one has to fit them naturally into the existing site development. Often, form making is found to be hard, due to the fact that the existing architectural forms of totally different stylistic execution coexist in the visual proximity. Presently, placement of the advertising bills in urban environment is both an urgent and debatable issue. On the one hand, advertising providers are keen to present their product bigger and brighter, on the other hand, the overall and eye-catching exhibition stands can be disharmonious with the surrounding architectural ensemble of the city. This situation is relevant for every cultural city.

  14. Structural basis for the design and synthesis of selective HDAC inhibitors.

    PubMed

    Di Micco, Simone; Chini, Maria Giovanna; Terracciano, Stefania; Bruno, Ines; Riccio, Raffaele; Bifulco, Giuseppe

    2013-07-01

    Histone Deacetylases are considered promising targets for cancer epigenetic therapy, and small molecules able to modulate their biological function have recently gained an increasing interest as potential anticancer agents. In spite of their potential application in cancer therapy, most HDAC inhibitors unselectively bind the several HDAC isoforms, giving rise to different side-effects. In this context, we have traced out the structural elements responsible of selective binding for the therapeutically relevant different HDAC isoforms. The structural analysis has been carried out by molecular modeling, docking in the binding pockets of HDAC1-4 and HDAC6-8, 36 inhibitors presenting a well defined selectivity for the different isoforms. As quick proof of evidence, we have designed, synthesized and experimentally tested three selective ligands. The experimental data suggest that the obtained structural guidelines can be useful tools for the rational design of new potent inhibitors against selected HDAC isoforms. Copyright © 2013 Elsevier Ltd. All rights reserved.

  15. A Basis for Solid Modeling of Gear Teeth with Application in Design and Manufacture

    NASA Technical Reports Server (NTRS)

    Huston, Ronald L.; Mavriplis, Dimitrios; Oswald, Fred B.; Liu, Yung Sheng

    1994-01-01

    This paper discusses a new approach to modeling gear tooth surfaces. A computer graphics solid modeling procedure is used to simulate the tooth fabrication processes. This procedure is based on the principles of differential geometry that pertain to envelopes of curves and surfaces. The procedure is illustrated with the modeling of spur, helical, bevel, spiral bevel and hypoid gear teeth. Applications in design and manufacturing arc discussed. Extensions to nonstandard tooth forms, to cams, and to rolling element hearings are proposed.

  16. A basis for solid modeling of gear teeth with application in design and manufacture

    NASA Technical Reports Server (NTRS)

    Huston, Ronald L.; Mavriplis, Dimitrios; Oswald, Fred B.; Liu, Yung Sheng

    1992-01-01

    A new approach to modeling gear tooth surfaces is discussed. A computer graphics solid modeling procedure is used to simulate the tooth fabrication process. This procedure is based on the principles of differential geometry that pertain to envelopes of curves and surfaces. The procedure is illustrated with the modeling of spur, helical, bevel, spiral bevel, and hypoid gear teeth. Applications in design and manufacturing are discussed. Extensions to nonstandard tooth forms, to cams, and to rolling element bearings are proposed.

  17. A Basis for Solid Modeling of Gear Teeth with Application in Design and Manufacture

    DTIC Science & Technology

    1992-04-01

    helical , bevel, spiral bevel, and hypoid gear teeth. Applications in design and manufacturing are discussed. Extensions to nonstandard tooth forms, to...developing models of spur, helical , bevel, spiral bevel, and hypoid gears. This report is divided into five sections, the first of which provides some...have involute teeth cut into its surface. Finally, a similar procedure was used to generate images of helical , bevel, spiral bevel, and hypoid gears

  18. Scientific basis for process and catalyst design in the selective oxidation of methane to formaldehyde.

    PubMed

    Arena, Francesco; Parmaliana, Adolfo

    2003-12-01

    The mechanism and kinetics of the gas-phase selective oxidation of methane to formaldehyde (MPO) are revised in the general context of catalytic oxidations. In agreement with ab initio calculations of the energy barrier for the activation of methane on transition metal oxide complexes, a formal Langmuir-Hinshelwood kinetic model is proposed which accounts for the "steady-state" conditions and activity-selectivity pattern of MPO catalysts, providing an original support to process design and catalyst development.

  19. Exploratory Shaft Seismic Design Basis Working Group report; Yucca Mountain Project

    SciTech Connect

    Subramanian, C.V.; King, J.L.; Perkins, D.M.; Mudd, R.W.; Richardson, A.M.; Calovini, J.C.; Van Eeckhout, E.; Emerson, D.O.

    1990-08-01

    This report was prepared for the Yucca Mountain Project (YMP), which is managed by the US Department of Energy. The participants in the YMP are investigating the suitability of a site at Yucca Mountain, Nevada, for construction of a repository for high-level radioactive waste. An exploratory shaft facility (ESF) will be constructed to permit site characterization. The major components of the ESF are two shafts that will be used to provide access to the underground test areas for men, utilities, and ventilation. If a repository is constructed at the site, the exploratory shafts will be converted for use as intake ventilation shafts. In the context of both underground nuclear explosions (conducted at the nearby Nevada Test Site) and earthquakes, the report contains discussions of faulting potential at the site, control motions at depth, material properties of the different rock layers relevant to seismic design, the strain tensor for each of the waveforms along the shaft liners, and the method for combining the different strain components along the shaft liners. The report also describes analytic methods, assumptions used to ensure conservatism, and uncertainties in the data. The analyses show that none of the shafts` structures, systems, or components are important to public radiological safety; therefore, the shafts need only be designed to ensure worker safety, and the report recommends seismic design parameters appropriate for this purpose. 31 refs., 5 figs., 6 tabs.

  20. Structural basis for non-competitive product inhibition in human thymidine phosphorylase: implications for drug design.

    PubMed

    El Omari, Kamel; Bronckaers, Annelies; Liekens, Sandra; Pérez-Pérez, Maria-Jésus; Balzarini, Jan; Stammers, David K

    2006-10-15

    HTP (human thymidine phosphorylase), also known as PD-ECGF (platelet-derived endothelial cell growth factor) or gliostatin, has an important role in nucleoside metabolism. HTP is implicated in angiogenesis and apoptosis and therefore is a prime target for drug design, including antitumour therapies. An HTP structure in a closed conformation complexed with an inhibitor has previously been solved. Earlier kinetic studies revealed an ordered release of thymine followed by ribose phosphate and product inhibition by both ligands. We have determined the structure of HTP from crystals grown in the presence of thymidine, which, surprisingly, resulted in bound thymine with HTP in a closed dead-end complex. Thus thymine appears to be able to reassociate with HTP after its initial ordered release before ribose phosphate and induces the closed conformation, hence explaining the mechanism of non-competitive product inhibition. In the active site in one of the four HTP molecules within the crystal asymmetric unit, additional electron density is present. This density has not been previously seen in any pyrimidine nucleoside phosphorylase and it defines a subsite that may be exploitable in drug design. Finally, because our crystals did not require proteolysed HTP to grow, the structure reveals a loop (residues 406-415), disordered in the previous HTP structure. This loop extends across the active-site cleft and appears to stabilize the dimer interface and the closed conformation by hydrogen-bonding. The present study will assist in the design of HTP inhibitors that could lead to drugs for anti-angiogenesis as well as for the potentiation of other nucleoside drugs.

  1. 78 FR 39781 - Consequence Study of a Beyond-Design-Basis Earthquake Affecting the Spent Fuel Pool for a U.S...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-02

    ... COMMISSION Consequence Study of a Beyond-Design-Basis Earthquake Affecting the Spent Fuel Pool for a U.S... comment, titled Consequence Study of a Beyond- Design-Basis Earthquake Affecting the Spent Fuel Pool for a... earthquakes present the dominant risk for spent fuel pools, the draft study evaluated how a potential pool...

  2. Protein structures in Alzheimer's disease: The basis for rationale therapeutic design.

    PubMed

    Montoliu-Gaya, Laia; Villegas, Sandra

    2015-12-15

    Alzheimer's disease (AD) is a neurodegenerative disorder that affects memory, behavior, thinking and emotion. Current therapies to treat AD patients are only capable for temporarily slowing-down the cognitive decline, as they are focused on ameliorating symptoms instead of targeting its underlying causes. The aim of this review is to describe what is known about the protein structures implicated in AD pathogenesis, amyloid cascade members, as well as those structures involved in Aβ clearance. Thus, structural information available for APP, α- β- and γ-secretases, CTFβ and derived Aβ peptides, AICDs, apoE and apoJ, LRP-1 and RAGE, and neprilysin and insulin-degrading enzyme is provided. The recently solved structure for the γ-secretase complex opens the rational design of a new generation of inhibitors, whereas that for Aβ oligomers offers a putative mechanism explaining why monoclonal antibodies targeted to the N-terminus are effective. Then, an overview on therapies targeting some of these molecules presents their benefits and drawbacks. As a general conclusion our knowledge on the protein structures involved in AD has recently substantially advanced, allowing for the rational design of different therapeutic approaches. Hopefully, we are getting closer to finding a strong disease-modifying drug to cure this devastating disease. Copyright © 2015 Elsevier Inc. All rights reserved.

  3. Investigation of techniques for the development of seismic design basis using the probabilistic seismic hazard analysis

    SciTech Connect

    Bernreuter, D.L.; Boissonnade, A.C.; Short, C.M.

    1998-04-01

    The Nuclear Regulatory Commission asked Lawrence Livermore National Laboratory to form a group of experts to assist them in revising the seismic and geologic siting criteria for nuclear power plants, Appendix A to 10 CFR Part 100. This document describes a deterministic approach for determining a Safe Shutdown Earthquake (SSE) Ground Motion for a nuclear power plant site. One disadvantage of this approach is the difficulty of integrating differences of opinions and differing interpretations into seismic hazard characterization. In answer to this, probabilistic seismic hazard assessment methodologies incorporate differences of opinion and interpretations among earth science experts. For this reason, probabilistic hazard methods were selected for determining SSEs for the revised regulation, 10 CFR Part 100.23. However, because these methodologies provide a composite analysis of all possible earthquakes that may occur, they do not provide the familiar link between seismic design loading requirements and engineering design practice. Therefore, approaches used to characterize seismic events (magnitude and distance) which best represent the ground motion level determined with the probabilistic hazard analysis were investigated. This report summarizes investigations conducted at 69 nuclear reactor sites in the central and eastern U.S. for determining SSEs using probabilistic analyses. Alternative techniques are presented along with justification for key choices. 16 refs., 32 figs., 60 tabs.

  4. Changing precipitation extremes in a warming climate: A basis for design flood estimation

    NASA Astrophysics Data System (ADS)

    Wasko, Conrad; Sharma, Ashish

    2016-04-01

    The potential for increasing intensity of future rainfall events has significant implications for flooding and the design of infrastructure. However the questions of how precipitation will change in the future, how important these changes are to flooding, and how engineers incorporate these changes into hydrologic design remain as open questions. In the absence of reliable point based estimates of how precipitation will change, many studies investigate the historical relationship between rainfall intensity and temperature as a proxy for what may happen in a warmer climate. Much of the research to date has focussed on changing precipitation intensity, however, temporal and spatial patterns of precipitation are just as important. Here we link higher temperatures to changes in temporal and spatial patterns of extreme precipitation events. We show, using observed high quality precipitation records from Australia covering all major climatic zones, that storms are intensifying in both time and space resulting in a greater potential for flooding especially in urban locales around the world. Given that precipitation and antecedent conditions are changing, and, the impacts to flooding are significant, methods of incorporating these changes in catchment modelling are required. Continuous simulation offers a natural flexibility to incorporate the many correlated changes in precipitation that may occur in a future climate. An argument for such a framework using existing continuous simulation alternatives is articulated in concluding this presentation.

  5. Early Site Permit Demonstration Program: Guidelines for determining design basis ground motions. Volume 1

    SciTech Connect

    Not Available

    1993-03-18

    This report develops and applies a methodology for estimating strong earthquake ground motion. The motivation was to develop a much needed tool for use in developing the seismic requirements for structural designs. An earthquake`s ground motion is a function of the earthquake`s magnitude, and the physical properties of the earth through which the seismic waves travel from the earthquake fault to the site of interest. The emphasis of this study is on ground motion estimation in Eastern North America (east of the Rocky Mountains), with particular emphasis on the Eastern United States and southeastern Canada. Eastern North America is a stable continental region, having sparse earthquake activity with rare occurrences of large earthquakes. While large earthquakes are of interest for assessing seismic hazard, little data exists from the region to empirically quantify their effects. Therefore, empirically based approaches that are used for other regions, such as Western North America, are not appropriate for Eastern North America. Moreover, recent advances in science and technology have now made it possible to combine theoretical and empirical methods to develop new procedures and models for estimating ground motion. The focus of the report is on the attributes of ground motion in Eastern North America that are of interest for the design of facilities such as nuclear power plants. Specifically considered are magnitudes M from 5 to 8, distances from 0 to 500 km, and frequencies from 1 to 35 Hz.

  6. Structural Basis for the Design of Selective Phosphodiesterase 4B Inhibitors

    PubMed Central

    Fox, David; Burgin, Alex B.; Gurney, Mark E.

    2014-01-01

    Phosphodiesterase-4B (PDE4B) regulates the pro-inflammatory Toll Receptor –Tumor Necrosis Factor α (TNFα) pathway in monocytes, macrophages and microglial cells. As such, it is an important, although under-exploited molecular target for anti-inflammatory drugs. This is due in part to the difficulty of developing selective PDE4B inhibitors as the amino acid sequence of the PDE4 active site is identical in all PDE4 subtypes (PDE4A-D). We show that highly selective PDE4B inhibitors can be designed by exploiting sequence differences outside the active site. Specifically, PDE4B selectivity can be achieved by capture of a C-terminal regulatory helix, now termed CR3 (Control Region 3), across the active site in a conformation that closes access by cAMP. PDE4B selectivity is driven by a single amino acid polymorphism in CR3 (Leu674 in PDE4B1 versus Gln594 in PDE4D). The reciprocal mutations in PDE4B and PDE4D cause a 70-80 fold shift in selectivity. Our structural studies show that CR3 is flexible and can adopt multiple orientations and multiple registries in the closed conformation. The new co-crystal structure with bound ligand provides a guide map for the design of PDE4B selective anti-inflammatory drugs. PMID:24361374

  7. Structural basis for the design of selective phosphodiesterase 4B inhibitors.

    PubMed

    Fox, David; Burgin, Alex B; Gurney, Mark E

    2014-03-01

    Phosphodiesterase-4B (PDE4B) regulates the pro-inflammatory Toll Receptor -Tumor Necrosis Factor α (TNFα) pathway in monocytes, macrophages and microglial cells. As such, it is an important, although under-exploited molecular target for anti-inflammatory drugs. This is due in part to the difficulty of developing selective PDE4B inhibitors as the amino acid sequence of the PDE4 active site is identical in all PDE4 subtypes (PDE4A-D). We show that highly selective PDE4B inhibitors can be designed by exploiting sequence differences outside the active site. Specifically, PDE4B selectivity can be achieved by capture of a C-terminal regulatory helix, now termed CR3 (Control Region 3), across the active site in a conformation that closes access by cAMP. PDE4B selectivity is driven by a single amino acid polymorphism in CR3 (Leu674 in PDE4B1 versus Gln594 in PDE4D). The reciprocal mutations in PDE4B and PDE4D cause a 70-80 fold shift in selectivity. Our structural studies show that CR3 is flexible and can adopt multiple orientations and multiple registries in the closed conformation. The new co-crystal structure with bound ligand provides a guide map for the design of PDE4B selective anti-inflammatory drugs. Copyright © 2013 The Authors. Published by Elsevier Inc. All rights reserved.

  8. Research on a UAV path planning method for ground observation based on threat sources

    NASA Astrophysics Data System (ADS)

    Yan, Hao; Fan, Xing; Xia, Xuezhi; Lin, Linshu

    2008-12-01

    The path planning method is one of the main research directions in current UAV(unmanned aerial vehicle) technologies. In this paper we perform analyses on the adversarial environment which may be broken through during the UAV mission for ground observation, and carry out the grade classification according to the threat level. On the basis of genetic algorithm, the encoding method of dimension reduction and direct quantization is used to combine the threat value of each leg with the flight distance, so as to construct the fitness evaluation function based on the threat amount and design the algorithm. This method is proven to be able to converge effectively and quickly via the simulation experiments, which meet the threat restriction and applicability of UAV in route planning.

  9. Modeling of the Reactor Core Isolation Cooling Response to Beyond Design Basis Operations - Interim Report

    SciTech Connect

    Ross, Kyle; Cardoni, Jeffrey N.; Wilson, Chisom Shawn; Morrow, Charles; Osborn, Douglas; Gauntt, Randall O.

    2015-12-01

    Efforts are being pursued to develop and qualify a system-level model of a reactor core isolation (RCIC) steam-turbine-driven pump. The model is being developed with the intent of employing it to inform the design of experimental configurations for full-scale RCIC testing. The model is expected to be especially valuable in sizing equipment needed in the testing. An additional intent is to use the model in understanding more fully how RCIC apparently managed to operate far removed from its design envelope in the Fukushima Daiichi Unit 2 accident. RCIC modeling is proceeding along two avenues that are expected to complement each other well. The first avenue is the continued development of the system-level RCIC model that will serve in simulating a full reactor system or full experimental configuration of which a RCIC system is part. The model reasonably represents a RCIC system today, especially given design operating conditions, but lacks specifics that are likely important in representing the off-design conditions a RCIC system might experience in an emergency situation such as a loss of all electrical power. A known specific lacking in the system model, for example, is the efficiency at which a flashing slug of water (as opposed to a concentrated jet of steam) could propel the rotating drive wheel of a RCIC turbine. To address this specific, the second avenue is being pursued wherein computational fluid dynamics (CFD) analyses of such a jet are being carried out. The results of the CFD analyses will thus complement and inform the system modeling. The system modeling will, in turn, complement the CFD analysis by providing the system information needed to impose appropriate boundary conditions on the CFD simulations. The system model will be used to inform the selection of configurations and equipment best suitable of supporting planned RCIC experimental testing. Preliminary investigations with the RCIC model indicate that liquid water ingestion by the turbine

  10. Basis of human factors methodology applied in the Westinghouse AP600 design

    SciTech Connect

    Carrera, J.P.; Easter, J.R. )

    1992-01-01

    The incident at Three Mile Island Unit 2 brought about an awareness that there is a need for a new perspective on nuclear power plant operator performance. It was discerned that besides executing control actions, the operator needs an additional role, that of systems supervisor-someone who considers plant health at the functional level of how all the plant processes are related and how they perform with regard to the high-level operational goals of the plant. Westinghouse has taken the initiative to apply these ideas in dealing with the operator by studying the work of Rasmussen of Denmark's Riso Laboratory, regarding knowledge-based behavior and the requirements for supporting the cognitive processes required of an operator. This has led to the Westinghouse Man-Machine-Interface System (MMIS) design process.

  11. Early Site Permit Demonstration Program: Guidelines for determining design basis ground motions. Volume 2, Appendices

    SciTech Connect

    Not Available

    1993-03-18

    This report develops and applies a methodology for estimating strong earthquake ground motion. The motivation was to develop a much needed tool for use in developing the seismic requirements for structural designs. An earthquake`s ground motion is a function of the earthquake`s magnitude, and the physical properties of the earth through which the seismic waves travel from the earthquake fault to the site of interest. The emphasis of this study is on ground motion estimation in Eastern North America (east of the Rocky Mountains), with particular emphasis on the Eastern United States and southeastern Canada. Eastern North America is a stable continental region, having sparse earthquake activity with rare occurrences of large earthquakes. While large earthquakes are of interest for assessing seismic hazard, little data exists from the region to empirically quantify their effects. The focus of the report is on the attributes of ground motion in Eastern North America that are of interest for the design of facilities such as nuclear power plants. This document, Volume II, contains Appendices 2, 3, 5, 6, and 7 covering the following topics: Eastern North American Empirical Ground Motion Data; Examination of Variance of Seismographic Network Data; Soil Amplification and Vertical-to-Horizontal Ratios from Analysis of Strong Motion Data From Active Tectonic Regions; Revision and Calibration of Ou and Herrmann Method; Generalized Ray Procedure for Modeling Ground Motion Attenuation; Crustal Models for Velocity Regionalization; Depth Distribution Models; Development of Generic Site Effects Model; Validation and Comparison of One-Dimensional Site Response Methodologies; Plots of Amplification Factors; Assessment of Coupling Between Vertical & Horizontal Motions in Nonlinear Site Response Analysis; and Modeling of Dynamic Soil Properties.

  12. Survey of ethical issues reported by Indian medical students: basis for design of a new curriculum.

    PubMed

    Rose, Anuradha; George, Kuryan; T, Arul Dhas; Pulimood, Anna Benjamin

    2014-01-01

    Education in ethics is now a formal part of the undergraduate medical curriculum. However, most courses are structured around principles and case studies more appropriate to western countries. The cultures and practices of countries like India differ from those of western countries. It is, therefore, essential that our teaching should address the issues which are the most relevant to our setting. An anonymised, questionnaire-based, cross-sectional survey of medical students was carried out to get a picture of the ethical problems faced by students in India. The data were categorised into issues related to professional behaviour and ethical dilemmas. Unprofessional behaviour was among the issues reported as a matter of concern by a majority of the medical students. The survey highlights the need to design the curriculum in a way that reflects the structure of medical education in India, where patients are not always considered socio-culturally equal by students or the medical staff. This perspective must underpin any further efforts to address education in ethics in India.

  13. Characterizing and designing polycation-clay nanocomposites as a basis for imazapyr controlled release formulations.

    PubMed

    Radian, Adi; Mishael, Yael G

    2008-03-01

    A novel controlled release formulation (CRF) of the herbicide imazapyr (IMP) was designed to reduce its leaching,which causes soil and water contamination. The anionic herbicide IMP was bound to polydiallyldimethylammonium-chloride (PDADMAC)-montmorillonite composites. PDADMAC adsorption reached a high loading of polymer, which resulted in charge reversal of the clay and promoted IMP binding. The composites were characterized by Fourier transform infrared, zeta potential, and X-ray diffraction measurements, indicating electrostatic interactions of the polycation with the surface, polycation intercalation in the clay and suggesting a configuration as loops and tails on the surface at high loadings. IMP binding to the composites is affected by polycation loading and flocculation. Upon adding high concentrations of IMP to a composite of 0.16 g/g, we obtained high herbicide loadings (66% active ingredient). IMP release from the CRFs applied on a thin layer of soil was substantially slower than its release from the commercial formulation (Arsenal). Accordingly, soil column bioassays indicated reduced herbicide leaching (nearly 2-fold) upon applying the CRFs while maintaining good herbicidal activity. The new PDADMAC-clay formulations are promising from the environmental and weed control management points of view.

  14. Patient-Centred Design of Healthcare Services: Meaningful Events as Basis for Patient Experiences of Families.

    PubMed

    Mannonen, Petri; Kaipio, Johanna; Nieminen, Mika P

    2017-01-01

    Patient experience has become a crucial part of the quality of any healthcare service. Experiences and their structures are not however trivial phenomena that are easy to describe and model. Instead, subjective and dynamic experiences seem to escape definitions and measurements. In order to map the dimensions and dynamics of patient experiences of families, i.e. experiences in families where one or more children are or have been seriously ill, we conducted in depth interviews with 17 parents. Both the interview structure and analysis were based on the technology as experience framework, which states that products and services are not just used but lived with. The results of our study describe patient experiences that are rich and complex yet structurally similar in their manifestations and development. Event-based and situational patient experience emerges through meaningful events relating to the patient's illness. The experiences evolve through new events as well as patient's reflections on past events and in the framing of the current situation. The presented situational patient experience model can be utilized to evaluate and design healthcare services.

  15. Structural basis of glycogen branching enzyme deficiency and pharmacologic rescue by rational peptide design

    PubMed Central

    Froese, D. Sean; Michaeli, Amit; McCorvie, Thomas J.; Krojer, Tobias; Sasi, Meitav; Melaev, Esther; Goldblum, Amiram; Zatsepin, Maria; Lossos, Alexander; Álvarez, Rafael; Escribá, Pablo V.; Minassian, Berge A.; von Delft, Frank; Kakhlon, Or; Yue, Wyatt W.

    2015-01-01

    Glycogen branching enzyme 1 (GBE1) plays an essential role in glycogen biosynthesis by generating α-1,6-glucosidic branches from α-1,4-linked glucose chains, to increase solubility of the glycogen polymer. Mutations in the GBE1 gene lead to the heterogeneous early-onset glycogen storage disorder type IV (GSDIV) or the late-onset adult polyglucosan body disease (APBD). To better understand this essential enzyme, we crystallized human GBE1 in the apo form, and in complex with a tetra- or hepta-saccharide. The GBE1 structure reveals a conserved amylase core that houses the active centre for the branching reaction and harbours almost all GSDIV and APBD mutations. A non-catalytic binding cleft, proximal to the site of the common APBD mutation p.Y329S, was found to bind the tetra- and hepta-saccharides and may represent a higher-affinity site employed to anchor the complex glycogen substrate for the branching reaction. Expression of recombinant GBE1-p.Y329S resulted in drastically reduced protein yield and solubility compared with wild type, suggesting this disease allele causes protein misfolding and may be amenable to small molecule stabilization. To explore this, we generated a structural model of GBE1-p.Y329S and designed peptides ab initio to stabilize the mutation. As proof-of-principle, we evaluated treatment of one tetra-peptide, Leu-Thr-Lys-Glu, in APBD patient cells. We demonstrate intracellular transport of this peptide, its binding and stabilization of GBE1-p.Y329S, and 2-fold increased mutant enzymatic activity compared with untreated patient cells. Together, our data provide the rationale and starting point for the screening of small molecule chaperones, which could become novel therapies for this disease. PMID:26199317

  16. Fundamental basis and implementation of shell and tube heat exchanger project design: condenser and evaporator study

    NASA Astrophysics Data System (ADS)

    Dalkilic, A. S.; Acikgoz, O.; Tapan, S.; Wongwises, S.

    2016-12-01

    A shell and tube heat exchanger is used as a condenser and an evaporator in this theoretical study. Parametric performance analyses for various actual refrigerants were performed using well-known correlations in open sources. Condensation and evaporation were occurred in the shell side while the water was flowing in the tube side of heat exchanger. Heat transfer rate from tube side was kept constant for condenser and evaporator design. Condensing temperatures were varied from 35 to 60 °C whereas evaporating temperatures were ranging from -15 to 10 °C for the refrigerants of R12, R22, R134a, R32, R507A, R404A, R502, R407C, R152A, R410A and R1234ZE. Variation of convective heat transfer coefficients of refrigerants, total heat transfer coefficients with Reynolds numbers and saturation temperatures were given as validation process considering not only fouling resistance and omission of it but also staggered (triangular) and line (square) arrangements. The minimum tube lengths and necessary pumping powers were calculated and given as case studies for the investigated refrigerants considering validation criteria. It was understood that refrigerant type, fouling resistance and arrangement type are one of the crucial issues regarding the determination of heat exchanger's size and energy consumption. Consequently, R32 and R152a were found to require the shortest tube length and lowest pumping power in the condenser, whereas R507 and R407C have the same advantages in the evaporator. Their heat transfer coefficients were also determined larger than others as expectedly.

  17. Extreme load alleviation using industrial implementation of active trailing edge flaps in a full design load basis

    NASA Astrophysics Data System (ADS)

    Barlas, Thanasis; Pettas, Vasilis; Gertz, Drew; Madsen, Helge A.

    2016-09-01

    The application of active trailing edge flaps in an industrial oriented implementation is evaluated in terms of capability of alleviating design extreme loads. A flap system with basic control functionality is implemented and tested in a realistic full Design Load Basis (DLB) for the DTU 10MW Reference Wind Turbine (RWT) model and for an upscaled rotor version in DTU's aeroelastic code HAWC2. The flap system implementation shows considerable potential in reducing extreme loads in components of interest including the blades, main bearing and tower top, with no influence on fatigue loads and power performance. In addition, an individual flap controller for fatigue load reduction in above rated power conditions is also implemented and integrated in the general controller architecture. The system is shown to be a technology enabler for rotor upscaling, by combining extreme and fatigue load reduction.

  18. The gentle art of threat assessment.

    PubMed

    Vellani, Karim H

    2007-01-01

    Accurate threat assessments are essential to designing a program that protects hospital assets, patients, staff, and visitors. The article reviews the sources used to quantify and qualify threats to hospitals including those that are relevant and those that are less relevant.

  19. Geological and seismological survey for new design-basis earthquake ground motion of Kashiwazaki-Kariwa NPS

    NASA Astrophysics Data System (ADS)

    Takao, M.; Mizutani, H.

    2009-05-01

    At about 10:13 on July 16, 2007, a strong earthquake named 'Niigata-ken Chuetsu-oki Earthquake' of Mj6.8 on Japan Meteorological Agencyfs scale occurred offshore Niigata prefecture in Japan. However, all of the nuclear reactors at Kashiwazaki-Kariwa Nuclear Power Station (KKNPS) in Niigata prefecture operated by Tokyo Electric Power Company shut down safely. In other words, automatic safety function composed of shutdown, cooling and containment worked as designed immediately after the earthquake. During the earthquake, the peak acceleration of the ground motion exceeded the design-basis ground motion (DBGM), but the force due to the earthquake applied to safety-significant facilities was about the same as or less than the design basis taken into account as static seismic force. In order to assess anew the safety of nuclear power plants, we have evaluated a new DBGM after conducting geomorphological, geological, geophysical, seismological survey and analyses. [Geomorphological, Geological and Geophysical survey] In the land area, aerial photograph interpretation was performed at least within the 30km radius to extract geographies that could possibly be tectonic reliefs as a geomorphological survey. After that, geological reconnaissance was conducted to confirm whether the extracted landforms are tectonic reliefs or not. Especially we carefully investigated Nagaoka Plain Western Boundary Fault Zone (NPWBFZ), which consists of Kakuda-Yahiko fault, Kihinomiya fault and Katakai fault, because NPWBFZ is the one of the active faults which have potential of Mj8 class in Japan. In addition to the geological survey, seismic reflection prospecting of approximate 120km in total length was completed to evaluate the geological structure of the faults and to assess the consecutiveness of the component faults of NPWBFZ. As a result of geomorphological, geological and geophysical surveys, we evaluated that the three component faults of NPWBFZ are independent to each other from the

  20. Design and Engineering of a Multi-Target (Multiplex) DNA Simulant to Evaluate Nulceic Acid Based Assays for Detection of Biological Threat Agents

    DTIC Science & Technology

    2006-11-01

    Using the actual bio-threat agents for testing is impractical since producing a number of different threat bacteria and viruses, isolating and...Brucella species are recognized as potential agricultural, civilian, and military bioterrorism agents. Rickettsia are classified into two groups; the...spotted fever group (SFG), which includes R. conorii, R. sibirica, and R. rickettsii , and the typhus group (TG), which includes R. prowazekii and R

  1. PWR-related integral safety experiments in the PKL 111 test facility SBLOCA under beyond-design-basis accident conditions

    SciTech Connect

    Weber, P.; Umminger, K.J.; Schoen, B.

