Science.gov

Sample records for weaknesses threats strengths

  1. Big Data and Health Economics: Strengths, Weaknesses, Opportunities and Threats.

    PubMed

    Collins, Brendan

    2016-02-01

    'Big data' is the collective name for the increasing capacity of information systems to collect and store large volumes of data, which are often unstructured and time stamped, and to analyse these data by using regression and other statistical techniques. This is a review of the potential applications of big data and health economics, using a SWOT (strengths, weaknesses, opportunities, threats) approach. In health economics, large pseudonymized databases, such as the planned care.data programme in the UK, have the potential to increase understanding of how drugs work in the real world, taking into account adherence, co-morbidities, interactions and side effects. This 'real-world evidence' has applications in individualized medicine. More routine and larger-scale cost and outcomes data collection will make health economic analyses more disease specific and population specific but may require new skill sets. There is potential for biomonitoring and lifestyle data to inform health economic analyses and public health policy.

  2. Environmental metabolomics: a SWOT analysis (strengths, weaknesses, opportunities, and threats).

    PubMed

    Miller, Marion G

    2007-02-01

    Metabolomic approaches have the potential to make an exceptional contribution to understanding how chemicals and other environmental stressors can affect both human and environmental health. However, the application of metabolomics to environmental exposures, although getting underway, has not yet been extensively explored. This review will use a SWOT analysis model to discuss some of the strengths, weaknesses, opportunities, and threats that are apparent to an investigator venturing into this relatively new field. SWOT has been used extensively in business settings to uncover new outlooks and identify problems that would impede progress. The field of environmental metabolomics provides great opportunities for discovery, and this is recognized by a high level of interest in potential applications. However, understanding the biological consequence of environmental exposures can be confounded by inter- and intra-individual differences. Metabolomic profiles can yield a plethora of data, the interpretation of which is complex and still being evaluated and researched. The development of the field will depend on the availability of technologies for data handling and that permit ready access metabolomic databases. Understanding the relevance of metabolomic endpoints to organism health vs adaptation vs variation is an important step in understanding what constitutes a substantive environmental threat. Metabolomic applications in reproductive research are discussed. Overall, the development of a comprehensive mechanistic-based interpretation of metabolomic changes offers the possibility of providing information that will significantly contribute to the protection of human health and the environment. PMID:17269710

  3. Environmental metabolomics: a SWOT analysis (strengths, weaknesses, opportunities, and threats).

    PubMed

    Miller, Marion G

    2007-02-01

    Metabolomic approaches have the potential to make an exceptional contribution to understanding how chemicals and other environmental stressors can affect both human and environmental health. However, the application of metabolomics to environmental exposures, although getting underway, has not yet been extensively explored. This review will use a SWOT analysis model to discuss some of the strengths, weaknesses, opportunities, and threats that are apparent to an investigator venturing into this relatively new field. SWOT has been used extensively in business settings to uncover new outlooks and identify problems that would impede progress. The field of environmental metabolomics provides great opportunities for discovery, and this is recognized by a high level of interest in potential applications. However, understanding the biological consequence of environmental exposures can be confounded by inter- and intra-individual differences. Metabolomic profiles can yield a plethora of data, the interpretation of which is complex and still being evaluated and researched. The development of the field will depend on the availability of technologies for data handling and that permit ready access metabolomic databases. Understanding the relevance of metabolomic endpoints to organism health vs adaptation vs variation is an important step in understanding what constitutes a substantive environmental threat. Metabolomic applications in reproductive research are discussed. Overall, the development of a comprehensive mechanistic-based interpretation of metabolomic changes offers the possibility of providing information that will significantly contribute to the protection of human health and the environment.

  4. Health Education in India: A Strengths, Weaknesses, Opportunities, and Threats (SWOT) Analysis

    ERIC Educational Resources Information Center

    Sharma, Manoj

    2005-01-01

    The purpose of this study was to conduct a strengths, weaknesses, opportunities, and threats (SWOT) analysis of the health education profession and discipline in India. Materials from CINAHL, ERIC, MEDLINE, and Internet were collected to conduct the open coding of the SWOT analysis. Strengths of health education in India include an elaborate…

  5. Role of editors and journals in detecting and preventing scientific misconduct: strengths, weaknesses, opportunities, and threats.

    PubMed

    Marusic, Ana; Katavic, Vedran; Marusic, Matko

    2007-09-01

    Scientific journals have a central place in protecting research integrity because published articles are the most visible documentation of research. We used SWOT analysis to audit (S)trengths and (W)eaknesses as internal and (O)pportunities and (T)hreats as external factors affecting journals' responsibility in addressing research integrity issues. Strengths include editorial independence, authority and expertise, power to formulate editorial policies, and responsibility for the integrity of published records. Weaknesses stem from having no mandate for legal action, reluctance to get involved, and lack of training. Opportunities for editors are new technologies for detecting misconduct, policies by editorial organization or national institutions, and greater transparency of published research. Editors face threats from the lack of legal regulation and culture of research integrity in academic communities, lack of support from stakeholders in scientific publishing, and different pressures. Journal editors cannot be the policing force of the scientific community but they should actively ensure the integrity of the scientific record.