    1995-09-01

    The thermal hydraulic behavior of a PWR during beyond-design-basis accident scenarios is of vital interest for the verification and optimization of accident management procedures. Within the scope of the German reactor safety research program experiments were performed in the volumetrically scaled PKL 111 test facility by Siemens/KWU. This highly instrumented test rig simulates a KWU-design PWR (1300 MWe). In particular, the latest tests performed related to a SBLOCA with additional system failures, e.g. nitrogen entering the primary system. In the case of a SBLOCA, it is the goal of the operator to put the plant in a condition where the decay heat can be removed first using the low pressure emergency core cooling system and then the residual heat removal system. The experimental investigation presented assumed the following beyond-design-basis accident conditions: 0.5% break in a cold leg, 2 of 4 steam generators (SGs) isolated on the secondary side (feedwater- and steam line-valves closed), filled with steam on the primary side, cooldown of the primary system using the remaining two steam generators, high pressure injection system only in the two loops with intact steam generators, if possible no operator actions to reach the conditions for residual heat removal system activation. Furthermore, it was postulated that 2 of the 4 hot leg accumulators had a reduced initial water inventory (increased nitrogen inventory), allowing nitrogen to enter the primary system at a pressure of 15 bar and nearly preventing the heat transfer in the SGs ({open_quotes}passivating{close_quotes} U-tubes). Due to this the heat transfer regime in the intact steam generators changed remarkably. The primary system showed self-regulating system effects and heat transfer improved again (reflux-condenser mode in the U-tube inlet region).

  2. An Innovative High-Tech Acupuncture Product: SXDZ-100 Nerve Muscle Stimulator, Its Theoretical Basis, Design, and Application

    PubMed Central

    Gao, Xinyan; Rong, Peijing; Li, Liang; He, Wei; Ben, Hui; Zhu, Bing

    2012-01-01

    We introduce the theoretical basis, design, and application of a patented innovative high-tech product, SXDZ-100 nerve and muscle stimulator. This product is featured with a built-in chip containing transcoding information from different acupuncture manipulation collected from the wide dynamic neurons (WDR) in the spinal dorsal horn in animal experiments, which is bioinformation feedback therapy. The discharges of WDR neurons excited by different manipulations are analyzed using chaos theory in this study. It combines the advantages of manual acupuncture (MA) like no receptor adaptation and treatment individualization and that of electroacupuncture (EA) such as relatively low stimulation intensity and good quantification and thus makes it more effective than common stimulators in acupuncture clinic. PMID:22454672

  3. An Innovative High-Tech Acupuncture Product: SXDZ-100 Nerve Muscle Stimulator, Its Theoretical Basis, Design, and Application.

    PubMed

    Gao, Xinyan; Rong, Peijing; Li, Liang; He, Wei; Ben, Hui; Zhu, Bing

    2012-01-01

    We introduce the theoretical basis, design, and application of a patented innovative high-tech product, SXDZ-100 nerve and muscle stimulator. This product is featured with a built-in chip containing transcoding information from different acupuncture manipulation collected from the wide dynamic neurons (WDR) in the spinal dorsal horn in animal experiments, which is bioinformation feedback therapy. The discharges of WDR neurons excited by different manipulations are analyzed using chaos theory in this study. It combines the advantages of manual acupuncture (MA) like no receptor adaptation and treatment individualization and that of electroacupuncture (EA) such as relatively low stimulation intensity and good quantification and thus makes it more effective than common stimulators in acupuncture clinic.

  4. After Action Report:Idaho National Laboratory (INL) 2014 Multiple Facility Beyond Design Basis (BDBE) Evaluated Drill October 21, 2014

    SciTech Connect

    Barnes, V. Scott

    2014-12-01

    On October 21, 2014, Idaho National Laboratory (INL), in coordination with local jurisdictions, and Department of Energy (DOE) Idaho Operations Office (DOE ID) conducted an evaluated drill to demonstrate the ability to implement the requirements of DOE O 151.1C, “Comprehensive Emergency Management System” when responding to a beyond design basis event (BDBE) scenario as outlined in the Office of Health, Safety, and Security Operating Experience Level 1 letter (OE-1: 2013-01). The INL contractor, Battelle Energy Alliance, LLC (BEA), in coordination with CH2M-WG Idaho, LLC (CWI), and Idaho Treatment Group LLC (ITG), successfully demonstrated appropriate response measures to mitigate a BDBE event that would impact multiple facilities across the INL while protecting the health and safety of personnel, the environment, and property. Offsite response organizations participated to demonstrate appropriate response measures.

  5. Development of Site-Specific Soil Design Basis Earthquake (DBE) Parameters for the Integrated Waste Treatment Unit (IWTU)

    SciTech Connect

    Payne, Suzette

    2008-08-01

    Horizontal and vertical PC 3 (2,500 yr) Soil Design Basis Earthquake (DBE) 5% damped spectra, corresponding time histories, and strain-compatible soil properties were developed for the Integrated Waste Treatment Unit (IWTU). The IWTU is located at the Idaho Nuclear Technology and Engineering Center (INTEC) at the Idaho National Laboratory (INL). Mean and 84th percentile horizontal DBE spectra derived from site-specific site response analyses were evaluated for the IWTU. The horizontal and vertical PC 3 (2,500 yr) Soil DBE 5% damped spectra at the 84th percentile were selected for Soil Structure Interaction (SSI) analyses at IWTU. The site response analyses were performed consistent with applicable Department of Energy (DOE) Standards, recommended guidance of the Nuclear Regulatory Commission (NRC), American Society of Civil Engineers (ASCE) Standards, and recommendations of the Blue Ribbon Panel (BRP) and Defense Nuclear Facilities Safety Board (DNFSB).

  6. 105-K Basin Material Design Basis Feed Description for Spent Nuclear Fuel (SNF) Project Facilities VOL 1 Fuel

    SciTech Connect

    PACKER, M.J.

    1999-11-04

    Metallic uranium Spent Nuclear Fuel (SNF) is currently stored within two water filled pools, 105-KE Basin (KE Basin) and 105-KW Basin (KW Basin), at the United States Department of Energy (U.S. DOE) Hanford Site, in southeastern Washington State. The Spent Nuclear Fuel Project (SNF Project) is responsible to DOE for operation of these fuel storage pools and for the 2100 metric tons of SNF materials that they contain. The SNF Project mission includes safe removal and transportation of all SNF from these storage basins to a new storage facility in the 200 East Area. To accomplish this mission, the SNF Project modifies the existing KE Basin and KW Basin facilities and constructs two new facilities: the 100 K Area Cold Vacuum Drying Facility (CVDF), which drains and dries the SNF; and the 200 East Area Canister Storage Building (CSB), which stores the SNF. The purpose of this document is to describe the design basis feed compositions for materials stored or processed by SNF Project facilities and activities. This document is not intended to replace the Hanford Spent Fuel Inventory Baseline (WHC 1994b), but only to supplement it by providing more detail on the chemical and radiological inventories in the fuel (this volume) and sludge. A variety of feed definitions is required to support evaluation of specific facility and process considerations during the development of these new facilities. Six separate feed types have been identified for development of new storage or processing facilities. The approach for using each feed during design evaluations is to calculate the proposed facility flowsheet assuming each feed. The process flowsheet would then provide a basis for material compositions and quantities which are used in follow-on calculations.

  7. Design of serum-free medium for suspension culture of CHO cells on the basis of general commercial media.

    PubMed

    Miki, Hideo; Takagi, Mutsumi

    2015-08-01

    The design of serum-free media for suspension culture of genetically engineered Chinese hamster ovary (CHO) cells using general commercial media as a basis was investigated. Subcultivation using a commercial serum-free medium containing insulin-like growth factor (IGF)-1 with or without FCS necessitated additives other than IGF-1 to compensate for the lack of FCS and improve cell growth. Suspension culture with media containing several combinations of growth factors suggested the effectiveness of addition of both IGF-1 and the lipid signaling molecule lysophosphatidic acid (LPA) for promoting cell growth. Subcultivation of CHO cells in suspension culture using the commercial serum-free medium EX-CELL™302, which contained an IGF-1 analog, supplemented with LPA resulted in gradually increasing specific growth rate comparable to the serum-containing medium and in almost the same high antibody production regardless of the number of generations. The culture with EX-CELL™302 supplemented with LPA in a jar fermentor with pH control at 6.9 showed an apparently higher cell growth rate than the cultures without pH control and with pH control at 6.8. The cell growth in the medium supplemented with aurintricarboxylic acid (ATA), which was much cheaper than IGF-1, in combination with LPA was synergistically promoted similarly to that in the medium supplemented with IGF-1 and LPA. In conclusion, the serum-free medium designed on the basis of general commercial media could support the growth of CHO cells and antibody production comparable to serum-containing medium in suspension culture. Moreover, the possibility of cost reduction by the substitution of IGF-1 with ATA was also shown.

  8. Insider Threat Data Sharing

    DTIC Science & Technology

    2016-09-01

    To combat this threat, organizations have created departments with trained analysts whose sole purpose is to deter, detect, and mitigate the insider...to supervisors for mitigation . When organizations share insider threat information among each other, it can improve all organizations abilities to...deter, detect, or mitigate the insider threat. The challenge lies in merging external and existing data with as little human interaction as possible

  9. Open literature review of threats including sabotage and theft of fissile material transport in Japan.

    SciTech Connect

    Cochran, John Russell; Furaus, James Phillip; Marincel, Michelle K.

    2005-06-01

    This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically and religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty.

  10. Healthcare Stereotype Threat in Older Adults in the Health and Retirement Study.

    PubMed

    Abdou, Cleopatra M; Fingerhut, Adam W; Jackson, James S; Wheaton, Felicia

    2016-02-01

    Healthcare stereotype threat is the threat of being personally reduced to group stereotypes that commonly operate within the healthcare domain, including stereotypes regarding unhealthy lifestyles and inferior intelligence. The objective of this study was to assess the extent to which people fear being judged in healthcare contexts on several characteristics, including race/ethnicity and age, and to test predictions that experience of such threats would be connected with poorer health and negative perceptions of health care. Data were collected as part of the 2012 Health and Retirement Study (HRS). A module on healthcare stereotype threat, designed by the research team, was administered to a random subset (n=2,048 of the total 20,555) of HRS participants. The final sample for the present healthcare stereotype threat experiment consists of 1,479 individuals. Logistic regression was used to test whether healthcare stereotype threat was associated with self-rated health, reported hypertension, and depressive symptoms, as well as with healthcare-related outcomes, including physician distrust, dissatisfaction with health care, and preventative care use. Seventeen percent of respondents reported healthcare stereotype threat with respect to one or more aspects of their identities. As predicted, healthcare stereotype threat was associated with higher physician distrust and dissatisfaction with health care, poorer mental and physical health (i.e., self-rated health, hypertension, and depressive symptoms), and lower odds of receiving the influenza vaccine. The first of its kind, this study demonstrates that people can experience healthcare stereotype threat on the basis of various stigmatized aspects of social identity, and that these experiences can be linked with larger health and healthcare-related outcomes, thereby contributing to disparities among minority groups. Copyright © 2016. Published by Elsevier Inc.

  11. Design of cognitive engine for cognitive radio based on the rough sets and radial basis function neural network

    NASA Astrophysics Data System (ADS)

    Yang, Yanchao; Jiang, Hong; Liu, Congbin; Lan, Zhongli

    2013-03-01

    Cognitive radio (CR) is an intelligent wireless communication system which can dynamically adjust the parameters to improve system performance depending on the environmental change and quality of service. The core technology for CR is the design of cognitive engine, which introduces reasoning and learning methods in the field of artificial intelligence, to achieve the perception, adaptation and learning capability. Considering the dynamical wireless environment and demands, this paper proposes a design of cognitive engine based on the rough sets (RS) and radial basis function neural network (RBF_NN). The method uses experienced knowledge and environment information processed by RS module to train the RBF_NN, and then the learning model is used to reconfigure communication parameters to allocate resources rationally and improve system performance. After training learning model, the performance is evaluated according to two benchmark functions. The simulation results demonstrate the effectiveness of the model and the proposed cognitive engine can effectively achieve the goal of learning and reconfiguration in cognitive radio.

  12. The compartment bag test (CBT) for enumerating fecal indicator bacteria: Basis for design and interpretation of results.

    PubMed

    Gronewold, Andrew D; Sobsey, Mark D; McMahan, Lanakila

    2017-06-01

    For the past several years, the compartment bag test (CBT) has been employed in water quality monitoring and public health protection around the world. To date, however, the statistical basis for the design and recommended procedures for enumerating fecal indicator bacteria (FIB) concentrations from CBT results have not been formally documented. Here, we provide that documentation following protocols for communicating the evolution of similar water quality testing procedures. We begin with an overview of the statistical theory behind the CBT, followed by a description of how that theory was applied to determine an optimal CBT design. We then provide recommendations for interpreting CBT results, including procedures for estimating quantiles of the FIB concentration probability distribution, and the confidence of compliance with recognized water quality guidelines. We synthesize these values in custom user-oriented 'look-up' tables similar to those developed for other FIB water quality testing methods. Modified versions of our tables are currently distributed commercially as part of the CBT testing kit.

  13. Assessment of precast beam-column using capacity demand response spectrum subject to design basis earthquake and maximum considered earthquake

    NASA Astrophysics Data System (ADS)

    Ghani, Kay Dora Abd.; Tukiar, Mohd Azuan; Hamid, Nor Hayati Abdul

    2017-08-01

    Malaysia is surrounded by the tectonic feature of the Sumatera area which consists of two seismically active inter-plate boundaries, namely the Indo-Australian and the Eurasian Plates on the west and the Philippine Plates on the east. Hence, Malaysia experiences tremors from far distant earthquake occurring in Banda Aceh, Nias Island, Padang and other parts of Sumatera Indonesia. In order to predict the safety of precast buildings in Malaysia under near field ground motion the response spectrum analysis could be used for dealing with future earthquake whose specific nature is unknown. This paper aimed to develop of capacity demand response spectrum subject to Design Basis Earthquake (DBE) and Maximum Considered Earthquake (MCE) in order to assess the performance of precast beam column joint. From the capacity-demand response spectrum analysis, it can be concluded that the precast beam-column joints would not survive when subjected to earthquake excitation with surface-wave magnitude, Mw, of more than 5.5 Scale Richter (Type 1 spectra). This means that the beam-column joint which was designed using the current code of practice (BS8110) would be severely damaged when subjected to high earthquake excitation. The capacity-demand response spectrum analysis also shows that the precast beam-column joints in the prototype studied would be severely damaged when subjected to Maximum Considered Earthquake (MCE) with PGA=0.22g having a surface-wave magnitude of more than 5.5 Scale Richter, or Type 1 spectra.

  14. Cyber Intelligence Threat Prioritization

    DTIC Science & Technology

    2014-10-01

    possible direction of their behavior. and determines their interest in targeting the organization. t Intrinsic (personally rewarding) Extrinsic (receive...actors resources. Money People Tools Training Motive Why do threat actors attack? Determining an actor’s motive provides insight into the...platform that allows anyone to make their organization more visible to threat actors. Online Presence Extracurricular Activities Motive Risk

  15. Country Threat File Codebook

    DTIC Science & Technology

    1975-01-01

    are atent threats, national nd or carry out threats ndencles that restrict cal1y and pol 111cal1y rganlzations that might t ion. There are...economic competition, trade deficits , disputed territories, control of waterways, coup d’etats, breaking of diplomatic relations, withdrawal from

  16. Possible Methods to Estimate Core Location in a Beyond-Design-Basis Accident at a GE BWR with a Mark I Containment Stucture

    SciTech Connect

    Walston, S; Rowland, M; Campbell, K

    2011-07-27

    It is difficult to track to the location of a melted core in a GE BWR with Mark I containment during a beyond-design-basis accident. The Cooper Nuclear Station provided a baseline of normal material distributions and shielding configurations for the GE BWR with Mark I containment. Starting with source terms for a design-basis accident, methods and remote observation points were investigated to allow tracking of a melted core during a beyond-design-basis accident. The design of the GE BWR with Mark-I containment highlights an amazing poverty of expectations regarding a common mode failure of all reactor core cooling systems resulting in a beyond-design-basis accident from the simple loss of electric power. This design is shown in Figure 1. The station blackout accident scenario has been consistently identified as the leading contributor to calculated probabilities for core damage. While NRC-approved models and calculations provide guidance for indirect methods to assess core damage during a beyond-design-basis loss-of-coolant accident (LOCA), there appears to be no established method to track the location of the core directly should the LOCA include a degree of fuel melt. We came to the conclusion that - starting with detailed calculations which estimate the release and movement of gaseous and soluble fission products from the fuel - selected dose readings in specific rooms of the reactor building should allow the location of the core to be verified.

  17. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    ERIC Educational Resources Information Center

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  18. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    ERIC Educational Resources Information Center

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  19. Criteria for calculating the efficiency of deep-pleated HEPA filters with aluminum separators during and after design basis accidents

    SciTech Connect

    Bergman, W.; First, M.W.; Anderson, W.L.

    1995-02-01

    We have reviewed the literature on the performance of HEPA filters under normal and abnormal conditions to establish criteria for calculating the efficiency of HEPA filters in a DOE nonreactor nuclear facility during and after a Design Basis Accident (DBA). This study is only applicable to the standard deep-pleated HEPA filter with aluminum separators as specified in ASME N509[1]. Other HEPA filter designs such as the mini-pleat and separatorless filters are not included in this study. The literature review included the performance of new filters and parameters that may cause deterioration in the filter performance such as filter age, radiation, corrosive chemicals, seismic and rough handling, high temperature, moisture, particle clogging, high air flow and pressure pulses. The deterioration of the filter efficiency depends on the exposure parameters; in severe exposure conditions the filter will be damaged and have a residual efficiency of 0%. There are large gaps and limitations in the data that introduce significant error in the estimates of HEPA filter efficiencies under DBA conditions. Because of this limitation, conservative values of filter efficiency were chosen. The estimation of the efficiency of the HEPA filters under DBA conditions involves three steps: (1) The filter pressure drop and environmental parameters are determined during and after the DBA, (2) Comparing the filter pressure drop to a set of threshold values above which the filter is damaged. There is a different threshold value for each combination of environmental parameters, and (3) Determining the filter efficiency. If the filter pressure drop is greater than the threshold value, the filter is damaged and is assigned 0% efficiency. If the pressure drop is less, then the filter is not damaged and the efficiency is determined from literature values of the efficiency at the environmental conditions.

  20. Criteria for calculating the efficiency of deep-pleated HEPA filters with aluminum separators during and after design basis accidents

    SciTech Connect

    Bergman, W.; First, M.W.; Anderson, W.L.; Gilbert, H.; Jacox, J.W.

    1995-02-01

    The authors have reviewed the literature on the performance of high efficiency particulate air (HEPA) filters under normal and abnormal conditions to establish criteria for calculating the efficiency of HEPA filters in a DOE nonreactor nuclear facility during and after a Design Basis Accident (DBA). This study is only applicable to the standard deep-pleated HEPA filter with aluminum separators as specified in ASME N509. The literature review included the performance of new filters and parameters that may cause deterioration in the filter performance such as filter age, radiation, corrosive chemicals, seismic and rough handling, high temperature, moisture, particle clogging, high air flow and pressure pulses. The deterioration of the filter efficiency depends on the exposure parameters; in severe exposure conditions the filter will be structurally damaged and have a residual efficiency of 0%. Despite the many studies on HEPA filter performance under adverse conditions, there are large gaps and limitations in the data that introduce significant error in the estimates of HEPA filter efficiencies under DBA conditions. Because of this limitation, conservative values of filter efficiency were chosen when there was insufficient data.

  1. Facing ambiguous threats.

    PubMed

    Roberto, Michael A; Bohmer, Richard M J; Edmondson, Amy C

    2006-11-01

    On February 1, 2003, the world watched in horror as the Columbia space shuttle broke apart while reentering the earth's atmosphere, killing all seven astronauts. Some have argued that NASA's failure to respond with appropriate intensity to the so-called foam strike that led to the accident was evidence of irresponsible or incompetent management. The authors' research, however, suggests that NASA was exhibiting a natural, albeit unfortunate, pattern of behavior common in many organizations. The foam strike is a prime example of what the authors call an ambiguous threat-a signal that may or may not portend future harm. Ambiguous threats differ from threats with obvious causes-say, a fire in the building-for which the response is clear. They also differ from unmistakable threats that may lack straightforward response paths (such as the frightening oxygen-tank explosion aboard Apollo 13). However, when the warning sign is ambiguous and the threat's potential effect is unclear, managers may choose to ignore or discount the risk. Such an approach can be catastrophic. Firms that do a good job of dealing with ambiguous threats do not improvise during a crisis; rather, they apply a rigorous set of detection and response capabilities that they have developed and practiced beforehand. In this article, the authors outline how to put such capabilities in place long before a crisis strikes. First, companies need to hone their teamwork and rapid problem-solving skills through practice. Second, they must learn to recognize weak signals, amplify the threat, and encourage employees to ask disconcerting "what if" questions in a safe environment. Finally, they should explore possible responses to threats through quick, low-cost experimentation.

  2. Poland and Global Threats

    NASA Astrophysics Data System (ADS)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  3. Analysis of main steam isolation valve leakage in design basis accidents using MELCOR 1.8.6 and RADTRAD.

    SciTech Connect

    Salay, Michael; Kalinich, Donald A.; Gauntt, Randall O.; Radel, Tracy E.

    2008-10-01

    Analyses were performed using MELCOR and RADTRAD to investigate main steam isolation valve (MSIV) leakage behavior under design basis accident (DBA) loss-of-coolant (LOCA) conditions that are presumed to have led to a significant core melt accident. Dose to the control room, site boundary and LPZ are examined using both approaches described in current regulatory guidelines as well as analyses based on best estimate source term and system response. At issue is the current practice of using containment airborne aerosol concentrations as a surrogate for the in-vessel aerosol concentration that exists in the near vicinity of the MSIVs. This study finds current practice using the AST-based containment aerosol concentrations for assessing MSIV leakage is non-conservative and conceptually in error. A methodology is proposed that scales the containment aerosol concentration to the expected vessel concentration in order to preserve the simplified use of the AST in assessing containment performance under assumed DBA conditions. This correction is required during the first two hours of the accident while the gap and early in-vessel source terms are present. It is general practice to assume that at {approx}2hrs, recovery actions to reflood the core will have been successful and that further core damage can be avoided. The analyses performed in this study determine that, after two hours, assuming vessel reflooding has taken place, the containment aerosol concentration can then conservatively be used as the effective source to the leaking MSIV's. Recommendations are provided concerning typical aerosol removal coefficients that can be used in the RADTRAD code to predict source attenuation in the steam lines, and on robust methods of predicting MSIV leakage flows based on measured MSIV leakage performance.

  4. Insider Threat Specification as a Threat Mitigation Technique

    NASA Astrophysics Data System (ADS)

    Magklaras, George; Furnell, Steven

    Insider threats come in many facets and nuances. This results in two major problems: mining big amounts of data for evidence of an insider attack, and keeping track of different aspects of threats is very cumbersome. To enable techniques that support detection of insider threats as early as possible, one needs mechanisms to automate significant parts of the detection process, and that allow to specify what is meant by insider threat. This chapter describes the Insider Threat Prediction Specification Language (ITPSL), a research effort to address the description of threat factors as a mechanism to mitigate insider threats.

  5. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    PubMed

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  6. Combatting Insider Threats

    NASA Astrophysics Data System (ADS)

    Neumann, Peter G.

    Risks from insider threats are strongly context dependent, and arise in many ways at different layers of system abstraction for different types of systems. We discuss various basic characteristics of insider threats, and consider approaches to the development and use of computer-related environments that require systems and networking to be trustworthy in spite of insider misuse. We also consider future research that could improve both detectability, prevention, and response. This chapter seeks to cope with insider misuse in a broad range of application domains - for example, critical infrastructures, privacy-preserving database systems, financial systems, and interoperable health-care infrastructures. To illustrate this, we apply the principles considered here to the task of detecting and preventing insider misuse in systems that might be used to facilitate trustworthy elections. This discussion includes an examination of the relevance of the Saltzer-Schroeder-Kaashoek security principles and the Clark-Wilson integrity properties for end-to-end election integrity. Trustworthy system developments must consider insider misuse as merely one set of threats that must be addressed consistently together with many other threats such as penetrations, denials of service, system faults and failures, and other threats to survivability. In addition, insider misuse cannot be realistically addressed unless significant improvements are made in the trustworthiness of component systems and their networking as well as their predictably trustworthy compositions into enterprise solutions - architecturally, developmentally, and operationally.

  7. Counter-terrorism threat prediction architecture

    NASA Astrophysics Data System (ADS)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  8. [Study on efficacy of compatibility between aconiti radix cocta and Pinelliae Rhizoma on basis of uniform design method].

    PubMed

    Liu, Chun-Fang; Tan, Shu-Fang; Wang, Dan-Hua; Zhang, Yan-Qiong; Lin, Na

    2013-07-01

    To study the effect of Aconiti Radix Cocta and Pinelliae Rhizoma with different matching proportions and doses on their analgic, anti-inflammatory, phlegm eliminating and cough relieving efficacies in mice. The two-factor, seven-level uniform design method was adopted to observe the effect of the oral administration with the combined decoction on the analgic, anti-inflammatory, phlegm eliminating and cough relieving efficacies, with frequency of body torsions induced by acetum, ear swelling degree induced by dimethylbenzene, secretion of phenol red in tracheas and frequency of coughs induced by aqueous ammonia as indexes. Significant matching proportions and doses were collected for verification. (1) The effect on the frequency of body torsions and ear swelling degree. The combined decoction could effectively reduce the frequency of body torsions and ear swelling degree. According to a regression analysis, Aconiti Radix Cocta and Pinelliae Rhizoma had the antagonism, which was maximized at the ratio of 10: 1, and minimized at the ratio of less than or equal to 1: 1. The frequency of body torsions and ear swelling degree increased first and then decreased along with the rise in the total dose; and a higher proportion of Aconiti Radix Cocta resulted in a faster speed in decrease or increase. (2) The effect on the secretion of phenol red in tracheas and frequency of coughs. The combined decoction could effectively increase the secretion of phenol red in tracheas and decrease the frequency of coughs. According to a regression analysis, Pinelliae Rhizoma and Aconiti Radix Cocta had the synergistic effect in the secretion of phenol red in tracheas, which was maximized with a total dose of more than 5 g x kg(-1) and a ratio of 1: 1. The compatible application of Pinelliae Rhizoma and Aconiti Radix Cocta can decrease the analgesic and anti-inflammatory effects of Aconiti Radix Cocta and promote the cough-relieving effect of Pinelliae Rhizoma, which vary according to

  9. Ancient woodlands: modern threats.

    PubMed

    Rackham, Oliver

    2008-01-01

    This review discusses the following adverse influences on long-established forests, wood-pastures, and savannas in Europe and other continents: destruction and fragmentation; depletion; pollution and eutrophication; fire and lack of fire; excessive shade; excessive numbers of deer; invasive species and cultivars; infilling of savanna; climate change; and globalization of plant diseases. Human influences on the world's mainland forests and savannas have been pervasive throughout the Holocene, to the extent that recovering 'virgin forest' becomes a somewhat nebulous conservation objective. Present and future threats arise both from increasing human activities and from withdrawal of the human activities that have shaped forests in the past. The severity of different threats depends on so many factors, especially the properties of different plants and animals, that generalization is impossible; however, in the long term, spread of pathogens is probably the most serious threat.

  10. Credible threats and promises.

    PubMed

    McNamara, John M; Houston, Alasdair I

    2002-11-29

    We consider various implications of information about the other player in two-player evolutionary games. A simple model of desertion shows that information about the partner's behaviour can be disadvantageous, and highlights the idea of credible threats. We then discuss the general issue of whether the partner can convince the focal player that it will behave in a specific way, i.e. whether the focal player can make credible threats or promises. We show that when desertion decisions depend on reserves, a player can manipulate its reserves so as to create a credible threat of desertion. We then extend previous work on the evolution of trust and commitment, discussing conditions under which it is advantageous to assume that a partner will behave in a certain way even though it is not in its best interest.

  11. Credible threats and promises.

    PubMed Central

    McNamara, John M; Houston, Alasdair I

    2002-01-01

    We consider various implications of information about the other player in two-player evolutionary games. A simple model of desertion shows that information about the partner's behaviour can be disadvantageous, and highlights the idea of credible threats. We then discuss the general issue of whether the partner can convince the focal player that it will behave in a specific way, i.e. whether the focal player can make credible threats or promises. We show that when desertion decisions depend on reserves, a player can manipulate its reserves so as to create a credible threat of desertion. We then extend previous work on the evolution of trust and commitment, discussing conditions under which it is advantageous to assume that a partner will behave in a certain way even though it is not in its best interest. PMID:12495517

  12. Cognitive appraisals of stereotype threat.

    PubMed

    Berjot, S; Roland-Levy, C; Girault-Lidvan, N

    2011-04-01

    Using the cognitive appraisal conceptualisation of the transactional model of stress, the goal was to assess how victims of stereotype threat respond to this situation in terms of primary appraisals (threat/challenge) and to investigate whether those appraisals may mediate the relation between stereotype threat and performance. Results show that, while participants from North Africa living in France did appraise the situation more as a threat and less as a challenge, only challenge appraisal mediated between stereotype threat and performance.

  13. Environmental Threats at School

    ERIC Educational Resources Information Center

    Green, Twhanna

    2005-01-01

    Children can be exposed to dangerous chemicals and toxins in the most unlikely of places: Their schools. This brief article describes the types of threats that school environments pose to students' health, including such pollution and chemical exposures as lead, mercury, arsenic, molds, and poor indoor air quality. The article provides tips for…

  14. Proliferation: Threat and response

    SciTech Connect

    1996-04-01

    ;Table of Contents: Section I: The Regional Proliferation Challenge; Northeast Asia; The Middle East and North Africa; The Former Soviet Union: Russia, Ukrane, Kazakstan, And Belarus; South Asia; The International Threat: Dangers from Terrorism, Insurgencies, Civil Wars, And Organized Crime; Section II: Department of Defense Response; Technical Annex: Accessible Technologies; Glossary.

  15. Environmental Threats at School

    ERIC Educational Resources Information Center

    Green, Twhanna

    2005-01-01

    Children can be exposed to dangerous chemicals and toxins in the most unlikely of places: Their schools. This brief article describes the types of threats that school environments pose to students' health, including such pollution and chemical exposures as lead, mercury, arsenic, molds, and poor indoor air quality. The article provides tips for…

  16. Threat Assessment Plans

    ERIC Educational Resources Information Center

    Pascopella, Angela

    2008-01-01

    With every new case of school violence, district leaders are urged to be proactive in hopes of averting potential violence. Experts say part of that proactive work comes from a threat assessment plan that every district should have. While every district that receives funds from the U.S. Department of Education for school safety is required to have…

  17. Threat in dreams: an adaptation?

    PubMed

    Malcolm-Smith, Susan; Solms, Mark; Turnbull, Oliver; Tredoux, Colin

    2008-12-01

    Revonsuo's influential Threat Simulation Theory (TST) predicts that people exposed to survival threats will have more threat dreams, and evince enhanced responses to dream threats, compared to those living in relatively safe conditions. Participants in a high crime area (South Africa: n=208) differed significantly from participants in a low crime area (Wales, UK: n=116) in having greater recent exposure to a life-threatening event (chi([1,N=186])(2)=14.84, p<.00012). Contrary to TST's predictions, the SA participants reported significantly fewer threat dreams (chi([1,N=287])(2)=6.11, p<.0134), and did not differ from the Welsh participants in responses to dream threats (Fisher's Exact test, p=.2478). Overall, the incidence of threat in dreams was extremely low-less than 20% of dreams featured realistic survival threats. Escape from dream threats occurred in less than 2% of dreams. We conclude that this evidence contradicts key aspects of TST.

  18. An Information Fusion Framework for Threat Assessment

    SciTech Connect

    Beaver, Justin M; Kerekes, Ryan A; Treadwell, Jim N

    2009-01-01

    Modern enterprises are becoming increasingly sensitive to the potential destructive power of small groups or individuals with malicious intent. In response, significant investments are being made in developing a means to assess the likelihood of certain threats to their enterprises. Threat assessment needs are typically focused in very specific application areas where current processes rely heavily on human analysis to both combine any available data and draw conclusions about the probability of a threat. A generic approach to threat assessment is proposed, including a threat taxonomy and decision-level information fusion framework, that provides a computational means for merging multi-modal data for the purpose of assessing the presence of a threat. The framework is designed for flexibility, and intentionally accounts for the accuracy of each data source, given the environmental conditions, in order to manage the uncertainty associated with any acquired data. The taxonomy and information fusion framework is described, and discussed in the context of real-world applications such as shipping container security and cyber security.

  19. American National Standard: design basis for protection of light water nuclear power plants against effects of postulated pipe rupture

    SciTech Connect

    Not Available

    1980-12-31

    This standard addresses the design bases for light water reactor, nuclear power plant structures and components essential for the protection of public health and safety from the potential adverse effects of pipe whip, jet impingement, pressurization of compartments outside containment, environmental conditions and flooding associated with a postulated pipe rupture. The design bases for missile protection and the design bases for containment pressurization are not within this standard.

  20. Investigation, comparison and design of chambers used in centrifugal partition chromatography on the basis of flow pattern and separation experiments.

    PubMed

    Schwienheer, C; Merz, J; Schembecker, G

    2015-04-17

    In centrifugal partition chromatography (CPC) the separation efficiency is mainly influenced by the hydrodynamic of mobile and stationary phase in the chambers. Thus, the hydrodynamic has to be investigated and understood in order to enhance a CPC separation run. Different chamber geometries have been developed in the past and the influence of several phase systems and CPC operating conditions were investigated for these chambers. However, a direct comparison between the different chamber types has not been performed yet. In order to investigate the direct influence of the chamber design on the hydrodynamic, several chamber designs - partially similar in geometry to commercial available designs - are investigated under standardized conditions in the present study. The results show the influence of geometrical aspects of the chamber design on the hydrodynamic and therewith, on the separation efficiency. As a conclusion of the present study, some ideas for an optimal chamber design for laboratory and industrial purpose are proposed.

  1. Pollution: a global threat.

    PubMed

    McCrink-Goode, Melissa

    2014-07-01

    Over the past several decades, several large-scale seemingly unrelated events have unfolded in all corners of the world. Within the oceans, coral reef systems have been facing unprecedented mass bleaching episodes, sea turtles worldwide are currently experiencing an epidemic in the form of fibropapilloma, and global phytoplankton populations have declined by 40%. Within the Earth's terrestrial systems, similar phenomena have appeared in the form of colony collapse disorder (CCD) currently devastating honey bee colonies, White Nose Syndrome decimating bat populations, and the chytrid fungus plaguing amphibian populations. On the surface these events appear to be unrelated yet at the root of each phenomenon there appears an underlying threat - pollution. This paper will investigate the commonality of these occurrences as well as investigate the current and potential solutions to the threat. Copyright © 2014 Elsevier Ltd. All rights reserved.

  2. Proliferation: Threat and response

    SciTech Connect

    1996-04-01

    During the height of the Cold War, the Russian physicist Andre Sakharov said, `Reducing the risk of annihilating humanity in a nuclear war carries an absolute priority over all other considerations.` The end of the Cold War has reduced the threat of global nuclear war, but today a new threat is rising from the global spread of nuclear, biological, and chemical weapons. Hostile groups and nations have tried - or have been able - to obtain these weapons, the technology, and homegrown ability to make them or ballistic missiles that can deliver the massive annihilation, poison, and death of these weapons hundreds of miles away. For rogue nations, these weapons are a ticket to power, stature, and confidence in regional war.

  3. Patient Safety Threat - Syringe Reuse

    MedlinePlus

    ... HAIs HICPAC One & Only Campaign A Patient Safety Threat – Syringe Reuse Recommend on Facebook Tweet Share ... need to be aware of a very serious threat to their health – the reuse of needles or ...

  4. How to Dodge Summertime Threats

    MedlinePlus

    ... Summertime Threats Stings, bites, outdoor cooking and even fireworks keep poison control centers hopping To use the ... if meat is fully cooked, the center advised. Fireworks also pose a poisoning threat because they contain ...

  5. Proliferation: Threat and Response

    DTIC Science & Technology

    1997-11-01

    the Gulf and helping to ensure access to a key source of oil - essential to China may choose not to sell certain technologies China’s expanding economy...Korean peninsula, and stability in this region are essential if economic NBC weapons present a significant threat to U.S. relations are to continue to...Organization United States. (KEDO) Arrange for delivery of heavy fuel oil to offset North’s energy loss. Finance and construct two light water reactors by

  6. Proliferation: Threat and Response

    DTIC Science & Technology

    2001-01-01

    inflamed, the animal invariable becomes lame. Livestock raised for meat lose much weight, and dairy cattle and goats give far less milk . FMD usually...be used for treatment following a biological attack with bacterial agent. The biological warfare threat of anthrax presents a potential danger to U.S...fanatical terrorists or self-proclaimed apocalyptic prophets. The followers of Usama bin Laden have, in fact, already trained with toxic chemicals

  7. Flexible training under threat.

    PubMed

    Houghton, Anita; Eaton, Jennifer

    2002-10-01

    As the number of women in medicine and the general demand for a better work-life balance rises, flexible training is an increasingly important mechanism for maintaining the medical workforce. The new pay deal, together with entrenched cultural attitudes, are potential threats. Ways forward include more substantive part-time posts, more part-time opportunities at consultant level, and using positive experiences as a way of tackling attitudes in the less accepting specialties.

  8. Space collision threat mitigation

    NASA Astrophysics Data System (ADS)

    Zatezalo, Aleksandar; Stipanović, Dušan; Mehra, Raman K.; Pham, Khanh

    2014-06-01

    Mitigation of possible collision threats to current and future operations in space environments is an important an challenging task considering high nonlinearity of orbital dynamics and discrete measurement updates. Such discrete observations are relatively scarce with respect to space dynamics including possible unintentional or intentional rocket propulsion based maneuvers even in scenarios when measurement collections are focused to a one single target of interest. In our paper, this problem is addressed in terms of multihypothesis and multimodel estimation in conjunction with multi-agent multigoal game theoretic guaranteed evasion strategies. Collision threat estimation is formulated using conditional probabilities of time dependent hypotheses and spacecraft controls which are computed using Liapunov-like approach. Based on this formulation, time dependent functional forms of multi-objective utility functions are derived given threat collision risk levels. For demonstrating developed concepts, numerical methods are developed using nonlinear filtering methodology for updating hypothesis sets and corresponding conditional probabilities. Space platform associated sensor resources are managed using previously developed and demonstrated information-theoretic objective functions and optimization methods. Consequently, estimation and numerical methods are evaluated and demonstrated on a realistic Low Earth Orbit collision encounter.

  9. 105-K Basin material design basis feed description for spent nuclear fuel project facilities. Volume 2: Sludge

    SciTech Connect

    Pearce, K.L.

    1998-08-30

    Volume 2 provides the design feed compositions for the baseline K East and K West Basin sludge process streams expected to be generated during Spent Nuclear Fuel (SNF) Project activities. Four types of feeds are required to support evaluation of specific facility and process considerations during the development of new facilities and processes. These four design feeds provide nominal and bounding conditions for design evaluations. Volume 2 includes definition of inventories for: (1) KE and KW Basins sludge locations (pit sludges, floor sludge, canister.sludge, and wash sludge components), (2) nominal feed for each of five process feed streams, (3) shielding design feed, (4) safety/regulatory assessment feed, and (5) criticality assessment feed.

  10. Not All Threats Are Equal

    ERIC Educational Resources Information Center

    Surface, Jeanne L.

    2011-01-01

    School leaders must be fully prepared to respond to all types of threats that occur. In order to respond to threats most appropriately, the school needs to have a systematic approach that combines education, prevention, intervention, discipline, security, and crisis preparedness measures. All threats must be assessed carefully and swiftly,…

  11. Not All Threats Are Equal

    ERIC Educational Resources Information Center

    Surface, Jeanne L.

    2011-01-01

    School leaders must be fully prepared to respond to all types of threats that occur. In order to respond to threats most appropriately, the school needs to have a systematic approach that combines education, prevention, intervention, discipline, security, and crisis preparedness measures. All threats must be assessed carefully and swiftly,…

  12. The School Shooter: A Threat Assessment Perspective.

    ERIC Educational Resources Information Center

    O'Toole, Mary Ellen

    This paper presents a systematic procedure for threat assessment and intervention of school shooters. The model is designed to be used by educators, mental-health professionals, and law-enforcement agencies and is intended to help refine and strengthen the efforts of the National Center for the Analysis of Violent Crime. Its fundamental building…

  13. A knowledge-based approach to estimating the magnitude and spatial patterns of potential threats to soil biodiversity.

    PubMed

    Orgiazzi, Alberto; Panagos, Panos; Yigini, Yusuf; Dunbar, Martha B; Gardi, Ciro; Montanarella, Luca; Ballabio, Cristiano

    2016-03-01

    Because of the increasing pressures exerted on soil, below-ground life is under threat. Knowledge-based rankings of potential threats to different components of soil biodiversity were developed in order to assess the spatial distribution of threats on a European scale. A list of 13 potential threats to soil biodiversity was proposed to experts with different backgrounds in order to assess the potential for three major components of soil biodiversity: soil microorganisms, fauna, and biological functions. This approach allowed us to obtain knowledge-based rankings of threats. These classifications formed the basis for the development of indices through an additive aggregation model that, along with ad-hoc proxies for each pressure, allowed us to preliminarily assess the spatial patterns of potential threats. Intensive exploitation was identified as the highest pressure. In contrast, the use of genetically modified organisms in agriculture was considered as the threat with least potential. The potential impact of climate change showed the highest uncertainty. Fourteen out of the 27 considered countries have more than 40% of their soils with moderate-high to high potential risk for all three components of soil biodiversity. Arable soils are the most exposed to pressures. Soils within the boreal biogeographic region showed the lowest risk potential. The majority of soils at risk are outside the boundaries of protected areas. First maps of risks to three components of soil biodiversity based on the current scientific knowledge were developed. Despite the intrinsic limits of knowledge-based assessments, a remarkable potential risk to soil biodiversity was observed. Guidelines to preliminarily identify and circumscribe soils potentially at risk are provided. This approach may be used in future research to assess threat at both local and global scale and identify areas of possible risk and, subsequently, design appropriate strategies for monitoring and protection of soil

  14. Scientific basis and engineering design to accommodate disruption and halo current loads for the DIII-D tokamak

    SciTech Connect

    Anderson, P.M.; Bozek, A.S.; Hollerbach, M.A.; Humphreys, D.A.; Luxon, J.L.; Reis, E.E.; Schaffer, M.J.

    1996-10-01

    Plasma disruptions and halo current events apply sudden impulsive forces to the interior structures and vacuum vessel walls of tokamaks. These forces arise when induced toroidal currents and attached poloidal halo currents in plasma facing components interact with the poloidal and toroidal magnetic fields respectively. Increasing understanding of plasma disruptions and halo current events has been developed from experiments on DIII-D and other machines. Although the understanding has improved, these events must be planned for in system design because there is no assurance that these events can be eliminated in the operation of tokamaks. Increased understanding has allowed an improved focus of engineering designs.

  15. Robert M. Gagne and M. David Merrill: In Conversation. No.6: The Cognitive Psychological Basis for Instructional Design.

    ERIC Educational Resources Information Center

    Twitchell, David, Ed.

    1990-01-01

    This sixth in a series of edited transcripts based on a conference at Utah State University discusses ideas from cognitive psychology that have implications for instructional design. Highlights include information processing phases; pattern recognition; short-term and long-term memory; purposes of instruction; cognitive structures; and cognitive…

  16. Designing and Evaluating Tutoring Feedback Strategies for Digital Learning Environments on the Basis of the Interactive Tutoring Feedback Model

    ERIC Educational Resources Information Center

    Narciss, Susanne

    2013-01-01

    This paper describes the interactive tutoring feedback model (ITF-model; Narciss, 2006; 2008), and how it can be applied to the design and evaluation of feedback strategies for digital learning environments. The ITF-model conceptualizes formative tutoring feedback as a multidimensional instructional activity that aims at contributing to the…

  17. Coping with threats of terrorism: a protocol for group intervention.

    PubMed

    Ottenstein, Richard J

    2003-01-01

    This article presents a group protocol designed to assist people in coping with direct and ongoing threats of terrorism. The protocol is intended to enable participants to address the psychological issues necessary to cope during periods of extreme threat. A step-by-step description of the protocol is provided.

  18. Satellite Threat Warning and Attack Reporting

    SciTech Connect

    Hilland, D.; Phipps, G.; Jingle, C.; Newton, G.

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  19. Performance of NACA Eight-stage Axial-flow Compressor Designed on the Basis of Airfoil Theory

    NASA Technical Reports Server (NTRS)

    Sinnette, John T; Schey, Oscar W; King, J Austin

    1943-01-01

    The NACA has conducted an investigation to determine the performance that can be obtained from a multistage axial-flow compressor based on airfoil research. A theory was developed; an eight-stage axial-flow compressor was designed, constructed, and tested. The performance of the compressor was determined for speeds from 5000 to 14,000 r.p.m with varying air flow at each speed. Most of the tests were made with air at room temperature. The performance was determined in accordance with the Committee's recommended procedure for testing superchargers. The expected performance was obtained, showing that a multistage compressor of high efficiency can be designed by the application of airfoil theory.

  20. Ocean-sized threats

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    Jane Lubchenco, professor of marine biology and zoology at Oregon State University, and president-elect of the International Council for Science, said that scientists can do more than they currently are doing to clearly communicate to the public and to policy-makers those issues associated with the many ecological threats faced by the world's oceans. In doing so, scientists can overcome popularly-held misperceptions about the health of the world's oceans and thus, help protect the seas."Science," Lubchenco said, "has a huge role to play in informing [the public] what is happening and to guide the choice of solutions.

  1. Ocean-sized threats

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    Jane Lubchenco, professor of marine biology and zoology at Oregon State University, and president-elect of the International Council for Science, said that scientists can do more than they currently are doing to clearly communicate to the public and to policy-makers those issues associated with the many ecological threats faced by the world's oceans. In doing so, scientists can overcome popularly-held misperceptions about the health of the world's oceans and thus, help protect the seas.“Science,” Lubchenco said, “has a huge role to play in informing [the public] what is happening and to guide the choice of solutions.

  2. Threats to international science

    NASA Astrophysics Data System (ADS)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  3. New global viral threats

    PubMed Central

    Erdem, Hakan; Ünal, Serhat

    2015-01-01

    Infectious diseases have caused great catastrophes in human history, as in the example of the plague, which wiped out half of the population in Europe in the 14th century. Ebola virus and H7N9 avian influenza virus are 2 lethal pathogens that we have encountered in the second decade of the 21st century. Ebola infection is currently being seen in West Africa, and H7N9 avian flu appears to have settled in Southeast Asia. This article focuses on the current situation and the future prospects of these potential infectious threats to mankind. PMID:25828274

  4. Solution NMR characterization of apical membrane antigen 1 and small molecule interactions as a basis for designing new antimalarials.

    PubMed

    Krishnarjuna, Bankala; Lim, San Sui; Devine, Shane M; Debono, Cael O; Lam, Raymond; Chandrashekaran, Indu R; Jaipuria, Garima; Yagi, Hiromasa; Atreya, Hanudatta S; Scanlon, Martin J; MacRaild, Christopher A; Scammells, Peter J; Norton, Raymond S

    2016-06-01

    Plasmodium falciparum apical membrane antigen 1 (PfAMA1) plays an important role in the invasion by merozoites of human red blood cells during a malaria infection. A key region of PfAMA1 is a conserved hydrophobic cleft formed by 12 hydrophobic residues. As anti-apical membrane antigen 1 antibodies and other inhibitory molecules that target this hydrophobic cleft are able to block the invasion process, PfAMA1 is an attractive target for the development of strain-transcending antimalarial agents. As solution nuclear magnetic resonance spectroscopy is a valuable technique for the rapid characterization of protein-ligand interactions, we have determined the sequence-specific backbone assignments for PfAMA1 from two P. falciparum strains, FVO and 3D7. Both selective labelling and unlabelling strategies were used to complement triple-resonance experiments in order to facilitate the assignment process. We have then used these assignments for mapping the binding sites for small molecules, including benzimidazoles, pyrazoles and 2-aminothiazoles, which were selected on the basis of their affinities measured from surface plasmon resonance binding experiments. Among the compounds tested, benzimidazoles showed binding to a similar region on both FVO and 3D7 PfAMA1, suggesting that these compounds are promising scaffolds for the development of novel PfAMA1 inhibitors. Copyright © 2016 John Wiley & Sons, Ltd.

  5. Overview of the Distributed Mission Training Integrated Threat Environment project

    NASA Astrophysics Data System (ADS)

    Stytz, Martin R.; Banks, Sheila B.; Santos, Eugene, Jr.

    1998-08-01

    The Joint Synthetic Battlespace (JSB) envisioned within the Department of Defense modeling and simulation master plan requires a distributed virtual environment (DVE) wide consistent threat environment to achieve a useful mission rehearsal, training, test and evaluation capability. To achieve this objective, all threats in the DVE must appear at compatible levels of fidelity to all the entities operating in the DVE and they must interact with human- operated and computer-controlled entities in a realistic fashion. Achieving this goal is not currently possible for two reasons. First, each primary aircraft simulator training system developer has created their own threat system and made their own modeling decisions to support a specific user for a select few predetermined conditions. This traditional threat simulation approach is expensive and leads to ongoing difficulties in maintaining threat currency as intelligence updates are made, new weapons are introduced and new theaters of operation are identified. Second, the threat system interaction on a distributed network must be coordinated. The individualized nature of current threat systems precludes the possibility of introducing coordinated threats. The Distributed Mission Training Integrated Threat Environment (DMTITE) project is developing an effective solution to these issues. The DMTITE project is identifying the requirements for a distributed threat environment and building a demonstrator DOD High Level Architecture compatible system that can provide realistic threats for pilots to train against. The DMTITE prototype will instantiate a variety of threats for use in distributed training scenarios, including surface threats, air threats, radars, and jamming systems. A key element of the system will be the provision of realistic behaviors for the threat systems. We based DMTITE on a general software design methodology and software architecture for computer-generated forces (CGFs) that naturally supports `variety

  6. Developing a level III/IV medical/psychiatry unit. Establishing a basis, design of the unit, and physician responsibility.

    PubMed

    Hall, R C; Kathol, R G

    1992-01-01

    This article is part of a series defining the administrative, logistical, and funding issues necessary for the establishment of a medical/psychiatry unit. It emphasizes the experience of individuals who have developed such units and is offered in an attempt to prevent duplication of costly mistakes. Administrative issues, factors affecting the physical design of the unit, requirements for medical coverage and medical and psychiatric programmatic support, and the ethical issues encountered in managing such a unit are discussed.

  7. DOE, 2013. A Report to the Secretary of Energy: Beyond Design Basis Event Pilot Evaluations, Results and Recommendations for Improvements to Enhance Nuclear Safety at DOE Nuclear Facilities

    SciTech Connect

    None, None

    2013-02-01

    In the six months after the March 2011 Fukushima Daiichi nuclear power plant accident in Japan, the U.S. Department of Energy (DOE) took several actions to review the safety of its nuclear facilities and identify situations where near-term improvements could be made. These actions and recommendations were addressed in an August 2011 report to the Secretary of Energy, Review of Requirements and Capabilities for Analyzing and Responding to Beyond Design Basis Events. Based on recommendations in the August 2011 report, DOE embarked on a project to develop and refine guidance that supports improvements in DOE’s processes for analyzing and mitigating beyond design basis events (BDBEs), i.e., events such as earthquakes that are more severe than the events that formed the basis of the design for DOE’s nuclear facilities. The results of this BDBE project and recommendations for further DOE actions are provided in this follow-on report. The main activity of the BDBE project was the pilot application of guidance for evaluation of BDBE analysis and mitigation features at four DOE nuclear facilities representing a range of DOE sites, nuclear facility types/activities, and responsible program offices. The pilot evaluations focused on: (1) BDBE evaluations as documented in the facility Documented Safety Analysis (DSA); (2) potential BDBE vulnerabilities and margins to failure for facility safety features as obtained from general area and specific system walkdowns and design document reviews; and, (3) preparations made in facility and site emergency management programs to respond to severe accidents. The BDBE project also evaluated whether draft BDBE guidance on safety analysis and emergency management could be used to improve the analysis of, and preparations for, mitigating severe accidents and BDBEs. The pilot evaluation team paid close attention to related actions being pursued by the U.S. Nuclear Regulatory Commission, the U.S. commercial nuclear industry, and the

  8. Moderators of and mechanisms underlying stereotype threat effects on older adults' memory performance.

    PubMed

    Hess, Thomas M; Hinson, Joey T; Hodges, Elizabeth A

    2009-01-01

    Recent research has suggested that negative stereotypes about aging may have a detrimental influence on older adults' memory performance. This study sought to determine whether stereotype-based influences were moderated by age, education, and concerns about being stigmatized. Possible mechanisms underlying these influences on memory performance were also explored. The memory performance of adults aged 60 to 70 years and 71 to 82 years was examined under conditions designed to induce or eliminate stereotype threat. Threat was found to have a greater impact on performance in the young-old than in the old-old group, whereas the opposite was observed for the effects of stigma consciousness. In both cases, the effects were strongest for those with higher levels of education. Further analyses found little evidence in support of the mediating roles of affective responses or working memory. The only evidence of mediation was found with respect to recall predictions, suggesting a motivational basis of threat effects on performance. These findings highlight the specificity of stereotype threat effects in later adulthood as well as possible mechanisms underlying such effects.

  9. Moderators of and Mechanisms underlying Stereotype Threat Effects on Older Adults' Memory Performance

    PubMed Central

    Hess, Thomas M.; Hinson, Joey T.; Hodges, Elizabeth A.

    2009-01-01

    Recent research has suggested that negative stereotypes about aging may have a detrimental influence on older adults' memory performance. This study sought to determine whether stereotype-based influences were moderated by age, education, and concerns about being stigmatized. Possible mechanisms underlying these influences on memory performance were also explored. The memory performance of adults aged 60 to 70 years and 71 to 82 years was examined under conditions designed to induce or eliminate stereotype threat. Threat was found to have a greater impact on performance in the young-old than in the old-old group, whereas the opposite was observed for the effects of stigma consciousness. In both cases, the effects were strongest for those with higher levels of education. Further analyses found little evidence in support of the mediating roles of affective responses or working memory. The only evidence of mediation was found with respect to recall predictions, suggesting a motivational basis of threat effects on performance. These findings highlight the specificity of stereotype threat effects in later adults as well as possible mechanisms underlying such effects. PMID:19280445

  10. Addressing the insider threat

    SciTech Connect

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-05-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  11. Addressing the insider threat

    SciTech Connect

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-01-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  12. High-Affinity α-Conotoxin PnIA Analogs Designed on the Basis of the Protein Surface Topography Method

    PubMed Central

    Kasheverov, Igor E.; Chugunov, Anton O.; Kudryavtsev, Denis S.; Ivanov, Igor A.; Zhmak, Maxim N.; Shelukhina, Irina V.; Spirova, Ekaterina N.; Tabakmakher, Valentin M.; Zelepuga, Elena A.; Efremov, Roman G.; Tsetlin, Victor I.

    2016-01-01

    Despite some success for small molecules, elucidating structure–function relationships for biologically active peptides — the ligands for various targets in the organism — remains a great challenge and calls for the development of novel approaches. Some of us recently proposed the Protein Surface Topography (PST) approach, which benefits from a simplified representation of biomolecules’ surface as projection maps, which enables the exposure of the structure–function dependencies. Here, we use PST to uncover the “activity pattern” in α-conotoxins — neuroactive peptides that effectively target nicotinic acetylcholine receptors (nAChRs). PST was applied in order to design several variants of the α-conotoxin PnIA, which were synthesized and thoroughly studied. Among the best was PnIA[R9, L10], which exhibits nanomolar affinity for the α7 nAChR, selectivity and a slow wash-out from this target. Importantly, these mutations could hardly be delineated by “standard” structure-based drug design. The proposed combination of PST with a set of experiments proved very efficient for the rational construction of new bioactive molecules. PMID:27841338

  13. Applying Human-performance Models to Designing and Evaluating Nuclear Power Plants: Review Guidance and Technical Basis

    SciTech Connect

    O'Hara, J.M.

    2009-11-30

    Human performance models (HPMs) are simulations of human behavior with which we can predict human performance. Designers use them to support their human factors engineering (HFE) programs for a wide range of complex systems, including commercial nuclear power plants. Applicants to U.S. Nuclear Regulatory Commission (NRC) can use HPMs for design certifications, operating licenses, and license amendments. In the context of nuclear-plant safety, it is important to assure that HPMs are verified and validated, and their usage is consistent with their intended purpose. Using HPMs improperly may generate misleading or incorrect information, entailing safety concerns. The objective of this research was to develop guidance to support the NRC staff's reviews of an applicant's use of HPMs in an HFE program. The guidance is divided into three topical areas: (1) HPM Verification, (2) HPM Validation, and (3) User Interface Verification. Following this guidance will help ensure the benefits of HPMs are achieved in a technically sound, defensible manner. During the course of developing this guidance, I identified several issues that could not be addressed; they also are discussed.

  14. High-Affinity α-Conotoxin PnIA Analogs Designed on the Basis of the Protein Surface Topography Method.

    PubMed

    Kasheverov, Igor E; Chugunov, Anton O; Kudryavtsev, Denis S; Ivanov, Igor A; Zhmak, Maxim N; Shelukhina, Irina V; Spirova, Ekaterina N; Tabakmakher, Valentin M; Zelepuga, Elena A; Efremov, Roman G; Tsetlin, Victor I

    2016-11-14

    Despite some success for small molecules, elucidating structure-function relationships for biologically active peptides - the ligands for various targets in the organism - remains a great challenge and calls for the development of novel approaches. Some of us recently proposed the Protein Surface Topography (PST) approach, which benefits from a simplified representation of biomolecules' surface as projection maps, which enables the exposure of the structure-function dependencies. Here, we use PST to uncover the "activity pattern" in α-conotoxins - neuroactive peptides that effectively target nicotinic acetylcholine receptors (nAChRs). PST was applied in order to design several variants of the α-conotoxin PnIA, which were synthesized and thoroughly studied. Among the best was PnIA[R9, L10], which exhibits nanomolar affinity for the α7 nAChR, selectivity and a slow wash-out from this target. Importantly, these mutations could hardly be delineated by "standard" structure-based drug design. The proposed combination of PST with a set of experiments proved very efficient for the rational construction of new bioactive molecules.

  15. Design, Experiments and Simulation of Voltage Transformers on the Basis of a Differential Input D-dot Sensor

    PubMed Central

    Wang, Jingang; Gao, Can; Yang, Jie

    2014-01-01

    Currently available traditional electromagnetic voltage sensors fail to meet the measurement requirements of the smart grid, because of low accuracy in the static and dynamic ranges and the occurrence of ferromagnetic resonance attributed to overvoltage and output short circuit. This work develops a new non-contact high-bandwidth voltage measurement system for power equipment. This system aims at the miniaturization and non-contact measurement of the smart grid. After traditional D-dot voltage probe analysis, an improved method is proposed. For the sensor to work in a self-integrating pattern, the differential input pattern is adopted for circuit design, and grounding is removed. To prove the structure design, circuit component parameters, and insulation characteristics, Ansoft Maxwell software is used for the simulation. Moreover, the new probe was tested on a 10 kV high-voltage test platform for steady-state error and transient behavior. Experimental results ascertain that the root mean square values of measured voltage are precise and that the phase error is small. The D-dot voltage sensor not only meets the requirement of high accuracy but also exhibits satisfactory transient response. This sensor can meet the intelligence, miniaturization, and convenience requirements of the smart grid. PMID:25036333

  16. Design, experiments and simulation of voltage transformers on the basis of a differential input D-dot sensor.

    PubMed

    Wang, Jingang; Gao, Can; Yang, Jie

    2014-07-17

    Currently available traditional electromagnetic voltage sensors fail to meet the measurement requirements of the smart grid, because of low accuracy in the static and dynamic ranges and the occurrence of ferromagnetic resonance attributed to overvoltage and output short circuit. This work develops a new non-contact high-bandwidth voltage measurement system for power equipment. This system aims at the miniaturization and non-contact measurement of the smart grid. After traditional D-dot voltage probe analysis, an improved method is proposed. For the sensor to work in a self-integrating pattern, the differential input pattern is adopted for circuit design, and grounding is removed. To prove the structure design, circuit component parameters, and insulation characteristics, Ansoft Maxwell software is used for the simulation. Moreover, the new probe was tested on a 10 kV high-voltage test platform for steady-state error and transient behavior. Experimental results ascertain that the root mean square values of measured voltage are precise and that the phase error is small. The D-dot voltage sensor not only meets the requirement of high accuracy but also exhibits satisfactory transient response. This sensor can meet the intelligence, miniaturization, and convenience requirements of the smart grid.

  17. Driver-passenger collaboration as a basis for human-machine interface design for vehicle navigation systems.

    PubMed

    Antrobus, Vicki; Burnett, Gary; Krehl, Claudia

    2017-03-01

    Human Factors concerns exist with vehicle navigation systems, particularly relating to the effects of current Human-Machine Interfaces (HMIs) on driver disengagement from the environment. A road study was conducted aiming to provide initial input for the development of intelligent HMIs for in-vehicle systems, using the traditional collaborative navigation relationship between the driver and passenger to inform future design. Sixteen drivers navigated a predefined route in the city of Coventry, UK with the assistance of an existing vehicle navigation system (SatNav), whereas a further 16 followed the navigational prompts of a passenger who had been trained along the same route. Results found that there were no significant differences in the number of navigational errors made on route for the two different methods. However, drivers utilising a collaborative navigation approach had significantly better landmark and route knowledge than their SatNav counterparts. Analysis of individual collaborative transcripts revealed the large individual differences in descriptor use by passengers and reference to environmental landmarks, illustrating the potential for the replacement of distance descriptors in vehicle navigation systems. Results are discussed in the context of future HMIs modelled on a collaborative navigation relationship. Practitioner Summary: Current navigation systems have been associated with driver environmental disengagement, this study uses an on-road approach to look at how the driver-passenger collaborative relationship and dialogue can inform future navigation HMI design. Drivers navigating with passenger assistance demonstrated enhanced landmark and route knowledge over drivers navigating with a SatNav.

  18. Defense Against Threat. Threat Recognition and Analysis Project

    DTIC Science & Technology

    1975-09-01

    1 arm-raising p e asked a dozen indiv to list as many threats n hour. Over five hundre resulted, running th obe. Some recognized thr d to...belong to next mont respects remote in th ible devastation. There able In the threat i ending dangers In the tance in this report...called behavior, analyze and threat-direct of forms but th action structures those of invulne invulnerability a by all owl np, thos

  19. Produced Water Treatment Using the Switchable Polarity Solvent Forward Osmosis (SPS FO) Desalination Process: Preliminary Engineering Design Basis

    SciTech Connect

    Wendt, Daniel; Adhikari, Birendra; Orme, Christopher; Wilson, Aaron

    2016-05-01

    Switchable Polarity Solvent Forward Osmosis (SPS FO) is a semi-permeable membrane-based water treatment technology. INL is currently advancing SPS FO technology such that a prototype unit can be designed and demonstrated for the purification of produced water from oil and gas production operations. The SPS FO prototype unit will used the thermal energy in the produced water as a source of process heat, thereby reducing the external process energy demands. Treatment of the produced water stream will reduce the volume of saline wastewater requiring disposal via injection, an activity that is correlated with undesirable seismic events, as well as generate a purified product water stream with potential beneficial uses. This paper summarizes experimental data that has been collected in support of the SPS FO scale-up effort, and describes how this data will be used in the sizing of SPS FO process equipment. An estimate of produced water treatment costs using the SPS FO process is also provided.

  20. Providing the Basis for Innovative Improvements in Advanced LWR Reactor Passive Safety Systems Design: An Educational R&D Project

    SciTech Connect

    Brian G. Williams; Jim C. P. Liou; Hiral Kadakia; Bill Phoenix; Richard R. Schultz

    2007-02-27

    This project characterizes typical two-phase stratified flow conditions in advanced water reactor horizontal pipe sections, following activation of passive cooling systems. It provides (1) a means to educate nuclear engineering students regarding the importance of two-phase stratified flow in passive cooling systems to the safety of advanced reactor systems and (2) describes the experimental apparatus and process to measure key parameters essential to consider when designing passive emergency core cooling flow paths that may encounter this flow regime. Based on data collected, the state of analysis capabilities can be determined regarding stratified flow in advanced reactor systems and the best paths forward can be identified to ensure that the nuclear industry can properly characterize two-phase stratified flow in passive emergency core cooling systems.

  1. Understanding the structural basis of substrate recognition by Plasmodium falciparum plasmepsin V to aid in the design of potent inhibitors

    PubMed Central

    Bedi, Rajiv K.; Patel, Chandan; Mishra, Vandana; Xiao, Huogen; Yada, Rickey Y.; Bhaumik, Prasenjit

    2016-01-01

    Plasmodium falciparum plasmepsin V (PfPMV) is an essential aspartic protease required for parasite survival, thus, considered as a potential drug target. This study reports the first detailed structural analysis and molecular dynamics simulation of PfPMV as an apoenzyme and its complexes with the substrate PEXEL as well as with the inhibitor saquinavir. The presence of pro-peptide in PfPMV may not structurally hinder the formation of a functionally competent catalytic active site. The structure of PfPMV-PEXEL complex shows that the unique positions of Glu179 and Gln222 are responsible for providing the specificity of PEXEL substrate with arginine at P3 position. The structural analysis also reveals that the S4 binding pocket in PfPMV is occupied by Ile94, Ala98, Phe370 and Tyr472, and therefore, does not allow binding of pepstatin, a potent inhibitor of most pepsin-like aspartic proteases. Among the screened inhibitors, the HIV-1 protease inhibitors and KNI compounds have higher binding affinities for PfPMV with saquinavir having the highest value. The presence of a flexible group at P2 and a bulky hydrophobic group at P3 position of the inhibitor is preferred in the PfPMV substrate binding pocket. Results from the present study will aid in the design of potent inhibitors of PMV. PMID:27531685

  2. Understanding the structural basis of substrate recognition by Plasmodium falciparum plasmepsin V to aid in the design of potent inhibitors.

    PubMed

    Bedi, Rajiv K; Patel, Chandan; Mishra, Vandana; Xiao, Huogen; Yada, Rickey Y; Bhaumik, Prasenjit

    2016-08-17

    Plasmodium falciparum plasmepsin V (PfPMV) is an essential aspartic protease required for parasite survival, thus, considered as a potential drug target. This study reports the first detailed structural analysis and molecular dynamics simulation of PfPMV as an apoenzyme and its complexes with the substrate PEXEL as well as with the inhibitor saquinavir. The presence of pro-peptide in PfPMV may not structurally hinder the formation of a functionally competent catalytic active site. The structure of PfPMV-PEXEL complex shows that the unique positions of Glu179 and Gln222 are responsible for providing the specificity of PEXEL substrate with arginine at P3 position. The structural analysis also reveals that the S4 binding pocket in PfPMV is occupied by Ile94, Ala98, Phe370 and Tyr472, and therefore, does not allow binding of pepstatin, a potent inhibitor of most pepsin-like aspartic proteases. Among the screened inhibitors, the HIV-1 protease inhibitors and KNI compounds have higher binding affinities for PfPMV with saquinavir having the highest value. The presence of a flexible group at P2 and a bulky hydrophobic group at P3 position of the inhibitor is preferred in the PfPMV substrate binding pocket. Results from the present study will aid in the design of potent inhibitors of PMV.

  3. Physiological basis of temperature-dependent biogeography: trade-offs in muscle design and performance in polar ectotherms.

    PubMed

    Pörtner, H O

    2002-08-01

    levels of muscular activity, polar fish have developed characteristics of aerobic metabolism equivalent to those of high-performance swimmers in warmer waters. However, they only reach low performance levels despite taking aerobic design to an extreme.

  4. Material Performance of Fully-Ceramic Micro-Encapsulated Fuel under Selected LWR Design Basis Scenarios: Final Report

    SciTech Connect

    B. Boer; R. S. Sen; M. A. Pope; A. M. Ougouag

    2011-09-01

    The extension to LWRs of the use of Deep-Burn coated particle fuel envisaged for HTRs has been investigated. TRISO coated fuel particles are used in Fully-Ceramic Microencapsulated (FCM) fuel within a SiC matrix rather than the graphite of HTRs. TRISO particles are well characterized for uranium-fueled HTRs. However, operating conditions of LWRs are different from those of HTRs (temperature, neutron energy spectrum, fast fluence levels, power density). Furthermore, the time scales of transient core behavior during accidents are usually much shorter and thus more severe in LWRs. The PASTA code was updated for analysis of stresses in coated particle FCM fuel. The code extensions enable the automatic use of neutronic data (burnup, fast fluence as a function of irradiation time) obtained using the DRAGON neutronics code. An input option for automatic evaluation of temperature rise during anticipated transients was also added. A new thermal model for FCM was incorporated into the code; so-were updated correlations (for pyrocarbon coating layers) suitable to estimating dimensional changes at the high fluence levels attained in LWR DB fuel. Analyses of the FCM fuel using the updated PASTA code under nominal and accident conditions show: (1) Stress levels in SiC-coatings are low for low fission gas release (FGR) fractions of several percent, as based on data of fission gas diffusion in UO{sub 2} kernels. However, the high burnup level of LWR-DB fuel implies that the FGR fraction is more likely to be in the range of 50-100%, similar to Inert Matrix Fuels (IMFs). For this range the predicted stresses and failure fractions of the SiC coating are high for the reference particle design (500 {micro}mm kernel diameter, 100 {micro}mm buffer, 35 {micro}mm IPyC, 35 {micro}mm SiC, 40 {micro}mm OPyC). A conservative case, assuming 100% FGR, 900K fuel temperature and 705 MWd/kg (77% FIMA) fuel burnup, results in a 8.0 x 10{sup -2} failure probability. For a 'best-estimate' FGR fraction

  5. The Threat-Strategy Interview.

    PubMed

    Durso, Francis T; Kazi, Sadaf; Ferguson, Ashley N

    2015-03-01

    Operators in dynamic work environments use strategies to manage threats in order to achieve task goals. We introduce a structured interview method, the Threat-Strategy Interview (TSI), and an accompanying qualitative analysis to induce operator-level threats, strategies, and the cues that give rise to them. The TSI can be used to elicit knowledge from operators who are on the front line of managing threats to provide an understanding of strategic thinking, which in turn can be applied toward a variety of problems. Copyright © 2014 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  6. Lizard threat display handicaps endurance.

    PubMed Central

    Brandt, Y

    2003-01-01

    Honest-signalling theory asserts that threat displays reliably advertise attributes that influence fighting success. Endurance, as measured by treadmill performance, predicts the outcome of agonistic interactions among lizards. If threat displays in lizards function to advertise endurance capacity then variation in threat displays should correlate with endurance. I tested this prediction for the duration of threat posturing in male side-blotched lizards (Uta stansburiana) and examined whether threat displays act as quality handicaps, reliable signals that expend the attribute that is advertised. Individual variation in the duration of threat posturing correlated with endurance, while an experimental reduction of endurance diminished the duration of threat posturing. As expected of a quality handicap, endurance fell below baseline after display production. A restriction of aerobic metabolism can account for this effect. In threat posturing, lateral compression of the thorax may interfere with respiration or with circulation, limiting aerobic metabolism and causing a compensatory increase in anaerobic metabolism, thereby generating lactate and diminishing locomotor capacity. Concentrations of lactate measured after display production were higher than baseline, consistent with the proposed mechanism. By restricting aerobic metabolism, the threat posture can act as a quality handicap, simultaneously advertising and expending the endurance capacity of displaying lizards. PMID:12803896

  7. Recurrent dreams: Recurring threat simulations?

    PubMed

    Valli, K; Revonsuo, A

    2006-06-01

    Zadra, Desjardins, and Marcotte (2006) have made a valuable contribution to the empirical testing of the Threat Simulation Theory (TST) (Revonsuo, 2000a) in recurrent dreams. For the most part, their results are in accordance with the theory, while some findings seem to conflict with the predictions of TST. In our commentary, we consider some alternative ways to interpret the results, and we conclude that many prominent features of most recurrent dreams seem to be manifestations of a threat simulation function, leading to repeated rehearsal of threat perception and avoidance, but a minority of recurrent dreams seem to have origins unrelated to threat simulation.

  8. Formulating a new basis for the treatment against botulinum neurotoxin intoxication: 3,4-diaminopyridine prodrug design and characterization

    PubMed Central

    Zakhari, Joseph S.; Kinoyama, Isao; Hixon, Mark S.; Di Mola, Antonia; Globisch, Daniel; Janda, Kim D.

    2011-01-01

    Botulism is a disease characterized by neuromuscular paralysis and is produced from botulinum neurotoxins (BoNTs) found within the Gram positive bacterium Clostridium botulinum. This bacteria produces the most deadliest toxin known, with lethal doses as low as 1 ng/kg. Due to the relative ease of production and transport, the use of these agents as potential bioterrorist weapons has become of utmost concern. No small molecule therapies against BoNT intoxication have been approved to date. However, 3,4-diaminopyridine, (3,4-DAP), a potent reversible inhibitor of voltage-gated potassium channels, is an effective cholinergic agonist used in the treatment of neuromuscular degenerative disorders that require cholinergic enhancement. 3,4-DAP has also been shown to facilitate recovery of neuromuscular action potential post botulinum intoxication by blocking K+ channels. Unfortunately, 3,4-DAP displays toxicity largely due to blood-brain-barrier (BBB) penetration. As a dual-action prodrug approach to cholinergic enhancement we have designed carbamate and amide conjugates of 3,4-DAP. The carbamate prodrug is intended to be a slowly reversible inhibitor of acetylcholinesterase (AChE) along the lines of the stigmines thereby allowing increased persistence of released acetylcholine within the synaptic cleft. As a secondary activity, cleavage of the carbamate prodrug by AChE will afford the localized release of 3,4-DAP, which in turn, will enhance the pre-synaptic release of additional acetylcholine. Being a competitive inhibitor with respect to acetylcholine, the activity of the prodrug will be greatest at the synaptic junctions most depleted of acetylcholine. Here we report upon the synthesis and biochemical characterization of three new classes of prodrugs intended to limit previously reported stability and toxicity issues. Of the prodrugs examined, compound 32, demonstrated the most clinically relevant half-life of 2.76 h, while selectively inhibiting AChE over

  9. Using a Non-Equivalent Groups Quasi Experimental Design to Reduce Internal Validity Threats to Claims Made by Math and Science K-12 Teacher Recruitment Programs

    NASA Astrophysics Data System (ADS)

    Moin, Laura

    2009-10-01

    The American Recovery and Reinvestment Act national policy established in 2009 calls for ``meaningful data'' that demonstrate educational improvements, including the recruitment of high-quality teachers. The scant data available and the low credibility of many K-12 math/science teacher recruitment program evaluations remain the major barriers for the identification of effective recruitment strategies. Our study presents a methodology to better evaluate the impact of recruitment programs on increasing participants' interest in teaching careers. The research capitalizes on the use of several control groups and presents a non-equivalent groups quasi-experimental evaluation design that produces program effect claims with higher internal validity than claims generated by current program evaluations. With this method that compares responses to a teaching career interest question from undergraduates all along a continuum from just attending an information session to participating (or not) in the recruitment program, we were able to compare the effect of the program in increasing participants' interest in teaching careers versus the evolution of the same interest but in the absence of the program. We were also able to make suggestions for program improvement and further research. While our findings may not apply to other K-12 math/science teacher recruitment programs, we believe that our evaluation methodology does and will contribute to conduct stronger program evaluations. In so doing, our evaluation procedure may inform recruitment program designers and policy makers.

  10. Thinking about threats: Memory and prospection in human threat management.

    PubMed

    Bulley, Adam; Henry, Julie D; Suddendorf, Thomas

    2017-03-01

    Humans have evolved mechanisms for the detection and management of possible threats in order to abate their negative consequences for fitness. Internally generated ('detached') cognition may have evolved in part because of its contributions to this broad function, but important questions remain about its role in threat management. In this article, we therefore present a taxonomy of threat-related internally generated cognition comprising episodic and semantic formats of memory and prospection. We address the proximate mechanisms of each of the capacities in this taxonomy, and discuss their respective contributions to adaptive threat management in humans. For instance, mental time travel empowers people to contemplate and learn from threats experienced long ago, as well as to plan for dangers that might arise in the distant future. However, despite their functional benefits, these thought processes are also central to contemporary anxiety disorders and may be a potent source of distress.

  11. Insider Threat - Material Control and Accountability Mitigation

    SciTech Connect

    Powell, Danny H; Elwood Jr, Robert H; Roche, Charles T

    2011-01-01

    The technical objectives of nuclear safeguards are (1) the timely detection of diversion of significant quantities of nuclear material from peaceful uses to the manufacture of nuclear weapons or other nuclear explosive devices or for purposes unknown and (2) the deterrence of such diversion by the risk of early detection. The safeguards and security program must address both outsider threats and insider threats. Outsider threats are primarily addressed by the physical protection system. Insider threats can be any level of personnel at the site including passive or active insiders that could attempt protracted or abrupt diversion. This could occur by an individual acting alone or by collusion between an individual with material control and accountability (MC&A) responsibilities and another individual who has responsibility or control within both the physical protection and the MC&A systems. The insider threat is one that must be understood and incorporated into the safeguards posture. There have been more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. The insider has access, authority, and knowledge, as well as a set of attributes, that make him/her difficult to detect. An integrated safeguards program is designed as a defense-in-depth system that seeks to prevent the unauthorized removal of nuclear material, to provide early detection of any unauthorized attempt to remove nuclear material, and to rapidly respond to any attempted removal of nuclear material. The program is also designed to support protection against sabotage, espionage, unauthorized access, compromise, and other hostile acts that may cause unacceptable adverse impacts on national security, program continuity, the health and safety of employees, the public, or the environment. Nuclear MC&A play an essential role in the capabilities of an integrated safeguards system to deter and detect theft or diversion of nuclear material. An integrated safeguards system with

  12. Safety Basis Report

    SciTech Connect

    R.J. Garrett

    2002-01-14

    As part of the internal Integrated Safety Management Assessment verification process, it was determined that there was a lack of documentation that summarizes the safety basis of the current Yucca Mountain Project (YMP) site characterization activities. It was noted that a safety basis would make it possible to establish a technically justifiable graded approach to the implementation of the requirements identified in the Standards/Requirements Identification Document. The Standards/Requirements Identification Documents commit a facility to compliance with specific requirements and, together with the hazard baseline documentation, provide a technical basis for ensuring that the public and workers are protected. This Safety Basis Report has been developed to establish and document the safety basis of the current site characterization activities, establish and document the hazard baseline, and provide the technical basis for identifying structures, systems, and components (SSCs) that perform functions necessary to protect the public, the worker, and the environment from hazards unique to the YMP site characterization activities. This technical basis for identifying SSCs serves as a grading process for the implementation of programs such as Conduct of Operations (DOE Order 5480.19) and the Suspect/Counterfeit Items Program. In addition, this report provides a consolidated summary of the hazards analyses processes developed to support the design, construction, and operation of the YMP site characterization facilities and, therefore, provides a tool for evaluating the safety impacts of changes to the design and operation of the YMP site characterization activities.

  13. CYBER THREAT AWARENESS FOR THE WARFIGHTER

    DTIC Science & Technology

    2016-02-16

    AIR WAR COLLEGE AIR UNIVERSITY CYBER THREAT AWARENESS FOR THE WARFIGHTER by Jason R. Settle, Lt Col, USAF A Research Report...be targeted or are vulnerable to cyber threats, then operators should be aware of these threats. This paper explores to what extent cyber threat...that are susceptible to cyber threats.3 If aircraft are vulnerable to cyber threats, then operators should be aware of these potential threats

  14. Assessing the global threat from Zika virus.

    PubMed

    Lessler, Justin; Chaisson, Lelia H; Kucirka, Lauren M; Bi, Qifang; Grantz, Kyra; Salje, Henrik; Carcelen, Andrea C; Ott, Cassandra T; Sheffield, Jeanne S; Ferguson, Neil M; Cummings, Derek A T; Metcalf, C Jessica E; Rodriguez-Barraquer, Isabel

    2016-08-12

    First discovered in 1947, Zika virus (ZIKV) infection remained a little-known tropical disease until 2015, when its apparent association with a considerable increase in the incidence of microcephaly in Brazil raised alarms worldwide. There is limited information on the key factors that determine the extent of the global threat from ZIKV infection and resulting complications. Here, we review what is known about the epidemiology, natural history, and public health effects of ZIKV infection, the empirical basis for this knowledge, and the critical knowledge gaps that need to be filled.

  15. Assessing the Global Threat from Zika Virus

    PubMed Central

    Lessler, Justin; Chaisson, Lelia H.; Kucirka, Lauren M.; Bi, Qifang; Grantz, Kyra; Salje, Henrik; Carcelen, Andrea C.; Ott, Cassandra T.; Sheffield, Jeanne S.; Ferguson, Neil M.; Cummings, Derek A.T.; Metcalf, C. Jessica E.; Rodriguez-Barraquer, Isabel

    2017-01-01

    First discovered in 1947, Zika virus (ZIKV) infection remained a little known tropical disease until 2015, when its apparent association with a significant increase in the incidence of microcephaly in Brazil raised alarms worldwide. There is limited information on the key factors that determine the extent of the global threat from ZIKV infection and resulting complications. Here, we review what is known about the epidemiology, natural history and public health impact of ZIKV infection; the empirical basis for this knowledge; and the critical knowledge gaps that need to be filled. PMID:27417495

  16. Shape threat detection via adaptive computed tomography

    NASA Astrophysics Data System (ADS)

    Masoudi, Ahmad; Thamvichai, Ratchaneekorn; Neifeld, Mark A.

    2016-05-01

    X-ray Computed Tomography (CT) is used widely for screening purposes. Conventional x-ray threat detection systems employ image reconstruction and segmentation algorithms prior to making threat/no-threat decisions. We find that in many cases these pre-processing steps can degrade detection performance. Therefore in this work we will investigate methods that operate directly on the CT measurements. We analyze a fixed-gantry system containing 25 x-ray sources and 2200 photon counting detectors. We present a new method for improving threat detection performance. This new method is a so-called greedy adaptive algorithm which at each time step uses information from previous measurements to design the next measurement. We utilize sequential hypothesis testing (SHT) in order to derive both the optimal "next measurement" and the stopping criterion to insure a target probability of error Pe. We find that selecting the next x-ray source according to such a greedy adaptive algorithm, we can reduce Pe by a factor of 42.4× relative to the conventional measurement sequence employing all 25 sources in sequence.

  17. Bomb Threat Assessments. Fact Sheet

    ERIC Educational Resources Information Center

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  18. Threat Assessment in College Settings

    ERIC Educational Resources Information Center

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  19. Linking Stereotype Threat and Anxiety

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2007-01-01

    Claude Steele's stereotype threat hypothesis has attracted significant attention in recent years. This study tested one of the main tenets of his theory--that stereotype threat serves to increase individual anxiety levels, thus hurting performance--using real-time measures of physiological arousal. Subjects were randomly assigned to either high or…

  20. Linking Stereotype Threat and Anxiety

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2007-01-01

    Claude Steele's stereotype threat hypothesis has attracted significant attention in recent years. This study tested one of the main tenets of his theory--that stereotype threat serves to increase individual anxiety levels, thus hurting performance--using real-time measures of physiological arousal. Subjects were randomly assigned to either high or…

  1. Bio-threat microparticle simulants

    DOEpatents

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  2. Bio-threat microparticle simulants

    DOEpatents

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  3. Communication issues during bomb threats.

    PubMed

    Kuebler, S A

    How should healthcare security professionals handle a bomb threat? How can a large complex best be searched? The author discusses why he believes the judicial use of radios and cellular phones during emergencies can enhance security's ability to handle bomb threat situations, and offers guidelines to follow.

  4. Threat Assessment in College Settings

    ERIC Educational Resources Information Center

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  5. Examining the Effects of Stereotype Threat on Test-Taking Behaviors

    ERIC Educational Resources Information Center

    Scherbaum, Charles A.; Blanshetyn, Victoria; Marshall-Wolp, Elizabeth; McCue, Elizabeth; Strauss, Ross

    2011-01-01

    This study examines the relationship between stereotype threat and individual test-taking behaviors. Previous research has examined the impact of stereotype threat on test scores, but little research has examined the impact of stereotype threat on the test-taking behaviors impacting those scores. Using a pre-post experimental design, stereotype…

  6. Examining the Effects of Stereotype Threat on Test-Taking Behaviors

    ERIC Educational Resources Information Center

    Scherbaum, Charles A.; Blanshetyn, Victoria; Marshall-Wolp, Elizabeth; McCue, Elizabeth; Strauss, Ross

    2011-01-01

    This study examines the relationship between stereotype threat and individual test-taking behaviors. Previous research has examined the impact of stereotype threat on test scores, but little research has examined the impact of stereotype threat on the test-taking behaviors impacting those scores. Using a pre-post experimental design, stereotype…

  7. Psychoanalysis and the nuclear threat

    SciTech Connect

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  8. An Examination of Age-Based Stereotype Threat About Cognitive Decline.

    PubMed

    Barber, Sarah J

    2017-01-01

    "Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.

  9. Cooperative Threat Reduction: Cooperation Threat Reduction Program Liquid Propellant Disposition Project

    NASA Astrophysics Data System (ADS)

    2002-09-01

    This audit is one in a series of audits the Deputy Secretary of Defense requested. As part of the Cooperative Threat Reduction (CTR) Program, DoD agreed to assist the Russian Federation in disposing of its liquid rocket propellant. Public Law 102-228 (section 2551 NOTE, title 22, United States Code), the Soviet Nuclear Threat Reduction Act of 1991 designates DoD as the executive agent for the CTR Program. Specific objectives of the act are to destroy chemical, nuclear, and other weapons; transport, store, disable, and safeguard weapons in connection with their destruction; and establish verifiable safeguards against proliferation of weapons of mass destruction. The Office of the Assistant Secretary of Defense (International Security Policy), under the Office of the Under Secretary of Defense for Policy, develops, coordinates, and oversees implementation of policy for the CTR Program. The CTR Directorate, Defense Threat Reduction Agency operates the program.

  10. Using protein design algorithms to understand the molecular basis of disease caused by protein-DNA interactions: the Pax6 example.

    PubMed

    Alibés, Andreu; Nadra, Alejandro D; De Masi, Federico; Bulyk, Martha L; Serrano, Luis; Stricher, François

    2010-11-01

    Quite often a single or a combination of protein mutations is linked to specific diseases. However, distinguishing from sequence information which mutations have real effects in the protein's function is not trivial. Protein design tools are commonly used to explain mutations that affect protein stability, or protein-protein interaction, but not for mutations that could affect protein-DNA binding. Here, we used the protein design algorithm FoldX to model all known missense mutations in the paired box domain of Pax6, a highly conserved transcription factor involved in eye development and in several diseases such as aniridia. The validity of FoldX to deal with protein-DNA interactions was demonstrated by showing that high levels of accuracy can be achieved for mutations affecting these interactions. Also we showed that protein-design algorithms can accurately reproduce experimental DNA-binding logos. We conclude that 88% of the Pax6 mutations can be linked to changes in intrinsic stability (77%) and/or to its capabilities to bind DNA (30%). Our study emphasizes the importance of structure-based analysis to understand the molecular basis of diseases and shows that protein-DNA interactions can be analyzed to the same level of accuracy as protein stability, or protein-protein interactions.

  11. Stereotype Threat as Validity Threat: The Anxiety-Sex-Threat Interaction

    ERIC Educational Resources Information Center

    Delgado, Ana R.; Prieto, Gerardo

    2008-01-01

    Stereotype threat has been invoked to explain underperformance on a variety of groups for whom the stereotypes allege inferior cognitive abilities. In math testing, stereotype threat has been used to explain sex differences in test performance. This paper describes an experimental study on a large sample (n = 313), in which the role of anxiety and…

  12. Assessing the threat of firearms: new threat formula, resources, and ontological linking algorithms

    NASA Astrophysics Data System (ADS)

    Hempelmann, Christian F.; Arslan, Abdullah N.; Attardo, Salvatore; Blount, Grady P.; Sirakov, Nikolay Metodiev

    2014-06-01

    The present work is part of an ongoing larger project.2, 3, 11, 12 The goal of this project is to develop a system capable of automatic threat assessment for instances of firearms use in public places. The main components of the system are: an ontology of firearms;1, 14 algorithms to create the visual footprint of the firearms,1, 14 to compare visual information,2, 3, 11, 12 to facilitate search in the ontology, and to generate the links between the conceptual and visual ontologies; as well as a formula to calculate the threat of individual firearms, firearms classes, and ammunition types in different environments. One part of the dual-level ontology for the properties of the firearms captures key visual features used to identify their type or class in images, while the other part captures their threat-relevant conceptual properties. The visual ontology is the result of image segmentation and matching methods, while the conceptual ontology is designed using knowledge-engineering principles and populated semi-automatically from Web resources. The focus of the present paper is two-fold. On the one hand, we will report on an update of the initial threat formula, based on the substantially increased population of the firearm ontology, including ammunition types and comparisons to actual incidents, and allowing for an overall more accurate assessment. On the other hand, the linking algorithms between the visual and conceptual ontologies are elaborated for faster transfer of information leading to an improvement in accuracy of the threat assessment.

  13. Conditioned social dominance threat: observation of others’ social dominance biases threat learning

    PubMed Central

    Molapour, Tanaz; Olsson, Andreas

    2016-01-01

    Social groups are organized along dominance hierarchies, which determine how we respond to threats posed by dominant and subordinate others. The persuasive impact of these dominance threats on mental and physical well-being has been well described but it is unknown how dominance rank of others bias our experience and learning in the first place. We introduce a model of conditioned social dominance threat in humans, where the presence of a dominant other is paired with an aversive event. Participants first learned about the dominance rank of others by observing their dyadic confrontations. During subsequent fear learning, the dominant and subordinate others were equally predictive of an aversive consequence (mild electric shock) to the participant. In three separate experiments, we show that participants’ eye-blink startle responses and amygdala reactivity adaptively tracked dominance of others during observation of confrontation. Importantly, during fear learning dominant vs subordinate others elicited stronger and more persistent learned threat responses as measured by physiological arousal and amygdala activity. Our results characterize the neural basis of learning through observing conflicts between others, and how this affects subsequent learning through direct, personal experiences. PMID:27217107

  14. Modelling ultraviolet threats

    NASA Astrophysics Data System (ADS)

    James, I.

    2016-10-01

    Electro-optically (EO) guided surface to air missiles (SAM) have developed to use Ultraviolet (UV) wavebands supplementary to the more common Infrared (IR) wavebands. Missiles such as the US Stinger have been around for some time but are not considered a proliferation risk. The Chinese FN-16 and Russian SA-29 (Verba) are considered a much higher proliferation risk. As a result, models of the missile seekers must be developed to understand the characteristics of the seeker and the potential performance enhancement that are included. Therefore, the purpose of this paper is to introduce the steps that have been taken to characterise and model these missiles. It begins by outlining some of the characteristics of the threats, the key elements of a UV scene, the potential choice of waveband for a detector, the initial modelling work to represent the UV detector of the missile and presents initial results. The modelling shows that the UV detection range of a typical aircraft is dependent on both the size of the aircraft and its reflectivity. However, the strength of this correlation is less than expected. As a result, further work is required to model more seeker types and to investigate what is causing the weak correlations found in these initial investigations. In addition, there needs to be further study of the sensitivities of the model to other variables, such as the modelled detectivity of the detector and the signal to noise ratio assumed. Overall, the outcome of this work will be to provide specifications for aircraft size and reflectivity that limit the effectiveness of the UV channels.

  15. Managing biosecurity threats in China.

    PubMed

    Huang, Yanzhong

    2011-03-01

    Compared to the extensive literature on bioterrorism and biosecurity in the United States, less analysis has been conducted on similar challenges in China. This article seeks to fill this void by providing an integrated and updated assessment of 3 major biosecurity threats China faces: biowarfare, bioterrorism, and biocrimes. An analysis of China's biosecurity threats and biodefense building suggest varying levels of risk associated with each threat type. First, a direct bioweapons attack on China is highly unlikely, although the threat of biowarfare cannot be simply written off. Second, potential perpetrators of bioterrorism have capabilities at their disposal for carrying out such attacks. While terrorist organizations in China do not have a strong interest in bioterrorism, the limited state capability to counter such a threat may increase the risk in the future. Third, unlike the threats of biowarfare and bioterrorism, potential perpetrators of biocrimes have both incentives and capabilities, and biocrimes can produce reactions far out of proportion to the actual number of casualties. Despite the distinct biosecurity challenges it faces, China has yet to articulate a differentiated and coherent strategy to effectively tackle the challenges. Assessing different types of biosecurity threats in terms of degrees of risk not only provides greater analytical clarity but also has important implications for the strategies required to manage the risks.

  16. A comprehensive approach to managing threats of violence on a university or college campus.

    PubMed

    Regehr, Cheryl; Glancy, Graham D; Carter, Andrea; Ramshaw, Lisa

    Horrifying, high profile acts of violence on campuses remain relatively rare, nevertheless, academic administrators are required to manage threats of violence on campus on an increasingly regular basis. These threats take two primary forms, those in which the perpetrator and the intended victim(s) are clearly identified, often involving repeated threats and threatening behaviour towards an individual; and those involving anonymous threats to commit acts of larger scale violence. Complicating factors in managing these threats include: fear contagion; mass media and social media attention; responsibilities to all members of the university community sometimes including individuals issuing the threat and the intended victims; demands for safety and security measures that are often at odds with professional advice; and permeable campus boundaries that cause security challenges. This paper considers the changing landscape of threat assessment and risk assessment on university and college campuses and suggests opportunities for partnerships between forensic mental health professionals and academic administrators. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. 3-D threat image projection

    NASA Astrophysics Data System (ADS)

    Yildiz, Yesna O.; Abraham, Douglas Q.; Agaian, Sos; Panetta, Karen

    2008-02-01

    Automated Explosive Detection Systems utilizing Computed Tomography perform a series X-ray scans of passenger bags being checked in at the airport, and produce various 2-D projection images and 3-D volumetric images of the bag. The determination as to whether the passenger bag contains an explosive and needs to be searched manually is performed through trained Transportation Security Administration screeners following an approved protocol. In order to keep the screeners vigilant with regards to screening quality, the Transportation Security Administration has mandated the use of Threat Image Projection on 2-D projection X-ray screening equipment used at all US airports. These algorithms insert visual artificial threats into images of the normal passenger bags in order to test the screeners with regards to their screening efficiency and their screening quality at determining threats. This technology for 2-D X-ray system is proven and is widespread amongst multiple manufacturers of X-ray projection systems. Until now, Threat Image Projection has been unsuccessful at being introduced into 3-D Automated Explosive Detection Systems for numerous reasons. The failure of these prior attempts are mainly due to imaging queues that the screeners pickup on, and therefore make it easy for the screeners to discern the presence of the threat image and thus defeating the intended purpose. This paper presents a novel approach for 3-D Threat Image Projection for 3-D Automated Explosive Detection Systems. The method presented here is a projection based approach where both the threat object and the bag remain in projection sinogram space. Novel approaches have been developed for projection based object segmentation, projection based streak reduction used for threat object isolation along with scan orientation independence and projection based streak generation for an overall realistic 3-D image. The algorithms are prototyped in MatLab and C++ and demonstrate non discernible 3-D threat

  18. Threat interferes with response inhibition.

    PubMed

    Hartikainen, Kaisa M; Siiskonen, Anna R; Ogawa, Keith H

    2012-05-09

    A potential threat, such as a spider, captures attention and engages executive functions to adjust ongoing behavior and avoid danger. We and many others have reported slowed responses to neutral targets in the context of emotional distractors. This behavioral slowing has been explained in the framework of attentional competition for limited resources with emotional stimuli prioritized. Alternatively, slowed performance could reflect the activation of avoidance/freezing-type motor behaviors associated with threat. Although the interaction of attention and emotion has been widely studied, little is known on the interaction between emotion and executive functions. We studied how threat-related stimuli (spiders) interact with executive performance and whether the interaction profile fits with a resource competition model or avoidance/freezing-type motor behaviors. Twenty-one young healthy individuals performed a Go-NoGo visual discrimination reaction time (RT) task engaging several executive functions with threat-related and emotionally neutral distractors. The threat-related distractors had no effect on the RT or the error rate in the Go trials. The NoGo error rate, reflecting failure in response inhibition, increased significantly because of threat-related distractors in contrast to neutral distractors, P less than 0.05. Thus, threat-related distractors temporarily impaired response inhibition. Threat-related distractors associated with increased commission errors and no effect on RT does not suggest engagement of avoidance/freezing-type motor behaviors. The results fit in the framework of the resource competition model. A potential threat calls for evaluation of affective significance as well as inhibition of undue emotional reactivity. We suggest that these functions tax executive resources and may render other executive functions, such as response inhibition, temporarily compromised when the demands for resources exceed availability.

  19. In Brief: Forecasting meningitis threats

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  20. Nationwide assessment of nonpoint source threats to water quality

    Treesearch

    Thomas C. Brown; Pamela Froemke

    2012-01-01

    Water quality is a continuing national concern, in part because the containment of pollution from nonpoint (diffuse) sources remains a challenge. We examine the spatial distribution of nonpoint-source threats to water quality. On the basis of comprehensive data sets for a series of watershed stressors, the relative risk of water-quality impairment was estimated for the...

  1. Global Threats to Child Safety.

    PubMed

    Mace, Sharon E

    2016-02-01

    Children have rights, as enumerated in the Declaration of the Rights of the Child, and need protection from violence, exploitation, and abuse. Global threats to child safety exist. These threats include lack of basic needs (food, clean water, sanitation), maltreatment, abandonment, child labor, child marriage, female genital mutilation, child trafficking, disasters, and armed conflicts/wars. Recent disasters and armed conflicts have led to a record number of displaced people especially children and their families. Strategies and specific programs can be developed and implemented for eliminating threats to the safety of children. Copyright © 2016 Elsevier Inc. All rights reserved.

  2. Combatting the Terrorist Threat.

    DTIC Science & Technology

    1985-05-22

    regional basis using specific countries and terrorist orga- nizations as examples of what could happen. Caribbean Basin As 1984 begins, the year George ...13. Oseth, p. 70. 14. Ibid., p. 70. 15. George P. Shultz, "Powler and Diploracy in the 80’s," Vital Speeches of the Day, Nay 15, 1984 , p. 451. 16...7CCT’Vfrr SECURITY CLASSIFICATION OF THIS PAGEC(Wh DWaa DAum0 Block 20 (cont.) begins with a trend analysis for 1984 , followed by a histroical overview of

  3. China. Population. New threat.

    PubMed

    Although China's population growth rate in 1980 was the lowest in 31 years, doubling of marriages and increasing life expectancy have emerged as threats to the government plan to hold national population growth to 1200 million by the end of the present century, a Beijing official magazine reported. Liaowang (Observation), published by the government's Xinhua news agency, quoted state family planning officials as saying that a subsequent doubling of marriages this year "threatens another baby boom in the world's most populous nation." The officials said the country's population stood at 982.55 million at the end of 1980, roughly equivalent to 20% of the world's total. According to the magazine, the natural population growth rate declined to 8.97 million last year as the number of births fell to 14.99 million and that of deaths stood at 6.02 million. During the past decade, the natural increase rate of China's population dropped from 26/1000 in 1970 to just 12/1000 in 1980. Owing to increase in production and living standards, along with expansion and improvement of medical facilities, the mortality rate fell from almost 30/1000 before the founding of the People's Republic of China to around 6-8/1000 by the 1970s. According to U.N. statistics prepared for the recently-held international conference on population and development in Beijing, China succeeded in reducing its birth rate by as much as 23.1% between 1960-65 and 1970-75. But such accomplishment is now in danger of being wiped out by a new birth peak expected during the next 10 or more years as those born during the baby boom of the 1960s reached childbearing age during the present decade. In addition, the population control program is also threatened by the rising life expectancy of the Chinese people. Latest statistics compiled by the Ministry of Public Health showed that the average life span of the Chinese population had doubled to 68 years in 1980 from 35 years in 1949. full text

  4. EPR Severe Accident Threats and Mitigation

    SciTech Connect

    Azarian, G.; Kursawe, H.M.; Nie, M.; Fischer, M.; Eyink, J.; Stoudt, R.H.

    2004-07-01

    Despite the extremely low EPR core melt frequency, an improved defence-in-depth approach is applied in order to comply with the EPR safety target: no stringent countermeasures should be necessary outside the immediate plant vicinity like evacuation, relocation or food control other than the first harvest in case of a severe accident. Design provisions eliminate energetic events and maintain the containment integrity and leak-tightness during the entire course of the accident. Based on scenarios that cover a broad range of physical phenomena and which provide a sound envelope of boundary conditions associated with each containment challenge, a selection of representative loads has been done, for which mitigation measures have to cope with. This paper presents the main critical threats and the approach used to mitigate those threats. (authors)

  5. Insider Threat and Information Security Management

    NASA Astrophysics Data System (ADS)

    Coles-Kemp, Lizzie; Theoharidou, Marianthi

    The notion of insider has multiple facets. An organization needs to identify which ones to respond to. The selection, implementetion and maintenance of information security countermeasures requires a complex combination of organisational policies, functions and processes, which form Information Security Management. This chapter examines the role of current information security management practices in addressing the insider threat. Most approaches focus on frameworks for regulating insider behaviour and do not allow for the various cultural responses to the regulatory and compliance framework. Such responses are not only determined by enforcement of policies and awareness programs, but also by various psychological and organisational factors at an individual or group level. Crime theories offer techniques that focus on such cultural responses and can be used to enhance the information security management design. The chapter examines the applicability of several crime theories and concludes that they can contribute in providing additional controls and redesign of information security management processes better suited to responding to the insider threat.

  6. Design, characterization, and evaluation of meloxicam gel prepared by suspension and solution polymerization using solubility parameter as the basis for development.

    PubMed

    Jain, Deepika; Pathak, Kamla

    2010-03-01

    Meloxicam gel was designed based on the matching of the solubility parameter (delta) of the drug with that of the polymer and subsequently with skin for improved dermal delivery of meloxicam. The delta of meloxicam (11.48 (cal/cm(3))(0.5)) determined by solubility measurement was matched statistically to the solubility parameter of monomers, n-vinyl-2-pyrrolidone, polyvinyl alcohol (PVA), hydroxyl ethyl methacrylate, ethylene glycol methacrylate (EGMA) determined by intrinsic viscosity measurement. Consequently gels were formulated by polymerization in selected solvent blend of water/ethyl acetate (20:80) in which the drug showed maximum solubility. Thus, F1-F16 formulations designed were evaluated for physicochemical properties, textural analysis, and in vitro drug release. On the basis of optimum characteristics, F2 (PVA, delta = 16.96 (cal/cm(3))(0.5)) and F8 (EGMA, delta = 18.35 (cal/cm(3))(0.5)) formulated by suspension polymerization were selected and subjected to skin irritation and topical anti-inflammatory studies. The formulation F8 demonstrated significant (p < 0.05) of anti-inflammatory activity in comparison to marketed piroxicam gel and was free from irritation.

  7. Bomb Threat Becomes Real News.

    ERIC Educational Resources Information Center

    Gastaldo, Evann

    1999-01-01

    Discusses how the staff of the newspaper at Camarillo High School (California) covered a bomb threat at their school. Describes how they, overnight, conducted interviews, took and developed photographs, produced the layout, and published the newspaper. (RS)

  8. Bomb Threat Becomes Real News.

    ERIC Educational Resources Information Center

    Gastaldo, Evann

    1999-01-01

    Discusses how the staff of the newspaper at Camarillo High School (California) covered a bomb threat at their school. Describes how they, overnight, conducted interviews, took and developed photographs, produced the layout, and published the newspaper. (RS)

  9. Operationalizing Counter Threat Finance Strategies

    DTIC Science & Technology

    2014-12-01

    prevent the flow of funds to terrorists, including work on combating financial crimes through the APEC Finance Ministers Working Group on Fighting...DEC 2014 2. REPORT TYPE 3. DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Operationalizing Counter Threat Finance Strategies 5a...OPERATIONALIZING COUNTER THREAT FINANCE STRATEGIES Shima D. Keene December 2014 The views expressed in this report are those of the author and do not

  10. Combating the Insider Cyber Threat

    SciTech Connect

    Greitzer, Frank L.; Moore, Andrew P.; Cappelli, Dawn M.; Andrews, Dee H.; Carroll, Lynn; Hull, Thomas D.

    2008-01-02

    This article represents a collaboration between PNNL, CERT/CMU, and AFRL that describes needs and related efforts by these institutions to develop technologies and approaches to counter cyber threats by insiders to informatin systems. The main focus of this article is on the need for effective training on insider threat to raise staff awareness and encourage organizations to adopt a more effective approach to identifying potential risks and take proactive steps to mitigate them.

  11. On NEO Threat Mitigation (Preprint)

    DTIC Science & Technology

    2007-10-15

    high level of authority. II. Threat Definition The threat posed by the impact of asteroids and comets with the Earth has been well publicized... asteroids , which spend most of their time within the Earth orbit but are crossing it. The rate of active comets dropping within the inner solar...extinction-class events, due to their significant mass but also their much higher kinetic energy compared to asteroids . Furthermore, comets are more likely

  12. 340 waste handling facility interim safety basis

    SciTech Connect

    VAIL, T.S.

    1999-04-01

    This document presents an interim safety basis for the 340 Waste Handling Facility classifying the 340 Facility as a Hazard Category 3 facility. The hazard analysis quantifies the operating safety envelop for this facility and demonstrates that the facility can be operated without a significant threat to onsite or offsite people.

  13. 340 Waste handling facility interim safety basis

    SciTech Connect

    Stordeur, R.T.

    1996-10-04

    This document presents an interim safety basis for the 340 Waste Handling Facility classifying the 340 Facility as a Hazard Category 3 facility. The hazard analysis quantifies the operating safety envelop for this facility and demonstrates that the facility can be operated without a significant threat to onsite or offsite people.

  14. Threat Modelling Adobe PDF

    DTIC Science & Technology

    2012-08-01

    on the MS Windows Server, Sun Solaris , IBM AIX, Red Hat or SUSE platforms. Figure 15. A registry setting for the Adobe Reader lockdown If an...be typed into the Acrobat console and executed. The console is designed for testing. 3. Batch JavaScript: a powerful batch system for the execution

  15. Stereotype threat in classroom settings: the interactive effect of domain identification, task difficulty and stereotype threat on female students' maths performance.

    PubMed

    Keller, Johannes

    2007-06-01

    Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths performance. The study was designed to test theoretical ideas derived from stereotype threat theory and assumptions outlined in the Yerkes-Dodson law proposing a nonlinear relationship between arousal, task difficulty and performance. Participants were 108 high school students attending secondary schools. Participants worked on a test comprising maths problems of different difficulty levels. Half of the participants learned that the test had been shown to produce gender differences (stereotype threat). The other half learned that the test had been shown not to produce gender differences (no threat). The degree to which participants identify with the domain of maths was included as a quasi-experimental factor. Maths-identified female students showed performance decrements under conditions of stereotype threat. Moreover, the stereotype threat manipulation had different effects on low and high domain identifiers' performance depending on test item difficulty. On difficult items, low identifiers showed higher performance under threat (vs. no threat) whereas the reverse was true in high identifiers. This interaction effect did not emerge on easy items. Domain identification and test item difficulty are two important factors that need to be considered in the attempt to understand the impact of stereotype threat on performance.

  16. Recent advances in the development of a novel aerosol sorting and deposition system for bio-threat sensing applications

    NASA Astrophysics Data System (ADS)

    Pletcher, Timothy; McGinn, Joseph; Keller, David; Huston, Alan; Eversole, Jay; Sivaprakasum, Vasanthi

    2007-10-01

    Sarnoff Corporation and the Naval Research Laboratory, through support of the U.S. Department of Homeland Security, are developing an automated, high throughput bio-aerosol physical enrichment system designed for use as part of a biological-threat protection system. The Biological Aerosol-Capture-Enrichment (BioACE) system is a bio-aerosol collection system that combines three unique technologies to create physically enriched aerosol samples that can be subsequently interrogated by any number of bio-threat detection systems for the presence of threat agents. An air-to-air concentrator uses an inertial separation technique to highly concentrate an aerosol sample presented to a dual wavelength ultra-violet laser induced fluorescence (UVLIF) optical trigger used to discriminate potential threat particles from non-threat particles conveyed in a collimated particle stream. This particle classification information is used to trigger an electrostatic deposition mechanism to deposit only those particles determined to be potential bio-threats onto a stainless steel substrate. Non-threat particles are discarded with the exiting airflow. The goal for the most recent development effort has been the integration and optimization of these technologies into a unit capable of producing highly enriched particulate samples from ambient air containing variable background aerosol loading and type. Several key technical and engineering challenges were overcome during the course of this development including a unique solution for compensating particle velocity dispersion within the airflow, development of a real-time signal acquisition and detection algorithm for determining material type on a particle by particle basis at rates greater than 2000 particles per second, and the introduction of a robust method for transferring deposited particulate into a 50ul wet sample suitable for most advanced bio-detection techniques. This paper will briefly describe the overall system architecture and

  17. Information optimal compressive x-ray threat detection

    NASA Astrophysics Data System (ADS)

    Huang, James; Ashok, Amit

    2016-05-01

    We present an information-theoretic approach to X-ray measurement design for threat detection in passenger bags. Unlike existing X-ray systems that rely of a large number of sequential tomographic projections for threat detection based on 3D reconstruction, our approach exploits the statistical priors on shape/material of items comprising the bag to optimize multiplexed measurements that can be used directly for threat detection without an intermediate 3D reconstruction. Simulation results show that the optimal multiplexed design achieves higher probability of detection for a given false alarm rate and lower probability of error for a range of exposure (photon) budgets, relative to the non-multiplexed measurements. For example, a 99% detection probability is achieved by optimal multiplexed design requiring 4x fewer measurements than non-multiplexed design.

  18. Cyber threat model for tactical radio networks

    NASA Astrophysics Data System (ADS)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  19. From stereotype threat to stereotype threats: implications of a multi-threat framework for causes, moderators, mediators, consequences, and interventions.

    PubMed

    Shapiro, Jenessa R; Neuberg, Steven L

    2007-05-01

    More than 100 articles have examined the construct of stereotype threat and its implications. However, stereotype threat seems to mean different things to different researchers and has been employed to describe and explain processes and phenomena that appear to be fundamentally distinct. Complementing existing models, the authors posit a Multi-Threat Framework in which six qualitatively distinct stereotype threats arise from the intersection of two dimensions--the target of the threat (the self/one's group) and the source of the threat (the self/outgroup others/ingroup others). The authors propose that these threats constitute the core of the broader stereotype threat construct and provide the foundation for understanding additional, as of yet uncharacterized, stereotype threats. The proposed threats likely differentially peril those with different stigmatizable characteristics, have different eliciting conditions and moderators, are mediated by somewhat different processes, are coped with and compensated for in different ways, and require different interventions to overcome.

  20. An approach to estimating radiological risk of offsite release from a design basis earthquake for the Process Experimental Pilot Plant (PREPP)

    SciTech Connect

    Lucero, V.; Meale, B.M.; Reny, D.A.; Brown, A.N.

    1990-09-01

    In compliance with Department of Energy (DOE) Order 6430.1A, a seismic analysis was performed on DOE's Process Experimental Pilot Plant (PREPP), a facility for processing low-level and transuranic (TRU) waste. Because no hazard curves were available for the Idaho National Engineering Laboratory (INEL), DOE guidelines were used to estimate the frequency for the specified design-basis earthquake (DBE). A dynamic structural analysis of the building was performed, using the DBE parameters, followed by a probabilistic risk assessment (PRA). For the PRA, a functional organization of the facility equipment was effected so that top events for a representative event tree model could be determined. Building response spectra (calculated from the structural analysis), in conjunction with generic fragility data, were used to generate fragility curves for the PREPP equipment. Using these curves, failure probabilities for each top event were calculated. These probabilities were integrated into the event tree model, and accident sequences and respective probabilities were calculated through quantification. By combining the sequences failure probabilities with a transport analysis of the estimated airborne source term from a DBE, onsite and offsite consequences were calculated. The results of the comprehensive analysis substantiated the ability of the PREPP facility to withstand a DBE with negligible consequence (i.e., estimated release was within personnel and environmental dose guidelines). 57 refs., 19 figs., 20 tabs.

  1. Effects of non-latching blast valves on the source term and consequences of the design-basis accidents in the Device Assembly Facility (DAF)

    SciTech Connect

    Nguyen, D.H.

    1993-08-01

    The analysis of the Design-Basis Accidents (DBA) involving high explosives (HE) and Plutonium (Pu) in the assembly cell of the Device Assembly Facility (DAF), which was completed earlier, assumed latching blast valves in the ventilation system of the assembly cell. Latching valves effectively sealed a release path through the ventilation duct system. However, the blast valves in the assembly cell, as constructed are actually non-latching valves, and would reopen when the gas pressure drops to 0.5 psi above one atmosphere. Because the reopening of the blast valves provides an additional release path to the environment, and affects the material transport from the assembly cell to other DAF buildings, the DOE/NV DAF management has decided to support an additional analysis of the DAF`s DBA to account for the effects of non-latching valves. Three cases were considered in the DAF`s DBA, depending on the amount of HE and Pu involved, as follows: Case 1 -- 423 {number_sign}HE, 16 kg Pu; Case 2 -- 150 {number_sign}HE 10 kg Pu; Case 3 -- 55 {number_sign}HE 5 kg Pu. The results of the analysis with non-latching valves are summarized.

  2. Model-free adaptive sliding mode controller design for generalized projective synchronization of the fractional-order chaotic system via radial basis function neural networks

    NASA Astrophysics Data System (ADS)

    Wang, L. M.

    2017-09-01

    A novel model-free adaptive sliding mode strategy is proposed for a generalized projective synchronization (GPS) between two entirely unknown fractional-order chaotic systems subject to the external disturbances. To solve the difficulties from the little knowledge about the master-slave system and to overcome the bad effects of the external disturbances on the generalized projective synchronization, the radial basis function neural networks are used to approach the packaged unknown master system and the packaged unknown slave system (including the external disturbances). Consequently, based on the slide mode technology and the neural network theory, a model-free adaptive sliding mode controller is designed to guarantee asymptotic stability of the generalized projective synchronization error. The main contribution of this paper is that a control strategy is provided for the generalized projective synchronization between two entirely unknown fractional-order chaotic systems subject to the unknown external disturbances, and the proposed control strategy only requires that the master system has the same fractional orders as the slave system. Moreover, the proposed method allows us to achieve all kinds of generalized projective chaos synchronizations by turning the user-defined parameters onto the desired values. Simulation results show the effectiveness of the proposed method and the robustness of the controlled system.

  3. Design of hybrid radial basis function neural networks (HRBFNNs) realized with the aid of hybridization of fuzzy clustering method (FCM) and polynomial neural networks (PNNs).

    PubMed

    Huang, Wei; Oh, Sung-Kwun; Pedrycz, Witold

    2014-12-01

    In this study, we propose Hybrid Radial Basis Function Neural Networks (HRBFNNs) realized with the aid of fuzzy clustering method (Fuzzy C-Means, FCM) and polynomial neural networks. Fuzzy clustering used to form information granulation is employed to overcome a possible curse of dimensionality, while the polynomial neural network is utilized to build local models. Furthermore, genetic algorithm (GA) is exploited here to optimize the essential design parameters of the model (including fuzzification coefficient, the number of input polynomial fuzzy neurons (PFNs), and a collection of the specific subset of input PFNs) of the network. To reduce dimensionality of the input space, principal component analysis (PCA) is considered as a sound preprocessing vehicle. The performance of the HRBFNNs is quantified through a series of experiments, in which we use several modeling benchmarks of different levels of complexity (different number of input variables and the number of available data). A comparative analysis reveals that the proposed HRBFNNs exhibit higher accuracy in comparison to the accuracy produced by some models reported previously in the literature. Copyright © 2014 Elsevier Ltd. All rights reserved.

  4. Comparative Environmental Threat Analysis: Three Case Studies.

    ERIC Educational Resources Information Center

    Latour, J. B.; Reiling, R.

    1994-01-01

    Reviews how carrying capacity for different environmental problems is operationalized. Discusses whether it is possible to compare threats, using the exceeding of carrying capacity as a yardstick. Points out problems in comparative threat analysis using three case studies: threats to European groundwater resources, threats to ecosystems in Europe,…

  5. The Social Construction of the Soviet Threat.

    ERIC Educational Resources Information Center

    Nathanson, Charles E.; Skelly, James M.

    For almost 40 years the perception of a Soviet threat has influenced much foreign and domestic political behavior in the United States. How to respond to the threat has been a subject of intense debate, but the reality of the threat has been taken for granted. Conviction about the reality of this threat dates back to George Kennan's long telegram…

  6. The Social Construction of the Soviet Threat.

    ERIC Educational Resources Information Center

    Nathanson, Charles E.; Skelly, James M.

    For almost 40 years the perception of a Soviet threat has influenced much foreign and domestic political behavior in the United States. How to respond to the threat has been a subject of intense debate, but the reality of the threat has been taken for granted. Conviction about the reality of this threat dates back to George Kennan's long telegram…

  7. Comparative Environmental Threat Analysis: Three Case Studies.

    ERIC Educational Resources Information Center

    Latour, J. B.; Reiling, R.

    1994-01-01

    Reviews how carrying capacity for different environmental problems is operationalized. Discusses whether it is possible to compare threats, using the exceeding of carrying capacity as a yardstick. Points out problems in comparative threat analysis using three case studies: threats to European groundwater resources, threats to ecosystems in Europe,…

  8. THREAT ENSEMBLE VULNERABILITY ASSESSMENT ...

    EPA Pesticide Factsheets

    software and manual TEVA-SPOT is used by water utilities to optimize the number and location of contamination detection sensors so that economic and/or public health consequences are minimized. TEVA-SPOT is interactive, allowing a user to specify the minimization objective (e.g., the number of people exposed, the time to detection, or the extent of pipe length contaminated). It also allows a user to specify constraints. For example, a TEVA-SPOT user can employ expert knowledge during the design process by identifying either existing or unfeasible sensor locations. Installation and maintenance costs for sensor placement can also be factored into the analysis. Python and Java are required to run TEVA-SPOT

  9. Cyber threats within civil aviation

    NASA Astrophysics Data System (ADS)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  10. Identifying chemicals that are planetary boundary threats.

    PubMed

    MacLeod, Matthew; Breitholtz, Magnus; Cousins, Ian T; de Wit, Cynthia A; Persson, Linn M; Rudén, Christina; McLachlan, Michael S

    2014-10-07

    Rockström et al. proposed a set of planetary boundaries that delimit a "safe operating space for humanity". Many of the planetary boundaries that have so far been identified are determined by chemical agents. Other chemical pollution-related planetary boundaries likely exist, but are currently unknown. A chemical poses an unknown planetary boundary threat if it simultaneously fulfills three conditions: (1) it has an unknown disruptive effect on a vital Earth system process; (2) the disruptive effect is not discovered until it is a problem at the global scale, and (3) the effect is not readily reversible. In this paper, we outline scenarios in which chemicals could fulfill each of the three conditions, then use the scenarios as the basis to define chemical profiles that fit each scenario. The chemical profiles are defined in terms of the nature of the effect of the chemical and the nature of exposure of the environment to the chemical. Prioritization of chemicals in commerce against some of the profiles appears feasible, but there are considerable uncertainties and scientific challenges that must be addressed. Most challenging is prioritizing chemicals for their potential to have a currently unknown effect on a vital Earth system process. We conclude that the most effective strategy currently available to identify chemicals that are planetary boundary threats is prioritization against profiles defined in terms of environmental exposure combined with monitoring and study of the biogeochemical processes that underlie vital Earth system processes to identify currently unknown disruptive effects.

  11. Dimensions of early experience and neural development: deprivation and threat.

    PubMed

    Sheridan, Margaret A; McLaughlin, Katie A

    2014-11-01

    Over the past decade, a growing area of research has focused on adverse childhood experiences (ACEs) and their impacts on neural and developmental outcomes. Work in the field to-date has generally conceptualized ACEs in terms of exposure to stress while overlooking the underlying dimensions of environmental experience that may distinctly impact neural development. Here, we propose a novel framework that differentiates between deprivation (absence of expected cognitive and social input) and threat (presence of a threat to one's physical integrity). We draw support for the neural basis of this distinction from studies on fear learning and sensory deprivation in animals to highlight potential mechanisms through which experiences of threat and deprivation could affect neural structure and function in humans.

  12. Computer-assisted threat evaluation

    NASA Astrophysics Data System (ADS)

    Bains, Jatin S.; Davies, Livingston

    2006-05-01

    The use of a CATE (Computer Assisted Threat Evaluation) System in the Maritime Domain lends itself technically and operationally to data exploitation thru the use of domain forensics and link analysis of fragmented information utilizing data prioritization and suspicion indicators for an aggressor's method of operation. The timely availability of threat mitigating actionable information is one of the key tools for success in the Global War On Terror (GWOT). The global supply chain is vulnerable to exploitation by nefarious individuals, governments, and terrorist organizations. For example, Figure 1 illustrates one of many potential methods that could be used to circumvent regulations limiting proliferation of WMDs.

  13. Integrated Cognitive-neuroscience Architectures for Understanding Sensemaking (ICArUS): A Computational Basis for ICArUS Challenge Problem Design

    DTIC Science & Technology

    2014-11-01

    Integrated Cognitive- neuroscience Architectures for Understanding Sensemaking (ICArUS): A Computational Basis for ICArUS Challenge...4. TITLE AND SUBTITLE Integrated Cognitive- neuroscience Architectures for Understanding Sensemaking (ICArUS): A Computational Basis for ICArUS...Advanced Research Projects Activity) program ICArUS (Integrated Cognitive- neuroscience Architectures for Understanding Sensemaking) requires

  14. Enzymatic activation of double-targeted 5'-O-L-valyl-decitabine prodrug by biphenyl hydrolase-like protein and its molecular design basis.

    PubMed

    Tao, Wenhui; Zhao, Dongyang; Sun, Mengchi; Li, Meng; Zhang, Xiangyu; He, Zhonggui; Sun, Yinghua; Sun, Jin

    2017-04-01

    A primary focus of this research was to explore the activation process and mechanism of decitabine (5-aza-2'-deoxycytidine, DAC) prodrug. Recently, it has been reported that biphenyl hydrolase-like protein (BPHL) can play an important role in the activation of some amino acid nucleoside prodrugs with a general preference for hydrophobic amino acids and 5'-esters. Therefore, we put forward a bold hypothesis that this novel enzyme may be primarily responsible for the activation process of DAC prodrug as well. 5'-O-L-valyl-decitabine (L-val-DAC) was synthesized before and can be transported across biological membranes by the oligopeptide transporter (PEPT1), granting it much greater utility in vivo. In this report, L-val-DAC was found to be a good substrate of BPHL protein (K m 0.59 mM; k cat/K m 553.69 mM(-1) s(-1)). After intestinal absorption, L-val-DAC was rapidly and almost completely hydrolyzed to DAC and L-valine. The catalysis was mainly mediated by the BPHL hydrolase and resulted in the intestinal first-pass effect of L-val-DAC after oral administration in Sprague-Dawley rats with cannulated jugular and portal veins. The structural insights using computational molecular docking showed that BPHL had a unique binding mode for L-val-DAC. As a fundamental basis, the simulation was employed to explain the catalytic mechanism in molecular level. In conclusion, BPHL was at least one of the primary candidate enzymes for L-val-DAC prodrug activation. This promising double-targeted prodrug approach have more advantages than the traditional targeted designs due to its higher transport and more predictable activation, thereby leading to a favorable property for oral delivery.

  15. Bomb Threats Taking Financial Toll

    ERIC Educational Resources Information Center

    Bowman, Darcia Harris

    2004-01-01

    Despite all its efforts to crack down on the bomb scares that disrupted classes again and again in 2003, North Carolina's Orange County district fell victim to yet another false alarm this school year, 2004. For some schools, bomb threats have become more routine than fire drills, with each incident ringing up multi-thousand-dollar tabs for…

  16. Cyber Threats to Nuclear Infrastructures

    SciTech Connect

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  17. Parking garage threats and countermeasures.

    PubMed

    Clark, Sam

    2004-01-01

    Preventing and dealing with crime in hospital parking facilities poses a serious challenge to administration and security. Multiple methods to effectively combat the threats are described by the author, but their implementation depends on how seriously a healthcare organization views its responsibility to provide a safe and secure environment for its staff, patients and visitors.

  18. Measuring Vulnerability to Stereotype Threat

    ERIC Educational Resources Information Center

    Barnard, Lucy; Burley, Hansel; Olivarez, Arturo; Crooks, Steven

    2008-01-01

    Introduction: In this study, we examined the psychometric properties of an instrument intended to measure vulnerability to stereotype threat. Method: We revised the instrument through assessing score reliability and then examined a domain specific model using confirmatory factor analyses. After examining the responses of the total sample…

  19. Bomb Threats Taking Financial Toll

    ERIC Educational Resources Information Center

    Bowman, Darcia Harris

    2004-01-01

    Despite all its efforts to crack down on the bomb scares that disrupted classes again and again in 2003, North Carolina's Orange County district fell victim to yet another false alarm this school year, 2004. For some schools, bomb threats have become more routine than fire drills, with each incident ringing up multi-thousand-dollar tabs for…

  20. Global Threats From Preventable Injuries.

    PubMed

    Phillips, Jennan A

    2017-10-01

    Preventable injuries kill thousands of the world's population every day and injure millions each year. Road traffic crashes and opioid drug misuse are major causes of these injuries. Increased efforts are needed to promote strong policies, develop new prevention strategies, and protect workers from these global public health threats.

  1. Brain Mechanisms of Social Threat Effects on Working Memory

    PubMed Central

    van Ast, V. A.; Spicer, J.; Smith, E. E.; Schmer-Galunder, S.; Liberzon, I.; Abelson, J. L.; Wager, T. D.

    2016-01-01

    Social threat can have adverse effects on cognitive performance, but the brain mechanisms underlying its effects are poorly understood. We investigated the effects of social evaluative threat on working memory (WM), a core component of many important cognitive capabilities. Social threat impaired WM performance during an N-back task and produced widespread reductions in activation in lateral prefrontal cortex and intraparietal sulcus (IPS), among other regions. In addition, activity in frontal and parietal regions predicted WM performance, and mediation analyses identified regions in the bilateral IPS that mediated the performance-impairing effects of social threat. Social threat also decreased connectivity between the IPS and dorsolateral prefrontal cortex, while increasing connectivity between the IPS and the ventromedial prefrontal cortex, a region strongly implicated in the generation of autonomic and emotional responses. Finally, cortisol response to the stressor did not mediate WM impairment but was rather associated with protective effects. These results provide a basis for understanding interactions between social and cognitive processes at a neural systems level. PMID:25249408

  2. Meteoroids and Meteor Storms: A Threat to Spacecraft

    NASA Technical Reports Server (NTRS)

    Anderson, B. Jeffrey

    1999-01-01

    Robust system design is the best protection against meteoroid damage. Impacts by small meteoroids are common on satellite surfaces, but impacts by meteoroids large enough to damage well designed systems are very rare. Estimating the threat from the normal meteoroid environment is difficult. Estimates for the occasional "storm" are even more uncertain. Common sense precautions are in order for the 1999 Leonids, but wide-spread catastrophic damage is highly unlikely. Strong Leonid showers are also expected in 2000 and 2001, but these pose much less threat than 1999.

  3. The effect of threat on attentional interruption by pain.

    PubMed

    Moore, David J; Keogh, Edmund; Eccleston, Christopher

    2013-01-01

    Pain is known to interrupt attention. This interruption is highly sensitive to the extent of involvement of both attentional control and the level of threat associated with the sensation. However, few studies have examined these factors together. This study aimed to examine the interruptive effect of pain on higher-order attentional tasks under conditions of low and high threat. Fifty participants completed an n-back task, an attentional switching task, and a divided attention task, once in pain and once without pain. Twenty-five participants were given standard task instructions (control condition), and the remainder were given additional verbal information designed to increase threat (threat condition). Pain interrupted participant performance on both the n-back and attentional switching task, but not on the divided attention task. The addition of the threat manipulation did not seem to significantly alter the effect of pain on these attentional tasks. However, independent of pain, threat did moderate performance on the divided attention task. These findings support the robustness of the effect of pain on performance on higher-order attention tasks. Future research is needed to examine what factors alter the cognitive interruption caused by pain.

  4. Attention to Threats and Combat-Related Posttraumatic Stress Symptoms

    PubMed Central

    Wald, Ilan; Degnan, Kathryn A.; Gorodetsky, Elena; Charney, Dennis S.; Fox, Nathan A.; Fruchter, Eyal; Goldman, David; Lubin, Gad; Pine, Daniel S.; Bar-Haim, Yair

    2015-01-01

    Importance Combat places soldiers at risk for post-traumatic stress disorder (PTSD). The excessive rates of PTSD and other adjustment disorders in soldiers returning home make it imperative to identify risk and resilience factors that could be targeted by novel therapeutic treatments. Objective To investigate the interplay among attention to threat, combat exposure, and other risk factors for PTSD symptoms in soldiers deployed to combat. Design and Setting Longitudinal prospective study of Israeli Defense Force infantry soldiers carried out in 2008 through 2010. Repeated measurements during a 1-year period included baseline and predeployment data collected in training camps and deployment data collected in the combat theater. Participants Infantry soldiers (1085 men; mean age,18.8 years). Main Outcome Measures Postcombat PTSD symptoms. Results Soldiers developed threat vigilance during combat deployment, particularly when they were exposed to high-intensity combat, as indicated by faster response times to targets appearing at the location of threat relative to neutral stimuli (P < .001). Threat-related attention bias also interacted with combat exposure to predict risk for PTSD (P <.05). Bias toward threat at recruitment (P <.001) and bias away from threat just before deployment (P < .05) predicted postcombat PTSD symptoms. Moreover, these threat-related attention associations with PTSD were moderated by genetic and environmental factors, including serotonin transporter (5-HTTLPR) genotype. Conclusions and Relevance Combat exposure interacts with threat-related attention to place soldiers at risk for PTSD, and interactions with other risk factors account for considerable variance in PTSD vulnerability. Understanding these associations informs research on novel attention bias modification techniques and prevention of PTSD. PMID:23407816

  5. Monitoring Technologies for Mitigating Insider Threats

    NASA Astrophysics Data System (ADS)

    Bowen, Brian M.; Salem, Malek Ben; Keromytis, Angelos D.; Stolfo, Salvatore J.

    In this chapter, we propose a design for an insider threat detection system that combines an array of complementary techniques that aims to detect evasive adversaries. We are motivated by real world incidents and our experience with building isolated detectors: such standalone mechanisms are often easily identified and avoided by malefactors. Our work-in-progress combines host-based user-event monitoring sensors with trap-based decoys and remote network detectors to track and correlate insider activity. We introduce and formalize a number of properties of decoys as a guide to design trap-based defenses to increase the likelihood of detecting an insider attack. We identify several challenges in scaling up, deploying, and validating our architecture in real environments.

  6. Children's Threats: When Are They Serious?

    MedlinePlus

    ... Facts for Families Guide Facts for Families - Vietnamese Threats by Children: When are they Serious? No. 65; ... which children shoot and kill individuals after making threats. When this occurs, everyone asks themselves, "How could ...

  7. Zika Still a Threat During Winter Months

    MedlinePlus

    ... page: https://medlineplus.gov/news/fullstory_162518.html Zika Still a Threat During Winter Months Public health ... doesn't necessarily mean the end of the Zika threat in the United States, a public health ...

  8. Defeating the Modern Asymmetric Threat

    DTIC Science & Technology

    2002-06-01

    prolific use of suicide bombers by the LTTE: one strategic, one operational, one psychological and one religious. Chapter V conducts an analysis of...and responsive government) are the applicable variables in defeating the modern asymmetric threat, even those that employ suicide bombers. I...future. 15. NUMBER OF PAGES 171 14. SUBJECT TERMS Sri Lanka, LTTE, Ethnic Conflict, Asymmetry, Suicide Terrorism, Foreign Internal Defense

  9. Mexican Cartels: Threat and Response

    DTIC Science & Technology

    2013-03-01

    entrepreneurial networks whose guiding motivation is profit, not ideology. By mischaracterizing this threat, devising a strategy to effectively address the...the cartels in Mexico are not motivated to create a homeland to call their own, substitute their ideology for an existing one, or achieve any...violence to instill fear and coerce governments or societies. Terrorism is often motivated by religious, political, or other ideological beliefs and

  10. National Strategy, Future Threats and Defense Spending

    DTIC Science & Technology

    1992-06-05

    AD-A256 884 NATIONAL STRATEGY, FUTURE THREATS AND DEFENSE SPENDING A thesis presented to the Faculty of the U.S. Army Command and General Staff...Jun 92 4. TITLE AND SUBTITLE S. FUNDING NUMBERS National Strategy, Future Threats and Defense Spending 6. AUTHOR(S) MAJ Daniel M. Gerstein, USA 7...Future Threats, Defense Spending , 192 Regional Threats 16. PRICE COOE 17. SECURITY CLASSIFICATION 118. SECURITY CLASSIFICATION 19. SECURITY

  11. Threat Assessment Teams Target School Crisis

    ERIC Educational Resources Information Center

    Stover, Del

    2005-01-01

    In this article, the author discusses the creation of a threat-assessment team to be utilized in order to analyze each threat and the usage of threat-assessment protocols for the purpose of guiding school administrators through a crisis. These are actually developed with the advice from the US Department of Education and the Secret Service. When a…

  12. Threat Based Risk Assessment for Enterprise Networks

    DTIC Science & Technology

    2016-02-15

    Threat-Based Risk Assessment for Enterprise Networks Richard P. Lippmann and James F. Riordan Protecting enterprise networks requires... enterprises to make sure that risks from all current threats are addressed, many organizations adopt a best-practices approach by installing popular...effective when performed by skilled security practitioners who understand an enterprise network, can enumerate all threats and their likelihoods, and

  13. Threat Assessment Teams Target School Crisis

    ERIC Educational Resources Information Center

    Stover, Del

    2005-01-01

    In this article, the author discusses the creation of a threat-assessment team to be utilized in order to analyze each threat and the usage of threat-assessment protocols for the purpose of guiding school administrators through a crisis. These are actually developed with the advice from the US Department of Education and the Secret Service. When a…

  14. 24 CFR 9.131 - Direct threat.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Direct threat. 9.131 Section 9.131... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT § 9.131 Direct threat. (a) This part does not require the agency..., privileges, advantages and accommodations of that agency when that individual poses a direct threat to the...

  15. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) In determining whether an individual...

  16. 28 CFR 35.139 - Direct threat.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Direct threat. 35.139 Section 35.139... LOCAL GOVERNMENT SERVICES General Requirements § 35.139 Direct threat. (a) This part does not require a... activities of that public entity when that individual poses a direct threat to the health or safety of others...

  17. Stereotype Threat, Test Anxiety, and Mathematics Performance

    ERIC Educational Resources Information Center

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  18. Stereotype Threat, Test Anxiety, and Mathematics Performance

    ERIC Educational Resources Information Center

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  19. Perfectionism Moderates Stereotype Threat Effects on STEM Majors' Academic Performance

    ERIC Educational Resources Information Center

    Rice, Kenneth G.; Lopez, Frederick G.; Richardson, Clarissa M. E.; Stinson, Jennifer M.

    2013-01-01

    Using a randomized, between-subjects experimental design, we tested hypotheses that self-critical perfectionism would moderate the effects of subtle stereotype threat (ST) for women and students in underrepresented racial/ethnic groups who are pursuing traditional degrees in science, technology, engineering, or math (STEM). A diverse sample of…

  20. Threats to wilderness ecosystems: impacts and research needs

    Treesearch

    David N. Cole; Peter B. Landres

    1996-01-01

    One of the primary purposes of designated wilderness areas is protection of natural ecosystems. However, the ecological integrity of these most protected of public lands is threatened by direct and indirect effects of human activities both internal and external to wilderness. Accelerated research programs on threats to wilderness are needed to realize the purposes for...

  1. Perfectionism Moderates Stereotype Threat Effects on STEM Majors' Academic Performance

    ERIC Educational Resources Information Center

    Rice, Kenneth G.; Lopez, Frederick G.; Richardson, Clarissa M. E.; Stinson, Jennifer M.

    2013-01-01

    Using a randomized, between-subjects experimental design, we tested hypotheses that self-critical perfectionism would moderate the effects of subtle stereotype threat (ST) for women and students in underrepresented racial/ethnic groups who are pursuing traditional degrees in science, technology, engineering, or math (STEM). A diverse sample of…

  2. A simple strategy to reduce stereotype threat for orthopedic residents.

    PubMed

    Gomez, Everlyne; Wright, James G

    2014-04-01

    Stereotype threat, defined as the predicament felt by people in either positive or negative learning experiences where they could conform to negative stereotypes associated with their own group membership, can interfere with learning. The purpose of this study was to determine if a simple orientation session could reduce stereotype threat for orthopedic residents. The intervention group received an orientation on 2 occasions focusing on their possible responses to perceived poor performance in teaching rounds and the operating room (OR). Participants completed a survey with 7 questions typical for stereotype threat evaluating responses to their experiences. The questions had 7 response options with a maximum total score of 49, where higher scores indicated greater degree of experiences typical of stereotype threat. Of the 84 eligible residents, 49 participated: 22 in the nonintervention and 27 in the intervention group. The overall scores were 29 and 29.4, and 26.2 and 25.8 in the nonintervention and intervention groups for their survey responses to perceived poor performance in teaching rounds (p = 0.85) and the OR (p = 0.84), respectively. Overall, responses typical of stereotype threat were greater for perceived poor performance at teaching rounds than in the OR (p = 0.001). Residents experience low self-esteem following perceived poor performance, particularly at rounds. A simple orientation designed to reduce stereotype threat was unsuccessful in reducing this threat overall. Future research will need to consider longer-term intervention as possible strategies to reduce perceived poor performance at teaching rounds and in the OR.

  3. A simple strategy to reduce stereotype threat for orthopedic residents

    PubMed Central

    Gomez, Everlyne; Wright, James G.

    2014-01-01

    Background Stereotype threat, defined as the predicament felt by people in either positive or negative learning experiences where they could conform to negative stereotypes associated with their own group membership, can interfere with learning. The purpose of this study was to determine if a simple orientation session could reduce stereotype threat for orthopedic residents. Methods The intervention group received an orientation on 2 occasions focusing on their possible responses to perceived poor performance in teaching rounds and the operating room (OR). Participants completed a survey with 7 questions typical for stereotype threat evaluating responses to their experiences. The questions had 7 response options with a maximum total score of 49, where higher scores indicated greater degree of experiences typical of stereotype threat. Results Of the 84 eligible residents, 49 participated: 22 in the nonintervention and 27 in the intervention group. The overall scores were 29 and 29.4, and 26.2 and 25.8 in the nonintervention and intervention groups for their survey responses to perceived poor performance in teaching rounds (p = 0.85) and the OR (p = 0.84), respectively. Overall, responses typical of stereotype threat were greater for perceived poor performance at teaching rounds than in the OR (p = 0.001). Conclusion Residents experience low self-esteem following perceived poor performance, particularly at rounds. A simple orientation designed to reduce stereotype threat was unsuccessful in reducing this threat overall. Future research will need to consider longer-term intervention as possible strategies to reduce perceived poor performance at teaching rounds and in the OR. PMID:24666454

  4. Association between neural reactivity and startle reactivity to uncertain threat in two independent samples.

    PubMed

    Gorka, Stephanie M; Lieberman, Lynne; Shankman, Stewart A; Phan, K Luan

    2017-05-01

    Prior studies indicate that anxiety disorders are associated with heightened sensitivity to uncertain threat (U threat). Individual differences in reactivity to U threat have been measured in the laboratory with two methodologies-startle eyeblink potentiation and fMRI. While startle and fMRI are purported to relate to each other, very little research exists on whether individual differences in one measure are associated with individual differences in another and, thus, whether startle and fMRI capture shared mechanisms. Therefore, the current study was designed to investigate if and where in the brain measures of startle potentiation and fMRI BOLD signal correlate during response to U threat across two independent samples. Participants in both studies completed two threat anticipation tasks-once during collection of startle potentiation and once during fMRI. In Study 1 (n = 43), the startle and fMRI tasks both used electric shock as the threat. As an extension, in Study 2 (n = 38), the startle task used electric shock but the fMRI task used aversive images. Despite these methodological differences, greater startle potentiation to U threat was associated with greater dorsal anterior cingulate, caudate, and orbitofrontal cortex reactivity to U threat in both samples. The findings suggest that startle and fMRI measures of responding to U threat overlap, and points toward an integrated brain-behavior profile of aberrant U threat responding. © 2017 Society for Psychophysiological Research.

  5. Novel Threat-risk Index Using Probabilistic Risk Assessment and Human Reliability Analysis - Final Report

    SciTech Connect

    George A. Beitel

    2004-02-01

    In support of a national need to improve the current state-of-the-art in alerting decision makers to the risk of terrorist attack, a quantitative approach employing scientific and engineering concepts to develop a threat-risk index was undertaken at the Idaho National Engineering and Environmental Laboratory (INEEL). As a result of this effort, a set of models has been successfully integrated into a single comprehensive model known as Quantitative Threat-Risk Index Model (QTRIM), with the capability of computing a quantitative threat-risk index on a system level, as well as for the major components of the system. Such a threat-risk index could provide a quantitative variant or basis for either prioritizing security upgrades or updating the current qualitative national color-coded terrorist threat alert.

  6. There is more than the amygdala: potential threat assessment in the cingulate cortex.

    PubMed

    Fiddick, Laurence

    2011-03-01

    Fear conditioning with its neurological basis in the amygdala and associated structures provides an important model of anxiety disorders. However, this review will argue for a distinction between fear-provoking immediate and anxiety-provoking potential threats, with the amygdala processing immediate threats and the cingulate cortex (and insular) processing potential threats. Four independent but related literatures are reviewed to bolster this argument: (1) rodent remote contextual fear conditioning, (2) symptom provocation in obsessive compulsive disorder (OCD), (3) fMRI investigations of risk assessment, and (4) behavioural and neurological studies of precautionary reasoning. These four literatures converge in suggesting that the cingulate cortex (and in more specific instances the insula) underlie potential threat assessment, providing support for a number of recent models posting the existence of a separate potential threat system that is dysfunctional in obsessive compulsive disorder (e.g., Szechtman and Woody, 2004; Woody and Szechtman, 2011).

  7. Antecedents to Psychological Reactance: The Impact of Threat, Message Frame, and Choice.

    PubMed

    Shen, Lijiang

    2015-01-01

    A 2 (Threat: high vs. low) × 2 (Frame: gain vs. loss) × 2 (Choice: yes vs. no) × 2 (Behavior: prevention vs. detection) factorial design Web-based experiment (N = 814) was conducted to investigate the impact of threat to freedom, message frame, and behavioral choice as antecedents to psychological reactance. The intertwined model for reactance measure was replicated. Results showed that threat to freedom and the loss frame increased, and the gain frame and choice mitigated psychological reactance. The advantages of choice and the gain frame were most salient when threat was high.

  8. Stereotype threat and female communication styles.

    PubMed

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  9. Threat and error management for anesthesiologists: a predictive risk taxonomy.

    PubMed

    Ruskin, Keith J; Stiegler, Marjorie P; Park, Kellie; Guffey, Patrick; Kurup, Viji; Chidester, Thomas

    2013-12-01

    Patient care in the operating room is a dynamic interaction that requires cooperation among team members and reliance upon sophisticated technology. Most human factors research in medicine has been focused on analyzing errors and implementing system-wide changes to prevent them from recurring. We describe a set of techniques that has been used successfully by the aviation industry to analyze errors and adverse events and explain how these techniques can be applied to patient care. Threat and error management (TEM) describes adverse events in terms of risks or challenges that are present in an operational environment (threats) and the actions of specific personnel that potentiate or exacerbate those threats (errors). TEM is a technique widely used in aviation, and can be adapted for the use in a medical setting to predict high-risk situations and prevent errors in the perioperative period. A threat taxonomy is a novel way of classifying and predicting the hazards that can occur in the operating room. TEM can be used to identify error-producing situations, analyze adverse events, and design training scenarios. TEM offers a multifaceted strategy for identifying hazards, reducing errors, and training physicians. A threat taxonomy may improve analysis of critical events with subsequent development of specific interventions, and may also serve as a framework for training programs in risk mitigation.

  10. Threat and error management for anesthesiologists: a predictive risk taxonomy

    PubMed Central

    Ruskin, Keith J.; Stiegler, Marjorie P.; Park, Kellie; Guffey, Patrick; Kurup, Viji; Chidester, Thomas

    2015-01-01

    Purpose of review Patient care in the operating room is a dynamic interaction that requires cooperation among team members and reliance upon sophisticated technology. Most human factors research in medicine has been focused on analyzing errors and implementing system-wide changes to prevent them from recurring. We describe a set of techniques that has been used successfully by the aviation industry to analyze errors and adverse events and explain how these techniques can be applied to patient care. Recent findings Threat and error management (TEM) describes adverse events in terms of risks or challenges that are present in an operational environment (threats) and the actions of specific personnel that potentiate or exacerbate those threats (errors). TEM is a technique widely used in aviation, and can be adapted for the use in a medical setting to predict high-risk situations and prevent errors in the perioperative period. A threat taxonomy is a novel way of classifying and predicting the hazards that can occur in the operating room. TEM can be used to identify error-producing situations, analyze adverse events, and design training scenarios. Summary TEM offers a multifaceted strategy for identifying hazards, reducing errors, and training physicians. A threat taxonomy may improve analysis of critical events with subsequent development of specific interventions, and may also serve as a framework for training programs in risk mitigation. PMID:24113268

  11. Threat effects on human oculo-motor function.

    PubMed

    Naranjo, E N; Cleworth, T W; Allum, J H J; Inglis, J T; Lea, J; Westerberg, B D; Carpenter, M G

    2017-09-17

    Neuro-anatomical evidence supports the potential for threat-related factors, such as fear, anxiety and vigilance, to influence brainstem motor nuclei controlling eye movements, as well as the vestibular nuclei. However, little is known about how threat influences human ocular responses, such as eye saccades (ES), smooth pursuit eye tracking (SP), and optokinetic nystagmus (OKN), and whether these responses can be facilitated above normal baseline levels with a natural source of threat. This study was designed to examine the effects of height-induced postural threat on the gain of ES, SP and OKN responses in humans. Twenty participants stood at two different surface heights while performing ES (ranging from 8° to 45° from center), SP (15, 20, 30°/s) and OKN (15, 30, 60°/s) responses in the horizontal plane. Height did not significantly increase the slope of the relationship between ES peak velocity and initial amplitude, or the gain of ES amplitude. In contrast height significantly increased SP and OKN gain. Significant correlations were found between changes in physiological arousal and OKN gain. Observations of changes with height in OKN and SP support neuro-anatomical evidence of threat-related mechanisms influencing both oculo-motor nuclei and vestibular reflex pathways. Although further study is warranted, the findings suggest that potential influences of fear, anxiety and arousal/alertness should be accounted for, or controlled, during clinical vestibular and oculo-motor testing. Copyright © 2017 IBRO. Published by Elsevier Ltd. All rights reserved.

  12. Teens impulsively react rather than retreat from threat.

    PubMed

    Dreyfuss, Michael; Caudle, Kristina; Drysdale, Andrew T; Johnston, Natalie E; Cohen, Alexandra O; Somerville, Leah H; Galván, Adriana; Tottenham, Nim; Hare, Todd A; Casey, B J

    2014-01-01

    There is a significant inflection in risk taking and criminal behavior during adolescence, but the basis for this increase remains largely unknown. An increased sensitivity to rewards has been suggested to explain these behaviors, yet juvenile offences often occur in emotionally charged situations of negative valence. How behavior is altered by changes in negative emotional processes during adolescence has received less attention than changes in positive emotional processes. The current study uses a measure of impulsivity in combination with cues that signal threat or safety to assess developmental changes in emotional responses to threat cues. We show that adolescents, especially males, impulsively react to threat cues relative to neutral ones more than adults or children, even when instructed not to respond. This adolescent-specific behavioral pattern is paralleled by enhanced activity in limbic cortical regions implicated in the detection and assignment of emotional value to inputs and in the subsequent regulation of responses to them when successfully suppressing impulsive responses to threat cues. In contrast, prefrontal control regions implicated in detecting and resolving competing responses show an adolescent-emergent pattern (i.e. greater activity in adolescents and adults relative to children) during successful suppression of a response regardless of emotion. Our findings suggest that adolescence is a period of heightened sensitivity to social and emotional cues that results in diminished regulation of behavior in their presence.

  13. Teens Impulsively React Rather than Retreat from Threat

    PubMed Central

    Dreyfuss, Michael; Caudle, Kristina; Drysdale, Andrew T.; Johnston, Natalie E.; Cohen, Alexandra O.; Somerville, Leah H.; Galván, Adriana; Tottenham, Nim; Hare, Todd A.; Casey, BJ

    2014-01-01

    There is a significant inflection in risk taking and criminal behavior during adolescence, but the basis for this increase remains largely unknown. An increased sensitivity to rewards has been suggested to explain these behaviors. Yet juvenile offenses often occur in emotionally charged situations of negative valence. How behavior is altered by changes in negative emotional processes during adolescence has received less attention than changes in positive emotional processes. The current study uses a measure of impulsivity in combination with cues that signal threat or safety to assess developmental changes in emotional responses to threat cues. We show that adolescents, especially males, impulsively react to threat cues relative to neutral ones, more than adults or children, even when instructed not to respond. This adolescent specific behavioral pattern is paralleled by enhanced activity in limbic cortical regions implicated in detection and assignment of emotional value to inputs and in the subsequent regulation of responses to them when successfully suppressing impulsive responses to threat cues. In contrast, prefrontal control regions implicated in detecting and resolving competing responses show an adolescent emergent pattern (i.e., greater activity in adolescents and adults relative to children) during successful suppression of a response regardless of emotion. Our findings suggest that adolescence is a period of heightened sensitivity to social and emotional cues that results in diminished regulation of behavior in their presence. PMID:24821576

  14. Threats to Networked RFID Systems

    NASA Astrophysics Data System (ADS)

    Mitrokotsa, Aikaterini; Beye, Michael; Peris-Lopez, Pedro

    RFID technology is an area currently undergoing active development. An issue, which has received a lot of attention, is the security risks that arise due to the inherent vulnerabilities of RFID technology. Most of this attention, however, has focused on related privacy issues. The goal of this chapter is to present a more global overview of RFID threats. This can not only help experts perform risk analyses of RFID systems but also increase awareness and understanding of RFID security issues for non-experts. We use clearly defined and widely accepted concepts from both the RFID area and classical risk analysis to structure this overview.

  15. New threats to academic freedom.

    PubMed

    Minerva, Francesca

    2014-05-01

    Using a specific case as an example, the article argues that the Internet allows dissemination of academic ideas to the general public in ways that can sometimes pose a threat to academic freedom. Since academic freedom is a fundamental element of academia and since it benefits society at large, it is important to safeguard it. Among measures that can be taken in order to achieve this goal, the publication of anonymous research seems to be a good option. © 2013 John Wiley & Sons Ltd.

  16. [Modern threat of Ebola virus].

    PubMed

    Płusa, Tadeusz

    2014-11-01

    Since the detection of Ebola virus in 1976. recorded 13 major epidemics in Africa. The current threat in Guinea, Liberia and Sierra Leone absorbs another victims and threatened pandemic. Picture of the disease is initially very non-characteristic (influenza-like symptoms) and quickly leads to dehydration, shock and disseminated intravascular coagulation syndrome, which is responsible for high mortality. Lack of effective antibiotic therapy and vaccine hampers the existing situation. For this reason, there is an absolute necessity to introduce regimes sanitation, quarantine at the suspects and maintain the highest safety measures for emergency responders. Developed procedures require absolute compliance.

  17. RESPONSE PROTOCOL TOOLBOX: PLANNING FOR AND RESPONDING TO DRINKING WATER CONTAMINATION THREATS AND INCIDENTS. MODULE 4: ANALYTICAL GUIDE. INTERIM FINAL - DECEMBER 2003

    EPA Science Inventory

    The interim final Response Protocol Toolbox: Planning for and Responding to Contamination Threats to Drinking Water Systems is designed to help the water sector effectively and appropriately respond to intentional contamination threats and incidents. It was produced by EPA, buil...

  18. RESPONSE PROTOCOL TOOLBOX: PLANNING FOR AND RESPONDING TO DRINKING WATER CONTAMINATION THREATS AND INCIDENTS, MODULE 3: SITE CHARACTERIZATION AND SAMPLING GUIDE. INTERIM FINAL - DECEMBER 2003

    EPA Science Inventory

    The interim final Response Protocol Toolbox: Planning for and Responding to Contamination Threats to Drinking Water Systems is designed to help the water sector effectively and appropriately respond to intentional contamination threats and incidents. It was produced by EPA, buil...

  19. RESPONSE PROTOCOL TOOLBOX: PLANNING FOR AND RESPONDING TO DRINKING WATER CONTAMINATION THREATS AND INCIDENTS. MODULE 4: ANALYTICAL GUIDE. INTERIM FINAL - DECEMBER 2003

    EPA Science Inventory

    The interim final Response Protocol Toolbox: Planning for and Responding to Contamination Threats to Drinking Water Systems is designed to help the water sector effectively and appropriately respond to intentional contamination threats and incidents. It was produced by EPA, buil...

  20. RESPONSE PROTOCOL TOOLBOX: PLANNING FOR AND RESPONDING TO DRINKING WATER CONTAMINATION THREATS AND INCIDENTS. MODULE 1: WATER UTILITIES PLANNING GUIDE - INTERIM FINAL - DECEMBER 2003

    EPA Science Inventory

    The interim final Response Protocol Toolbox: Planning for and Responding to Contamination Threats to Drinking Water Systems is designed to help the water sector effectively and appropriately respond to intentional contamination threats and incidents. It was produced by EPA, buil...

  1. RESPONSE PROTOCOL TOOLBOX: PLANNING FOR AND RESPONDING TO DRINKING WATER CONTAMINATION THREATS AND INCIDENTS. OVERVIEW AND APPLICATION. INTERIM FINAL - DECEMBER 2003

    EPA Science Inventory

    The interim final Response Protocol Toolbox: Planning for and Responding to Contamination Threats to Drinking Water Systems is designed to help the water sector effectively and appropriately respond to intentional contamination threats and incidents. It was produced by EPA, buil...

  2. RESPONSE PROTOCOL TOOLBOX: PLANNING FOR AND RESPONDING TO DRINKING WATER CONTAMINATION THREATS AND INCIDENTS, MODULE 3: SITE CHARACTERIZATION AND SAMPLING GUIDE. INTERIM FINAL - DECEMBER 2003

    EPA Science Inventory

    The interim final Response Protocol Toolbox: Planning for and Responding to Contamination Threats to Drinking Water Systems is designed to help the water sector effectively and appropriately respond to intentional contamination threats and incidents. It was produced by EPA, buil...

  3. RESPONSE PROTOCOL TOOLBOX: PLANNING FOR AND RESPONDING TO DRINKING WATER CONTAMINATION THREATS AND INCIDENTS. OVERVIEW AND APPLICATION. INTERIM FINAL - DECEMBER 2003

    EPA Science Inventory

    The interim final Response Protocol Toolbox: Planning for and Responding to Contamination Threats to Drinking Water Systems is designed to help the water sector effectively and appropriately respond to intentional contamination threats and incidents. It was produced by EPA, buil...

  4. RESPONSE PROTOCOL TOOLBOX: PLANNING FOR AND RESPONDING TO DRINKING WATER CONTAMINATION THREATS AND INCIDENTS. MODULE 1: WATER UTILITIES PLANNING GUIDE - INTERIM FINAL - DECEMBER 2003

    EPA Science Inventory

    The interim final Response Protocol Toolbox: Planning for and Responding to Contamination Threats to Drinking Water Systems is designed to help the water sector effectively and appropriately respond to intentional contamination threats and incidents. It was produced by EPA, buil...

  5. Threat detection system for intersection collision avoidance

    NASA Astrophysics Data System (ADS)

    Jocoy, Edward H.; Pierowicz, John A.

    1998-01-01

    Calspan SRL Corporation is currently developing an on- vehicle threat detection system for intersection collision avoidance (ICA) as part of its ICA program with the National Highway Transportation Safety Administration. Crash scenarios were previously defined and an on-board radar sensor was designed. This paper describes recent efforts that include the development of a simulation of a multitarget tracker and collision avoidance algorithm used to predict system performance in a variety of target configurations in the various ICA crash scenarios. In addition, a current headway radar was mounted on the Calspan Instrumented Vehicle and in-traffic data were recorded for two limited crash scenarios. Warning functions were developed through the simulation and applied to the recorded data.

  6. Challenges From and Beyond Symptomatology: Stereotype Threat in Young Adults With ADHD.

    PubMed

    Foy, Steven L

    2015-06-29

    Stereotype threat-faced when one confronts a personally relevant stereotype in a domain-relevant context-can significantly jeopardize individual performance in test-taking situations. Research has overlooked the potential for mental health labels to serve as bases for stereotype threat in such situations. This study examines whether ADHD, a disorder frequently serving as a basis for standardized testing accommodation, may trigger stereotype threat in testing situations. Drawing from a sample of 114 participants (53 reporting a history of ADHD and 61 not reporting a history of ADHD), this study considers whether stereotype threat invoked on the basis of ADHD hinders performance on Graduate Record Examination (GRE) questions beyond the impact of symptomatology. Participants reporting ADHD achieved significantly lower scores on verbal and quantitative GRE questions than participants without ADHD. Participants between the ages of 18 and 24 reporting ADHD who were explicitly exposed to stereotype threat achieved significantly lower scores on quantitative GRE questions than their ADHD-reporting peers who were not explicitly exposed to stereotype threat. Domain-relevant mental health labels may trigger stereotype threat in test-taking situations. © 2015 SAGE Publications.

  7. Transdiagnostic brain responses to disorder-related threat across four psychiatric disorders.

    PubMed

    Feldker, K; Heitmann, C Y; Neumeister, P; Tupak, S V; Schrammen, E; Moeck, R; Zwitserlood, P; Bruchmann, M; Straube, T

    2017-03-01

    There is an ongoing debate whether transdiagnostic neural mechanisms are shared by different anxiety-related disorders or whether different disorders show distinct neural correlates. To investigate this issue, studies controlling for design and stimuli across multiple anxiety-related disorders are needed. The present functional magnetic resonance imaging study investigated neural correlates of visual disorder-related threat processing across unmedicated patients suffering from panic disorder (n = 20), social anxiety disorder (n = 20), dental phobia (n = 16) and post-traumatic stress disorder (n = 11) relative to healthy controls (HC; n = 67). Each patient group and the corresponding HC group saw a tailor-made picture set with 50 disorder-related and 50 neutral scenes. Across all patients, increased activation to disorder-related v. neutral scenes was found in subregions of the bilateral amygdala. In addition, activation of the lateral amygdala to disorder-related v. neutral scenes correlated positively with subjective anxiety ratings of scenes across patients. Furthermore, whole-brain analysis revealed increased responses to disorder-related threat across the four disorders in middle, medial and superior frontal regions, (para-)limbic regions, such as the insula and thalamus, as well as in the brainstem and occipital lobe. We found no disorder-specific brain responses. The results suggest that pathologically heightened lateral amygdala activation is linked to experienced anxiety across anxiety disorders and trauma- and stressor-related disorders. Furthermore, the transdiagnostically shared activation network points to a common neural basis of abnormal responses to disorder-related threat stimuli across the four investigated disorders.

  8. A Description of a Design Method of a Claw Teeth Motor on the Basis of Three-Dimensional Reluctance Network Analysis

    NASA Astrophysics Data System (ADS)

    Mizuguchi, Takahiro; Nakamura, Kenji; Koyama, Takayuki; Ichinokura, Osamu

    Soft magnetic composites (SMCs) have the following advantages: three-dimensional magnetic isotropy, high resistivity, and recyclability. By using SMC, therefore, a new concept motor with a three-dimensional structure can be developed. Its power-to-space ratio and efficiency can be improved since the space factor of winding and the space utilization factor of the motor is increased. This paper describes a design method of a claw teeth motor made of SMC by reluctance network analysis (RNA)-based experimental design. First, a three-dimensional RNA model of the claw teeth motor is presented. Next, the RNA-based experimental design of the claw teeth motor is presented. As a result, the average torque is improved by approximately 50%. In addition, the calculation time required for the design is significantly reduced by the proposed design method.

  9. Human collective reactions to threat.

    PubMed

    Dezecache, Guillaume

    2015-01-01

    A common assumption regarding mass emergency situations is that individuals in such contexts behave in a way that maximizes their likelihood to escape, at the expense, or with little concern for, the welfare and survival of their neighbors. Doing so, they might even compromise the effectiveness of group evacuation. This conception follows the views of early works on crowd psychology, a tradition born with Gustave Le Bon's The Crowd: a study of the Popular Mind, first published in 1895, and which has had a tremendous impact on scientific representations of people's behavior in mass emergency contexts. Indeed, this work has greatly contributed to the idea that, in such situations, people revert to a primitive, impulsive, irrational, and antisocial nature, causing the breakdown of social order. However, more empirically oriented studies have consistently reported little collective panic, as well as a great deal of solidarity and pro-social behavior during mass emergency situations. Because of institutional barriers, such views have remained largely unknown to cognitive psychologists. Yet these are important results in that they show that human individual and collective reactions to threat are primarily affiliative. Indeed, far from leading to the breakdown of the social fabrics, the presence of a common threat can strengthen social bonds. © 2015 John Wiley & Sons, Ltd.

  10. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    PubMed

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  11. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    PubMed Central

    Zhu, Yong; Zhao, Yufang; Ybarra, Oscar; Stephan, Walter G.; Yang, Qing

    2015-01-01

    Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes–Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants’ memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed. PMID:26635669

  12. Countering the Nuclear Terrorist Threat

    SciTech Connect

    Vantine, H C

    2002-10-04

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  13. Effect of evaluation threat on procrastination behavior.

    PubMed

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  14. Insider Threat Mitigation Workshop Instructional Materials

    SciTech Connect

    Gibbs, Philip; Larsen, Robert; O'Brien, Mike; Rodriquez, Jose

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  15. Security Threats in the 21st Century

    DTIC Science & Technology

    2006-11-01

    Power Conflict • Rise of China • Rise of India • Return of Russia • EU-Europe and NATO • Japan’s dilemma • Changing alliances? Threat 2 Climate Change...tomorrow. Anon. Security Threats 1. Return of great power conflict 2. Climate change 3. Uneven development 4. Overpopulation , migration, pandemics...Threat 4 Overpopulation , Migration, Pandemics • Climate change means overpopulation • Mass migrations are unstoppable • Migrations mean conflict and

  16. Sensor-guided threat countermeasure system

    DOEpatents

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  17. Inferring the nature of anthropogenic threats from long-term abundance records.

    PubMed

    Shoemaker, Kevin T; Akçakaya, H Resit

    2015-02-01

    Diagnosing the processes that threaten species persistence is critical for recovery planning and risk forecasting. Dominant threats are typically inferred by experts on the basis of a patchwork of informal methods. Transparent, quantitative diagnostic tools would contribute much-needed consistency, objectivity, and rigor to the process of diagnosing anthropogenic threats. Long-term census records, available for an increasingly large and diverse set of taxa, may exhibit characteristic signatures of specific threatening processes and thereby provide information for threat diagnosis. We developed a flexible Bayesian framework for diagnosing threats on the basis of long-term census records and diverse ancillary sources of information. We tested this framework with simulated data from artificial populations subjected to varying degrees of exploitation and habitat loss and several real-world abundance time series for which threatening processes are relatively well understood: bluefin tuna (Thunnus maccoyii) and Atlantic cod (Gadus morhua) (exploitation) and Red Grouse (Lagopus lagopus scotica) and Eurasian Skylark (Alauda arvensis) (habitat loss). Our method correctly identified the process driving population decline for over 90% of time series simulated under moderate to severe threat scenarios. Successful identification of threats approached 100% for severe exploitation and habitat loss scenarios. Our method identified threats less successfully when threatening processes were weak and when populations were simultaneously affected by multiple threats. Our method selected the presumed true threat model for all real-world case studies, although results were somewhat ambiguous in the case of the Eurasian Skylark. In the latter case, incorporation of an ancillary source of information (records of land-use change) increased the weight assigned to the presumed true model from 70% to 92%, illustrating the value of the proposed framework in bringing diverse sources of

  18. World's soils are under threat

    NASA Astrophysics Data System (ADS)

    Montanarella, Luca; Pennock, Daniel Jon; McKenzie, Neil; Badraoui, Mohamed; Chude, Victor; Baptista, Isaurinda; Mamo, Tekalign; Yemefack, Martin; Singh Aulakh, Mikha; Yagi, Kazuyuki; Hong, Suk Young; Vijarnsorn, Pisoot; Zhang, Gan-Lin; Arrouays, Dominique; Black, Helaina; Krasilnikov, Pavel; Sobocká, Jaroslava; Alegre, Julio; Henriquez, Carlos Roberto; de Lourdes Mendonça-Santos, Maria; Taboada, Miguel; Espinosa-Victoria, David; AlShankiti, Abdullah; Kazem AlaviPanah, Sayed; El Mustafa Elsheikh, Elsiddig Ahmed; Hempel, Jon; Camps Arbestain, Marta; Nachtergaele, Freddy; Vargas, Ronald

    2016-02-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources Report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecurity among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the State of the World's Soil Resources Report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  19. World's soils are under threat

    NASA Astrophysics Data System (ADS)

    Montanarella, L.; Pennock, D. J.; McKenzie, N. J.; Badraoui, M.; Chude, V.; Baptista, I.; Mamo, T.; Yemefack, M.; Singh Aulakh, M.; Yagi, K.; Hong, S. Young; Vijarnsorn, P.; Zhang, G.-L.; Arrouays, D.; Black, H.; Krasilnikov, P.; Sobocká, J.; Alegre, J.; Henriquez, C. R.; Mendonça-Santos, M. L.; Taboada, M.; Espinosa-Victoria, D.; AlShankiti, A.; AlaviPanah, S. K.; Elsheikh, E. A. E.; Hempel, J.; Camps Arbestain, M.; Nachtergaele, F.; Vargas, R.

    2015-12-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecure among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the SWSR report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  20. Parasite threat to panda conservation.

    PubMed

    Zhang, Jin-Shuo; Daszak, Peter; Huang, Hua-Li; Yang, Guang-You; Kilpatrick, A Marm; Zhang, Shuyi

    2008-03-01

    The giant panda is a global symbol of wildlife conservation that is threatened by historic and current habitat loss. Despite a great deal of research on the physiology, reproductive biology, and diet of pandas in the wild and in captivity, there is little information on wild panda mortality. Here we integrate previously unavailable data on the mortality of wild pandas. We report on three recent phases of panda mortality: deaths due to bamboo flowering in the 1970s and 1980s, surprisingly extensive poaching in the 1980s and 1990s, and a parasitic infection over the past few years. Our analyses suggest that the current most significant threat to wild panda survival is disease due to extraintestinal migration (visceral larval migrans) by an ascarid nematode. We demonstrate that the probability of death of wild pandas being caused by this disease increased significantly between 1971 and 2005 and discuss the possible factors leading to the emergence of this disease.

  1. The possibility of fuel cycle design for ABC/ATW complex with molten fuel on LiF-BeF{sub 2} basis

    SciTech Connect

    Naumov, V.S.; Bychkov, A.V.

    1995-10-01

    The experience gained in the field of the development of molten salt reactors (MSR) can be made a basis of chemical processing of the ABC/ATW liquid fuel. The following combination of two processing principles are proposed for the ABC/ATW fuel (LiF-BeF{sub 2}-PuF{sub 3,(4)} - MAF{sub n}): - continious removal of radioactive gases, volatile impurities and {open_quotes}noble fission products{close_quotes}; - portion-by-portion electrochemical processing with removal of rare earth elements and some other fission products at an autonomous plant. After processing the fuel salt is brought back to the blanket of the ABC/ATW complex. The analysis of information previously published in different countries allows for a safe assumption that the ABC/ATW fuel cycle with liquid fuel salt is feasible and can be demonstrated experimentally.

  2. Autonomous Realtime Threat-Hunting Robot (ARTHR

    SciTech Connect

    INL

    2008-05-29

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  3. DOE site-specific threat assessment

    SciTech Connect

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-07-12

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs.

  4. Autonomous Realtime Threat-Hunting Robot (ARTHR

    ScienceCinema

    INL

    2016-07-12

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  5. ONR Workshop on Nonlinear Sea Loads and Ship Response: A Basis for Ship Structural Design Held in Ann Arbor, Michigan on July 7-8, 1994

    DTIC Science & Technology

    1994-07-08

    Avail arý,dlIor8:00 - 8:30 Coffee and doughnuts, registration Dist Special Workshop Introduction 8:30 - 8:45 Welcome Prof. Michael G. Parsons, Naval...Bureau of Shipping Friday, July 8 8:00 - 8:30 Coffee and doughnuts Simulation-Based Design Environment 8:30 - 8:50 Use of Reliability in Structural Design...virtual environment with user, data glove and I physical elements I 73 VW Super Beetle -H 10364 Vertices 10514 Polygons 73 VW Super Beetle -L 1520 Vertices

  6. Computer-Based Training for the U.S. Coast Guard Standard Terminal Microcomputer: A Basis for Implementation Utilizing the Elaboration Theory of Instructional Design.

    DTIC Science & Technology

    1985-03-01

    73 BIBLIOGRAPHY----------------------------------------------- 76 INITIAL DISTRIBUTION LIST...provide " sonnet " as an example concept. A procedure is "a set of actions that are intended to achieve an end...a skill, technique, or method." A...of Instructional Design, 2nd edition, New York: Holt, Rinehart and W nston, 1979. 73 12. Convergent Technologies, Inc., Technical Documentation

  7. Threat Theory: A Model for Forecasting the Threat Environment of the Future

    DTIC Science & Technology

    1993-05-14

    AD-A2 7 4 021 / Threat Theory: A Model for Forecasting the Threat Environment of the Future A Monograph by Lieutenant Colonel Larry D. Bruns Military...5. FUNDING NUMBERS THREAT THEORY. A MODEL FOR FORECASTING THREAT ENVIRONMENT OF THE FUTURE 6. AUTHOR(S) LTC LARRY D. BRUNS, USA 7. PERFORMING...PRICE CODE FORCE DEVELOPMENT 17. SECURITY CLASSIFICATION II8. SECURITY CLASSIFICATION 19. SECURITY CL.ASSIFICATION 20. LIMITATION Of ABSTRACT OF REPORT

  8. Technical Basis for the Determination that Current Characterization Data and Processes are Sufficient to Ensure Safe Storage and to Design Waste Disposal

    SciTech Connect

    SIMPSON, B.C.

    1999-08-12

    This document presents the technical basis for closure of Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 93-5 Implementation Plan milestone 5.6.3.13, ''Core sample all tanks by 2002'' (DOE-RL 1996). The milestone was based on the need for characterization data to ensure safe storage of the waste, to operate the tanks safely, and to plan and implement retrieval and processing of the waste. Sufficient tank characterization data have been obtained to ensure that existing controls are adequate for safe storage of the waste in the 177 waste tanks at the Hanford Site. In addition, a process has been developed, executed, and institutionalized to systemically identify information needs, to integrate and prioritize the needs, and to reliably obtain and analyze the associated samples. This document provides a technical case that the remaining 45 incompletely sampled tanks no longer require sampling to support the intent of the Implementation Plan milestone. Sufficient data have been obtained to close the Unreviewed Safety Questions (USQs), and to ensure that existing hazard controls are adequate and appropriately applied. However, in the future, additional characterization of tanks at the site will be required to support identified information needs. Closure of this milestone allows sampling and analytical data to be obtained in a manner that is consistent with the integrated priority process.

  9. Integrated optic chip for laser threat identification

    NASA Astrophysics Data System (ADS)

    McAulay, Alastair D.

    2010-04-01

    In this conference last year, we proposed free-space gratings, Fizeau interferometers and wavefront estimation for detecting the different lasers deployed in the battlefield for range finding, target designation, communications, dazzle, location of targets, munitions guidance, and destruction. Since last year, advanced laser weapons of the electron cyclotron type, are in development, such as the free-electron laser, that are tunable and can, unlike conventional bound-electron state lasers, be used at any wavelength from microwaves to soft X-rays. We list the characteristics of the nine dominant laser weapons because we assume that the free-electron lasers will initially use one of the current threat wavelengths because of availability of components and instrumentation. In this paper we replace the free-space grating with a higher performing array waveguide grating integrated optic chip, similar to that used in telecommunications, because integrated circuits are more robust and less expensive. It consists of a star coupler that fans out amongst waveguides of different length followed by a star coupler that focuses different wavelengths to different outputs in order to separate them. Design equations are derived to cover a range of frequencies at specific frequency spacing relevant to this application.

  10. Shades of Threat: Racial Identity as a Moderator of Stereotype Threat

    ERIC Educational Resources Information Center

    Davis, Claytie, III; Aronson, Joshua; Salinas, Moises

    2006-01-01

    This study investigated Black racial identity attitudes as a moderator of intellectual performance in potentially stereotype threatening situations. Ninety-eight African American students were randomly assigned to one of three stereotype threatening conditions: low threat, medium threat, or high threat. Analyses confirmed a stereotype threat…

  11. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    USGS Publications Warehouse

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    The Florida manatee (Trichechus manatus latirostris) is an endangered marine mammal endemic to the southeastern United States. The primary threats to manatee populations are collisions with watercraft and the potential loss of warm-water refuges. For the purposes of listing, recovery, and regulation under the Endangered Species Act (ESA), an understanding of the relative effects of the principal threats is needed. This work is a quantitative approach to threats analysis, grounded in the assumption that an appropriate measure of status under the ESA is based on the risk of extinction, as quantified by the probability of quasi-extinction. This is related to the qualitative threats analyses that are more common under the ESA, but provides an additional level of rigor, objectivity, and integration. In this approach, our philosophy is that analysis of the five threat factors described in Section 4(a)(1) of the ESA can be undertaken within an integrated quantitative framework. The basis of this threats analysis is a comparative population viability analysis. This involves forecasting the Florida manatee population under different scenarios regarding the presence of threats, while accounting for process variation (environmental, demographic, and catastrophic stochasticity) as well as parametric and structural uncertainty. We used the manatee core biological model (CBM) for this viability analysis, and considered the role of five threats: watercraft-related mortality, loss of warm-water habitat in winter, mortality in water-control structures, entanglement, and red tide. All scenarios were run with an underlying parallel structure that allowed a more powerful estimation of the effects of the various threats. The results reflect our understanding of manatee ecology (as captured in the structure of the CBM), our estimates of manatee demography (as described by the parameters in the model), and our characterization of the mechanisms by which the threats act on manatees. As an

  12. Human Threat Management Systems: Self-Protection and Disease Avoidance

    PubMed Central

    Neuberg, Steven L.; Kenrick, Douglas T.; Schaller, Mark

    2010-01-01

    Humans likely evolved precautionary systems designed to minimize the threats to reproductive fitness posed by highly interdependent ultrasociality. A review of research on the self-protection and disease avoidance systems reveals that each system is functionally distinct and domain-specific: Each is attuned to different cues; engages different emotions, inferences, and behavioral inclinations; and is rooted in somewhat different neurobiological substrates. These systems share important features, however. Each system is functionally coherent, in that perceptual, affective, cognitive, and behavioral processes work in concert to reduce fitness costs of potential threats. Each system is biased in a risk-averse manner, erring toward precautionary responses even when available cues only heuristically imply threat. And each system is functionally flexible, being highly sensitive to specific ecological and dispositional cues that signal greater vulnerability to the relevant threat. These features characterize a general template useful for understanding not only the self-protection and disease avoidance systems, but also a broader set of evolved, domain-specific precautionary systems. PMID:20833199

  13. Measuring attentional biases for threat in children and adults.

    PubMed

    LoBue, Vanessa

    2014-10-19

    Investigators have long been interested in the human propensity for the rapid detection of threatening stimuli. However, until recently, research in this domain has focused almost exclusively on adult participants, completely ignoring the topic of threat detection over the course of development. One of the biggest reasons for the lack of developmental work in this area is likely the absence of a reliable paradigm that can measure perceptual biases for threat in children. To address this issue, we recently designed a modified visual search paradigm similar to the standard adult paradigm that is appropriate for studying threat detection in preschool-aged participants. Here we describe this new procedure. In the general paradigm, we present participants with matrices of color photographs, and ask them to find and touch a target on the screen. Latency to touch the target is recorded. Using a touch-screen monitor makes the procedure simple and easy, allowing us to collect data in participants ranging from 3 years of age to adults. Thus far, the paradigm has consistently shown that both adults and children detect threatening stimuli (e.g., snakes, spiders, angry/fearful faces) more quickly than neutral stimuli (e.g., flowers, mushrooms, happy/neutral faces). Altogether, this procedure provides an important new tool for researchers interested in studying the development of attentional biases for threat.

  14. Human threat management systems: self-protection and disease avoidance.

    PubMed

    Neuberg, Steven L; Kenrick, Douglas T; Schaller, Mark

    2011-03-01

    Humans likely evolved precautionary systems designed to minimize the threats to reproductive fitness posed by highly interdependent ultrasociality. A review of research on the self-protection and disease avoidance systems reveals that each system is functionally distinct and domain-specific: each is attuned to different cues; engages different emotions, inferences, and behavioral inclinations; and is rooted in somewhat different neurobiological substrates. These systems share important features, however. Each system is functionally coherent, in that perceptual, affective, cognitive, and behavioral processes work in concert to reduce fitness costs of potential threats. Each system is biased in a risk-averse manner, erring toward precautionary responses even when available cues only heuristically imply threat. And each system is functionally flexible, being highly sensitive to specific ecological and dispositional cues that signal greater vulnerability to the relevant threat. These features characterize a general template useful for understanding not only the self-protection and disease avoidance systems, but also a broader set of evolved, domain-specific precautionary systems.

  15. An Integrated Process Model of Stereotype Threat Effects on Performance

    PubMed Central

    Johns, Michael; Forbes, Chad

    2008-01-01

    Research showing that activation of negative stereotypes can impair the performance of stigmatized individuals on a wide variety of tasks has proliferated. However, a complete understanding of the processes underlying these stereotype threat effects on behavior is still lacking. The authors examine stereotype threat in the context of research on stress arousal, vigilance, working memory, and self-regulation to develop a process model of how negative stereotypes impair performance on cognitive and social tasks that require controlled processing, as well as sensorimotor tasks that require automatic processing. The authors argue that stereotype threat disrupts performance via 3 distinct, yet interrelated, mechanisms: (a) a physiological stress response that directly impairs prefrontal processing, (b) a tendency to actively monitor performance, and (c) efforts to suppress negative thoughts and emotions in the service of self-regulation. These mechanisms combine to consume executive resources needed to perform well on cognitive and social tasks. The active monitoring mechanism disrupts performance on sensorimotor tasks directly. Empirical evidence for these assertions is reviewed, and implications for interventions designed to alleviate stereotype threat are discussed. PMID:18426293

  16. The artificial heart's threat to others.

    PubMed

    Jonsen, A R

    1986-02-01

    A member of the two federal advisory panels on artificial hearts reflects that the nuclear-powered artificial heart, had it been developed, would have posed a physical threat to others. Today's artificial heart poses a different threat. Because of the high costs, many people may be deprived of access to other forms of medical care and other social goods.

  17. Perception of the Threat of Terrorism.

    PubMed

    Cohen-Louck, Keren

    2016-04-28

    In light of the tense and ongoing security situation in Israel, one important issue that needs to be analyzed and understood is the perception of terrorism threats. Most studies focused mainly on the psychological implications of terrorist acts; this study examines the complexity of the manner in which the individual perceives the threat of terrorism. In all, 40 Israeli adults (22 women and 18 men) were interviewed using semistructured in-depth interviews. Qualitative analysis indicates that the components of the perception of terrorism that construct the evaluation and subjective perception of the participants are as follows: (a) perception of control, which is a feeling of loss of control and helplessness due to uncertainty, inability to predict threats, and the vagueness of the threat; (b) perception of vulnerability to the threat, such as a feeling of vulnerability to and potential victimization by terrorism; and (c) perception of fear of terrorism that includes responses of fear, anxiety, feeling of danger, and emotional distress. In addition, gender differences were found in the analysis. The findings of this study help gain a better understanding as to how people perceive the threat of terrorism. The findings also enable an understanding of the complexity of living under ongoing terrorism threats and may assist in understanding how citizens cope with and adjust to this threat.

  18. The Nature of the Bioterrorism Threat

    SciTech Connect

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  19. High Power Electromagnetic (HPEM) Threat Analysis

    DTIC Science & Technology

    2008-04-01

    EMERGING THREATS ...... 13 HEMP coupling characteristics ............................................................................... 13 High power...microwave (HPEM) coupling characteristics ..................................... 16 High power microwave: local protective measures...ncy (W1 Figure 22. Various bands summarizing EM threats. HEMP coupling characteristics In the early 1960’s, researchers proposed a theory that a high

  20. Development of the Academic Stereotype Threat Inventory

    ERIC Educational Resources Information Center

    Pseekos, A. Chantelle; Dahlen, Eric R.; Levy, Jacob J.

    2008-01-01

    The authors describe the development and preliminary validation of the Academic Stereotype Threat Inventory, a self-report measurement of math-related stereotype threat among women. A preliminary version of the instrument was administered to 308 undergraduate women. Principal component analysis yielded a 3-factor solution. Convergent and…

  1. Sociocultural perspectives on threats, risks, and health

    Treesearch

    Patricia L. Winter; Jonathan W. Long; Frank K. Lake

    2014-01-01

    Sociocultural perspectives on threats, risks, and health are explored in this chapter. The authors begin with a discussion of the linkages between well-being in the Sierra Nevada ecosystem and public health and well-being to set the context of socioecological resilience. This is followed by a summary of how trust and confidence influence the management of threats and...

  2. Eastern forest environmental threat assessment center

    Treesearch

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  3. Bombs and Bomb Threats in the School

    ERIC Educational Resources Information Center

    Starkey, David J.; Starkey, John D.

    1977-01-01

    Bombs and the threat of bombing can leave school personnel faced by an explosive hazard without knowledge of what to do. Therefore, a preplanned response is necessary. Discusses four major stages of dealing with bombs and bomb threats. (Author/RK)

  4. Bombs and Bomb Threats in the School

    ERIC Educational Resources Information Center

    Starkey, David J.; Starkey, John D.

    1977-01-01

    Bombs and the threat of bombing can leave school personnel faced by an explosive hazard without knowledge of what to do. Therefore, a preplanned response is necessary. Discusses four major stages of dealing with bombs and bomb threats. (Author/RK)

  5. Bomb Threats and Bomb Search Techniques.

    ERIC Educational Resources Information Center

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  6. 25 CFR 11.402 - Terroristic threats.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 1 2011-04-01 2011-04-01 false Terroristic threats. 11.402 Section 11.402 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER COURTS OF INDIAN OFFENSES AND LAW AND ORDER CODE Criminal Offenses § 11.402 Terroristic threats. A person is guilty of a misdemeanor if he or...

  7. 25 CFR 11.402 - Terroristic threats.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Terroristic threats. 11.402 Section 11.402 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER COURTS OF INDIAN OFFENSES AND LAW AND ORDER CODE Criminal Offenses § 11.402 Terroristic threats. A person is guilty of a misdemeanor if he or...

  8. The Smallpox Threat: The School Nurse's Role

    ERIC Educational Resources Information Center

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  9. Personality Correlates of Nuclear War Threat Perception.

    ERIC Educational Resources Information Center

    Mayton, Daniel M., II

    This study investigated the relationship between individual personality characteristics and the threat of nuclear war among 192 introductory psychology students at a small college in the Pacific Northwest. One measure of nuclear threat perception was spontaneous concern, which was assessed using five presentations each of the incomplete sentences,…

  10. Keeping Schools Safe through Threat Assessment

    ERIC Educational Resources Information Center

    Barton, Rhonda

    2008-01-01

    This article illustrates how effective a threat assessment program like the Mid-Valley Student Threat Assessment (STAT) program can be in dealing with violent and threatening students. STAT is a a regional system that draws together resources from schools, mental health agencies, law enforcement bureaus, and other youth-serving organizations in…

  11. The Smallpox Threat: The School Nurse's Role

    ERIC Educational Resources Information Center

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  12. Keeping Schools Safe through Threat Assessment

    ERIC Educational Resources Information Center

    Barton, Rhonda

    2008-01-01

    This article illustrates how effective a threat assessment program like the Mid-Valley Student Threat Assessment (STAT) program can be in dealing with violent and threatening students. STAT is a a regional system that draws together resources from schools, mental health agencies, law enforcement bureaus, and other youth-serving organizations in…

  13. How you perceive threat determines your behavior

    PubMed Central

    Fernandes, Orlando; Portugal, Liana C. L.; Alves, Rita C. S.; Campagnoli, Rafaela R.; Mocaiber, Izabela; David, Isabel P. A.; Erthal, Fátima C. S.; Volchan, Eliane; de Oliveira, Leticia; Pereira, Mirtes G.

    2013-01-01

    The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT) paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed toward the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during directed toward threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, directed away threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by threat stimuli directed toward the observer. In sum, our data support the concept that emotions are indeed action tendencies. PMID:24115925

  14. Molecular Mechanisms of Posttraumatic Stress Disorder (PTSD) as a Basis for Individualized and Personalized Therapy: Rationale, Design and Methods of the South Eastern Europe (SEE)-PTSD study.

    PubMed

    Kulenovic, Alma Dzubur; Agani, Ferid; Avdibegovic, Esmina; Jakovljevic, Miro; Babic, Dragan; Kucukalic, Abdulah; Kucukalic, Sabina; Dzananovic, Emina Sabic; Mehmedbasic, Alma Bravo; Uka, Aferdita Goci; Haxhibeqiri, Shpend; Haxhibeqiri, Valdete; Hoxha, Blerina; Sinanovic, Osman; Kravic, Nermina; Muminovic, Mirnesa; Aukst-Margetic, Branka; Jaksic, Nenad; Franc, Ana Cima; Rudan, Dusko; Pavlovic, Marko; Babic, Romana; Bojic, Elma Feric; Marjanovic, Damir; Bozina, Nada; Ziegler, Christiane; Wolf, Christiane; Warrings, Bodo; Domschke, Katharina; Deckert, Jürgen

    2016-06-01

    Posttraumatic Stress Disorder (PTSD) is a major health problem in South Eastern Europe (SEE). Available treatment options are not efficient enough and the course is often chronic. Little is known about molecular mediators and moderators of pathogenesis and therapy. Genetic and epigenetic variation may be one central molecular mechanism. We therefore established a consortium combining clinical expertise on PTSD from SEE countries Bosnia-Herzegovina (Sarajevo, Tuzla and Mostar), Kosovo (Prishtina) and Croatia (Zagreb) with genetic and epigenetic competence from Germany (Würzburg) in 2011 within the framework of the DAAD (Deutscher Akademischer Austauschdienst)-funded Stability Pact for South Eastern Europe. After obtaining ethical votes and performing rater trainings as well as training in DNA extraction from EDTA blood between 2011 and 2013, we recruited 747 individuals who had experienced war-related trauma in the SEE conflicts between 1991 and 1999. 236 participants had current PTSD, 161 lifetime PTSD and 350 did not have and never had PTSD. Demographic and clinical data are currently merged together with genetic and epigenetic data in a single database to allow for a comprehensive analysis of the role of genetic and epigenetic variation in the pathogenesis and therapy of PTSD. Analyses will be done to a great degree by PhD students from participating SEE centers who in addition to participation in the project had an opportunity to take part in spring and summer schools of the DFG (Deutsche Forschungsgemeinschaft) funded Research Training Group (RTG) 1253 and thus meet PhD students from Germany and other countries We are confident that our project will not only contribute to a better understanding of genetic and epigenetic mechanisms of PTSD as a basis for future individualized and personalized therapies, but also to the academic development of South Eastern Europe.

  15. Security threats categories in healthcare information systems.

    PubMed

    Samy, Ganthan Narayana; Ahmad, Rabiah; Ismail, Zuraini

    2010-09-01

    This article attempts to investigate the various types of threats that exist in healthcare information systems (HIS). A study has been carried out in one of the government-supported hospitals in Malaysia.The hospital has been equipped with a Total Hospital Information System (THIS). The data collected were from three different departments, namely the Information Technology Department (ITD), the Medical Record Department (MRD), and the X-Ray Department, using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The results show that the most critical threat for the THIS is power failure followed by acts of human error or failure and other technological factors. This research holds significant value in terms of providing a complete taxonomy of threat categories in HIS and also an important component in the risk analysis stage.

  16. Systematic description of direct push sensor systems: A conceptual framework for system decomposition as a basis for the optimal sensor system design

    NASA Astrophysics Data System (ADS)

    Bumberger, Jan; Paasche, Hendrik; Dietrich, Peter

    2015-11-01

    Systematic decomposition and evaluation of existing sensor systems as well as the optimal design of future generations of direct push probes are of high importance for optimized geophysical experiments since the employed equipment is a constrain on the data space. Direct push technologies became established methods in the field of geophysical, geotechnical, hydrogeological, and environmental sciences for the investigation of the near subsurface. By using direct push sensor systems it is possible to measure in-situ parameters with high vertical resolution. Such information is frequently used for quantitative geophysical model calibration of interpretation of geotechnical and hydrological subsurface conditions. Most of the available direct push sensor systems are largely based on empirical testing and consecutively evaluated under field conditions. Approaches suitable to identify specific characteristics and problems of direct push sensor systems have not been established, yet. We develop a general systematic approach for the classification, analysis, and optimization of direct push sensor systems. First, a classification is presented for different existing sensor systems. The following systematic description, which is based on the conceptual decomposition of an existing sensor system into subsystems, is a suitable way to analyze and explore the transfer behavior of the system components and therefore of the complete system. Also, this approach may serve as guideline for the synthesis and the design of new and optimized direct push sensor systems.

  17. Naval threat and countermeasures simulator

    NASA Astrophysics Data System (ADS)

    Vaitekunas, David A.; Alexan, Karim; Birk, A. M.; Morin, Josee

    1994-10-01

    A Canadian Naval threat/countermeasures simulator (NTCS) capable of modeling the engagement between a naval ship and an infrared (IR) guided anti-ship missile is presented. The NTCS program is built upon previously developed naval ship signature software entitled Ship Infrared Simulator (SHIPIR) which produces 3-D graphical imagery of a ship in its sea/sky background for a wide range of operational, atmospheric, observer, and spectral conditions. By adding models for an IR seeker head, missile flight dynamics and commonly deployed ship IR countermeasures, NTCS can effectively assess the IR susceptibility of naval platforms through calculation of target lock-on ranges and hit/miss distances. Current and future naval ships can be analyzed for IR suppression effectiveness in such areas as hot surface visibility, low emissivity paints, and engine exhaust signature suppression. The various deployable countermeasures (flares, smoke screens, washdown, and ship maneuvers) and missile/seeker heads modeled in NTCS permit the assessment of ship survivability and development of tactics and counter-measures necessary to provide adequate IR protection. A description of NTCS is provided with emphasis on the missile and countermeasure models and overall engagement simulation. Some sample simulations to date on the Canadian DDH-280 tribal class destroyer are presented.

  18. Stereotype threat prevents perceptual learning.

    PubMed

    Rydell, Robert J; Shiffrin, Richard M; Boucher, Kathryn L; Van Loo, Katie; Rydell, Michael T

    2010-08-10

    Stereotype threat (ST) refers to a situation in which a member of a group fears that her or his performance will validate an existing negative performance stereotype, causing a decrease in performance. For example, reminding women of the stereotype "women are bad at math" causes them to perform more poorly on math questions from the SAT and GRE. Performance deficits can be of several types and be produced by several mechanisms. We show that ST prevents perceptual learning, defined in our task as an increasing rate of search for a target Chinese character in a display of such characters. Displays contained two or four characters and half of these contained a target. Search rate increased across a session of training for a control group of women, but not women under ST. Speeding of search is typically explained in terms of learned "popout" (automatic attraction of attention to a target). Did women under ST learn popout but fail to express it? Following training, the women were shown two colored squares and asked to choose the one with the greater color saturation. Superimposed on the squares were task-irrelevant Chinese characters. For women not trained under ST, the presence of a trained target on one square slowed responding, indicating that training had caused the learning of an attention response to targets. Women trained under ST showed no slowing, indicating that they had not learned such an attention response.

  19. Bioterriorism: from threat to reality.

    PubMed

    Atlas, Ronald M

    2002-01-01

    The fears and predictions of attacks with biological weapons, which were increasing at the close of the twentieth century, were transformed into reality not long after September 11, 2001, when several anthrax-laden letters were sent through the U.S. postal system. The attack challenged our medical preparedness and scientific understanding of the epidemiology of biothreat agents. It is fortunate that this was not a massive aerosol release that could have exposed hundreds of thousands. Rapid diagnoses and medical treatments limited casualties and increased survival rates, but tragically some individuals died of inhalational anthrax. Even as physicians tested new treatment regimes and scientists employed new ways of detecting anthrax and decontaminating the mail, new predictions were made for potentially even more devastating attacks with anthrax, smallpox, plague, tularemia, botulism, or hemorrhagic fever viruses. Fear gripped the nation. Law enforcement sought to find the villain(s) who sent the anthrax letters and to deter future bioterrorist attacks. The biomedical community began to seek new ways of protecting against such future threats of bioterrorism.

  20. Identifying future zoonotic disease threats

    PubMed Central

    Cooper, Natalie; Nunn, Charles L.

    2013-01-01

    Background and objectives: Emerging infectious diseases often originate in wildlife, making it important to identify infectious agents in wild populations. It is widely acknowledged that wild animals are incompletely sampled for infectious agents, especially in developing countries, but it is unclear how much more sampling is needed, and where that effort should focus in terms of host species and geographic locations. Here, we identify these gaps in primate parasites, many of which have already emerged as threats to human health. Methodology: We obtained primate host–parasite records and other variables from existing databases. We then investigated sampling effort within primates relative to their geographic range size, and within countries relative to their primate species richness. We used generalized linear models, controlling for phylogenetic or spatial autocorrelation, to model variation in sampling effort across primates and countries. Finally, we used species richness estimators to extrapolate parasite species richness. Results: We found uneven sampling effort within all primate groups and continents. Sampling effort among primates was influenced by their geographic range size and substrate use, with terrestrial species receiving more sampling. Our parasite species richness estimates suggested that, among the best sampled primates and countries, almost half of primate parasites remain to be sampled; for most primate hosts, the situation is much worse. Conclusions and implications: Sampling effort for primate parasites is uneven and low. The sobering message is that we know little about even the best studied primates, and even less regarding the spatial and temporal distribution of parasitism within species. PMID:24481184

  1. Nuclear threats from small states

    SciTech Connect

    Kahan, J.H.

    1994-06-13

    What are the policy implications regarding proliferation and counter proliferation of nuclear weapons among Third World states. How does deterrence operate outside the parameters of superpower confrontation as defined by the cold war elaborate system of constraints enforced by concepts like mutual assured destruction, and counter-value and counter-force targeting. How can US policymakers devise contingencies for dealing with nuclear threats posed by countries like North Korea, Libya, Iraq, Iran, and Syria. These are some of the unsettling but nevertheless important questions addressed by the author in this monograph. In his analysis, Mr. Jerome Kahan examines the likelihood that one or more of these countries will use nuclear weapons before the year 2000. He also offers a framework that policymakers and planners might use in assessing US interests in preempting the use of nuclear weapons or in retaliating for their use. Ironically, with the end of the cold war, it is imperative that defense strategists, policymakers, and military professionals think about the `unthinkable`. In the interest of fostering debate on this important subject, the Strategic Studies Institute commends this insightful monograph.

  2. Threats to sandy beach ecosystems: A review

    NASA Astrophysics Data System (ADS)

    Defeo, Omar; McLachlan, Anton; Schoeman, David S.; Schlacher, Thomas A.; Dugan, Jenifer; Jones, Alan; Lastra, Mariano; Scapini, Felicita

    2009-01-01

    We provide a brief synopsis of the unique physical and ecological attributes of sandy beach ecosystems and review the main anthropogenic pressures acting on the world's single largest type of open shoreline. Threats to beaches arise from a range of stressors which span a spectrum of impact scales from localised effects (e.g. trampling) to a truly global reach (e.g. sea-level rise). These pressures act at multiple temporal and spatial scales, translating into ecological impacts that are manifested across several dimensions in time and space so that today almost every beach on every coastline is threatened by human activities. Press disturbances (whatever the impact source involved) are becoming increasingly common, operating on time scales of years to decades. However, long-term data sets that describe either the natural dynamics of beach systems or the human impacts on beaches are scarce and fragmentary. A top priority is to implement long-term field experiments and monitoring programmes that quantify the dynamics of key ecological attributes on sandy beaches. Because of the inertia associated with global climate change and human population growth, no realistic management scenario will alleviate these threats in the short term. The immediate priority is to avoid further development of coastal areas likely to be directly impacted by retreating shorelines. There is also scope for improvement in experimental design to better distinguish natural variability from anthropogenic impacts. Sea-level rise and other effects of global warming are expected to intensify other anthropogenic pressures, and could cause unprecedented ecological impacts. The definition of the relevant scales of analysis, which will vary according to the magnitude of the impact and the organisational level under analysis, and the recognition of a physical-biological coupling at different scales, should be included in approaches to quantify impacts. Zoning strategies and marine reserves, which have not

  3. Building relationships with foreign governments in support of threat reduction

    SciTech Connect

    Cajigal, George L.

    2007-07-01

    The effectiveness of any multinational effort in support of threat reduction depends on the relationship developed between the nation receiving the assistance and the donor nations. The effectiveness of this relationship must be based on a solid legal and cooperative framework that establishes the ground rules for the interaction between all parties involved. The author proposes in this paper to outline major considerations by the donor nation and the nation receiving the assistance as they establish an effective approach to threat-reduction efforts. The legal framework needs to be founded on a well-developed, country-to-country agreement that establishes general ground rules and officially recognizes the collaborative effort in an internationally binding document between signatories. This document normally addresses such issues as liability, tax exemptions, import duties, contracts, applicable environmental regulations, etc. Also, of utmost importance is the establishment of a collaborative framework. The basis for such a collaborative framework must be the buy-in into a common objective, the willingness to share concerns and work toward resolutions, and continuous communications. Only when a proper legal framework and a collaborative approach are established can effective relationships be built to enhance threat-reduction efforts. (author)

  4. System for ranking relative threats of U.S. volcanoes

    USGS Publications Warehouse

    Ewert, J.W.

    2007-01-01

    A methodology to systematically rank volcanic threat was developed as the basis for prioritizing volcanoes for long-term hazards evaluations, monitoring, and mitigation activities. A ranking of 169 volcanoes in the United States and the Commonwealth of the Northern Mariana Islands (U.S. volcanoes) is presented based on scores assigned for various hazard and exposure factors. Fifteen factors define the hazard: Volcano type, maximum known eruptive explosivity, magnitude of recent explosivity within the past 500 and 5,000 years, average eruption-recurrence interval, presence or potential for a suite of hazardous phenomena (pyroclastic flows, lahars, lava flows, tsunami, flank collapse, hydrothermal explosion, primary lahar), and deformation, seismic, or degassing unrest. Nine factors define exposure: a measure of ground-based human population in hazard zones, past fatalities and evacuations, a measure of airport exposure, a measure of human population on aircraft, the presence of power, transportation, and developed infrastructure, and whether or not the volcano forms a significant part of a populated island. The hazard score and exposure score for each volcano are multiplied to give its overall threat score. Once scored, the ordered list of volcanoes is divided into five overall threat categories from very high to very low. ?? 2007 ASCE.

  5. Structural Basis for the Design of Potent and Species-specific Inhibitors of 3-hydroxy-3-methylglutaryl CoA Synthases

    SciTech Connect

    Pojer,F.; Ferrer, J.; Richard, S.; Nagegowda, D.; Chye, M.; Bach, T.; Noel, J.

    2006-01-01

    3-Hydroxy-3-methylglutaryl CoA synthase (HMGS) catalyzes the first committed step in the mevalonate metabolic pathway for isoprenoid biosynthesis and serves as an alternative target for cholesterol-lowering and antibiotic drugs. We have determined a previously undescribed crystal structure of a eukaryotic HMGS bound covalently to a potent and specific inhibitor F-244 [(E,E)-11-[3-(hydroxymethyl)-4-oxo-2-oxytanyl]-3,5,7-trimethyl-2,4-undecadienenoic acid]. Given the accessibility of synthetic analogs of the F-244 natural product, this inhibited eukaryotic HMGS structure serves as a necessary starting point for structure-based methods that may improve the potency and species-specific selectivity of the next generation of F-244 analogs designed to target particular eukaryotic and prokaryotic HMGS.

  6. Metallurgical design basis, qualification testing, and production history of 50 ksi and 60 ksi steel plate for the MARS TLP deck fabrication

    SciTech Connect

    Suzuki, Shuichi; Sueda, Kyosuke; Iki, Hiroshi; Smith, J.D.

    1995-12-31

    The MARS TLP fast-track deck construction project required rapid qualification and production of 50 ksi and 60 ksi steel plate. This paper describes the development of high-performance 4 in. (101.6mm) 50 ksi and 3 in. (76.2mm) 60 ksi steels of a modified API 2W composition and presents the production history for the MARS deck steel order. The same base composition was used for both grades via innovative proprietary TMCP practice. Utilization of the mono-chemistry steel allowed for production of a wide range of thicknesses and grades in a very short time frame via a simplified melting schedule and made it possible to minimize the number of new welding procedures to be developed by the deck fabricator. Extremely low carbon equivalent allowed the implementation of low fabrication preheats, with resultant cost and fabrication schedule savings. The chemical composition of the steel was specifically designed for this project and qualification testing in accordance with API RP 2Z verified high heat-affected zone CTOD toughness free of local brittle zones over a wide range of heat input and interpass temperature. Strict production process control resulted in very tight production property histograms with all steel being verified to have Charpy V-notch transition temperatures below {minus}80 C ({minus}112 F) at the plate mid-width, mid-thickness position. The success of the MARS deck steel rapid qualification, production and delivery was enabled by close teamwork between deck design engineers, construction fabrication contractor, and steelmaker for this steel.

  7. Structural Basis for Parathyroid Hormone-related Protein Binding to the Parathyroid Hormone Receptor and Design of Conformation-selective Peptides

    SciTech Connect

    Pioszak, Augen A.; Parker, Naomi R.; Gardella, Thomas J.; Xu, H. Eric

    2009-12-01

    Parathyroid hormone (PTH) and PTH-related protein (PTHrP) are two related peptides that control calcium/phosphate homeostasis and bone development, respectively, through activation of the PTH/PTHrP receptor (PTH1R), a class B G protein-coupled receptor. Both peptides hold clinical interest for their capacities to stimulate bone formation. PTH and PTHrP display different selectivity for two distinct PTH1R conformations, but how their binding to the receptor differs is unclear. The high resolution crystal structure of PTHrP bound to the extracellular domain (ECD) of PTH1R reveals that PTHrP binds as an amphipathic {alpha}-helix to the same hydrophobic groove in the ECD as occupied by PTH, but in contrast to a straight, continuous PTH helix, the PTHrP helix is gently curved and C-terminally 'unwound.' The receptor accommodates the altered binding modes by shifting the side chain conformations of two residues within the binding groove: Leu-41 and Ile-115, the former acting as a rotamer toggle switch to accommodate PTH/PTHrP sequence divergence, and the latter adapting to the PTHrP curvature. Binding studies performed with PTH/PTHrP hybrid ligands having reciprocal exchanges of residues involved in different contacts confirmed functional consequences for the altered interactions and enabled the design of altered PTH and PTHrP peptides that adopt the ECD-binding mode of the opposite peptide. Hybrid peptides that bound the ECD poorly were selective for the G protein-coupled PTH1R conformation. These results establish a molecular model for better understanding of how two biologically distinct ligands can act through a single receptor and provide a template for designing better PTH/PTHrP therapeutics.

  8. Electrophysiological Responses to Threat in Youth with and without Posttraumatic Stress Disorder

    PubMed Central

    Simons, Robert F.

    2012-01-01

    The current study was designed to examine event-related brain potentials and autonomic responses to pictures indicating threat, relative to non-threat, and acoustic startle reflexes in traumatized youth diagnosed with PTSD, relative to non-exposed children, before and after receiving psychotherapy. Children in the control group were individually yoked and demographically matched to the PTSD group. Both groups displayed enhanced late positive potentials and more prolonged heart rate deceleration to pictures indicating threat, relative to non-threat, and larger skin conductance responses to pictures indicating threat, relative to non-threat, at time one. At time two, controls appeared to habituate, as reflected by an overall attenuated skin conductance response, whereas the PTSD group showed little change. Across time points the PTSD group exhibited greater acoustic startle reflexes than the control group. Psychotherapy and symptom reduction was not associated with electrophysiology. Drawing from the adult literature, this study was an attempt to address the scarcity of research examining electrophysiological irregularities in childhood PTSD. The overall results suggest that children and adolescents allocate more attention to threat-related stimuli regardless of PTSD status, and exaggerated startle and a possible failure to habituate skin conductance responses to threat-related stimuli in youth with versus without PTSD. PMID:22406756

  9. Coping when pain is a potential threat: the efficacy of acceptance versus cognitive distraction.

    PubMed

    Jackson, T; Yang, Z; Li, X; Chen, H; Huang, X; Meng, J

    2012-03-01

    This experiment investigated the impact of brief training in acceptance versus distraction-based pain management on experimental pain tolerance in conditions of lower and higher potential threats. One hundred fifty-one pain-free Chinese adults (93 women, 58 men) randomly assigned to acceptance, distraction or pain education control conditions engaged in a cold pressor test (CPT) after reading validated orienting information designed to prime either the safety of the CPT (lower threat) or symptoms and damaging effects of exposure to extreme cold (higher threat). A 2 (threat level) × 3 (training strategy) analysis of covariance, controlling for pre-intervention pain tolerance and education, indicated the acceptance group was more pain tolerant than other training groups. This main effect was qualified by an interaction with threat level: in the lower threat condition, acceptance group participants were more pain tolerant than peers in the distraction or pain education groups while no training group differences were found in the higher threat condition. Supplementary analyses identified catastrophizing as a partial mediator of training group differences in pain tolerance. In summary, findings suggested acceptance-based coping is superior to distraction as a means of managing experimental pain, particularly when pain sensations are viewed as comparatively low in potential threat. © 2011 European Federation of International Association for the Study of Pain Chapters.

  10. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  11. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  12. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  13. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  14. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  15. Self-concept clarity buffers the impact of societal threat to safety on right-wing authoritarianism.

    PubMed

    Russo, Silvia; Manzi, Claudia; Roccato, Michele

    2016-09-16

    Exposure to societal threat can elicit an increase in right-wing authoritarianism (RWA). In this study, using a quasi-experimental vignette design (Italian community sample, N = 86), we tested the moderating role of self-concept clarity (SCC). A moderated regression showed that manipulated societal threat to safety fostered RWA only among low SCC scorers. It is concluded that SCC is an important resource for individuals facing threat conditions.

  16. nonlinMIP contribution to CMIP6: model intercomparison project for non-linear mechanisms: physical basis, experimental design and analysis principles (v1.0)

    NASA Astrophysics Data System (ADS)

    Good, Peter; Andrews, Timothy; Chadwick, Robin; Dufresne, Jean-Louis; Gregory, Jonathan M.; Lowe, Jason A.; Schaller, Nathalie; Shiogama, Hideo

    2016-11-01

    nonlinMIP provides experiments that account for state-dependent regional and global climate responses. The experiments have two main applications: (1) to focus understanding of responses to CO2 forcing on states relevant to specific policy or scientific questions (e.g. change under low-forcing scenarios, the benefits of mitigation, or from past cold climates to the present day), or (2) to understand the state dependence (non-linearity) of climate change - i.e. why doubling the forcing may not double the response. State dependence (non-linearity) of responses can be large at regional scales, with important implications for understanding mechanisms and for general circulation model (GCM) emulation techniques (e.g. energy balance models and pattern-scaling methods). However, these processes are hard to explore using traditional experiments, which explains why they have had so little attention in previous studies. Some single model studies have established novel analysis principles and some physical mechanisms. There is now a need to explore robustness and uncertainty in such mechanisms across a range of models (point 2 above), and, more broadly, to focus work on understanding the response to CO2 on climate states relevant to specific policy/science questions (point 1). nonlinMIP addresses this using a simple, small set of CO2-forced experiments that are able to separate linear and non-linear mechanisms cleanly, with a good signal-to-noise ratio - while being demonstrably traceable to realistic transient scenarios. The design builds on the CMIP5 (Coupled Model Intercomparison Project Phase 5) and CMIP6 DECK (Diagnostic, Evaluation and Characterization of Klima) protocols, and is centred around a suite of instantaneous atmospheric CO2 change experiments, with a ramp-up-ramp-down experiment to test traceability to gradual forcing scenarios. In all cases the models are intended to be used with CO2 concentrations rather than CO2 emissions as the input. The understanding

  17. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    PubMed

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat.

  18. The structural basis for biphasic kinetics in the folding of the WW domain from a formin-binding protein: Lessons for protein design?

    PubMed Central

    Karanicolas, John; Brooks, Charles L.

    2003-01-01

    The mechanism of formation of β-sheets is of great importance because of the significant role of such structures in the initiation and propagation of amyloid diseases. In this study we examine the folding of a series of three-stranded antiparallel β-sheets known as WW domains. Whereas other WW domains have been shown to fold with single-exponential kinetics, the WW domain from murine formin-binding protein 28 has recently been shown to fold with biphasic kinetics. By using a combination of kinetics and thermodynamics to characterize a simple model for this protein, the origins of the biphasic kinetics is found to lie in the fact that most of the protein is able to fold without requiring one of the β-hairpins to be correctly registered. The correct register of this hairpin is enforced by a surface-exposed hydrophobic contact, which is not present in other WW domains. This finding suggests the use of judiciously chosen surface-exposed hydrophobic pairs as a protein design strategy for enforcing the desired strand registry. PMID:12655041

  19. Structural Basis of the Cross-Reactivity of Genetically Related Human Anti-HIV-1 mAbs: Implications for Design of V3-Based Immunogens

    SciTech Connect

    Burke, V.; Williams, C; Sukumaran, M; Kim, S; Li, H; Wang, X; Gorny, M; Zolla-Pazner, S; Kong, X

    2009-01-01

    Human monoclonal antibodies 447-52D and 537-10D, both coded by the VH3 gene and specific for the third variable region (V3) of the HIV-1 gp120, were found to share antigen-binding structural elements including an elongated CDR H3 forming main-chain interactions with the N terminus of the V3 crown. However, water-mediated hydrogen bonds and a unique cation- sandwich stacking allow 447-52D to be broadly reactive with V3 containing both the GPGR and GPGQ crown motifs, while the deeper binding pocket and a buried Glu in the binding site of 537-10D limit its reactivity to only V3 containing the GPGR motif. Our results suggest that the design of immunogens for anti-V3 antibodies should avoid the Arg at the V3 crown, as GPGR-containing epitopes appear to select for B cells making antibodies of narrower specificity than V3 that carry Gln at this position.

  20. Forecasting Lightning Threat Using WRF Proxy Fields

    NASA Technical Reports Server (NTRS)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.