  6. SWOT analysis: strengths, weaknesses, opportunities and threats of the Israeli Smallpox Revaccination Program.

    PubMed

    Huerta, Michael; Balicer, Ran D; Leventhal, Alex

    2003-01-01

    During September 2002, Israel began its current revaccination program against smallpox, targeting previously vaccinated "first responders" among medical and emergency workers. In order to identify the potential strengths and weaknesses of this program and the conditions under which critical decisions were reached, we conducted a SWOT analysis of the current Israeli revaccination program, designed to identify its intrinsic strengths and weaknesses, as well as opportunities for its success and threats against it. SWOT analysis--a practical tool for the study of public health policy decisions and the social and political contexts in which they are reached--revealed clear and substantial strengths and weaknesses of the current smallpox revaccination program, intrinsic to the vaccine itself. A number of threats were identified that may jeopardize the success of the current program, chief among them the appearance of severe complications of vaccination. Our finding of a lack of a generation of knowledge on smallpox vaccination highlights the need for improved physician education and dissipation of misconceptions that are prevalent in the public today. PMID:12592958

  7. SWOT analysis: strengths, weaknesses, opportunities and threats of the Israeli Smallpox Revaccination Program.

    PubMed

    Huerta, Michael; Balicer, Ran D; Leventhal, Alex

    2003-01-01

    During September 2002, Israel began its current revaccination program against smallpox, targeting previously vaccinated "first responders" among medical and emergency workers. In order to identify the potential strengths and weaknesses of this program and the conditions under which critical decisions were reached, we conducted a SWOT analysis of the current Israeli revaccination program, designed to identify its intrinsic strengths and weaknesses, as well as opportunities for its success and threats against it. SWOT analysis--a practical tool for the study of public health policy decisions and the social and political contexts in which they are reached--revealed clear and substantial strengths and weaknesses of the current smallpox revaccination program, intrinsic to the vaccine itself. A number of threats were identified that may jeopardize the success of the current program, chief among them the appearance of severe complications of vaccination. Our finding of a lack of a generation of knowledge on smallpox vaccination highlights the need for improved physician education and dissipation of misconceptions that are prevalent in the public today.

  8. The voluntary community health movement in India: a strengths, weaknesses, opportunities, and threats (SWOT) analysis.

    PubMed

    Sharma, M; Bhatia, G

    1996-12-01

    There has been a prolific growth of voluntary organizations in India since independence in 1947. One of the major areas of this growth has been in the field of community health. The purpose of this article is to historically trace the voluntary movement in community health in India, analyze the current status, and predict future trends of voluntary efforts. A review of the literature in the form of a Strengths, Weaknesses, Opportunities, and Threats (SWOT) analysis was the method of this study. Some of the key trends which emerged as the priority areas for progress and for strengthening voluntary organizations in the future were enhancing linkages between health and development; building upon collective force; greater utilization of participatory training; establishing egalitarian and effectual linkages for decision making at the international level; developing self-reliant community-based models; and the need for attaining holistic empowerment at individual, organizational, and community levels through "duty consciousness" as opposed to merely asking for rights.

  9. Traits-based approaches in bioassessment and ecological risk assessment: strengths, weaknesses, opportunities and threats.

    PubMed

    Van den Brink, Paul J; Alexander, Alexa C; Desrosiers, Mélanie; Goedkoop, Willem; Goethals, Peter L M; Liess, Matthias; Dyer, Scott D

    2011-04-01

    We discuss the application of traits-based bioassessment approaches in retrospective bioassessment as well as in prospective ecological risk assessments in regulatory frameworks. Both approaches address the interaction between species and stressors and their consequences at different levels of biological organization, but the fact that a specific species may be less abundant in a potentially impacted site compared with a reference site is, regrettably, insufficient to provide diagnostic information. Species traits may, however, overcome the problems associated with taxonomy-based bioassessment. Trait-based approaches could provide signals regarding what environmental factors may be responsible for the impairment and, thereby, provide causal insight into the interaction between species and stressors. For development of traits-based (TBA), traits should correspond to specific types of stressors or suites of stressors. In this paper, a strengths, weaknesses, opportunities, and threats (SWOT) analysis of TBA in both applications was used to identify challenges and potentials. This paper is part of a series describing the output of the TERA (Traits-based ecological risk assessment: Realising the potential of ecoinformatics approaches in ecotoxicology) Workshop held between 7 and 11 September, 2009, in Burlington, Ontario, Canada. The recognized strengths were that traits are transferrable across geographies, add mechanistic and diagnostic knowledge, require no new sampling methodology, have an old tradition, and can supplement taxonomic analysis. Weaknesses include autocorrelation, redundancy, and inability to protect biodiversity directly. Automated image analysis, combined with genetic and biotechnology tools and improved data analysis to solve autocorrelation problems were identified as opportunities, whereas low availability of trait data, their transferability, their quantitative interpretation, the risk of developing nonrelevant traits, low quality of historic

  10. Partitioning in aqueous two-phase systems: Analysis of strengths, weaknesses, opportunities and threats.

    PubMed

    Soares, Ruben R G; Azevedo, Ana M; Van Alstine, James M; Aires-Barros, M Raquel

    2015-08-01

    For half a century aqueous two-phase systems (ATPSs) have been applied for the extraction and purification of biomolecules. In spite of their simplicity, selectivity, and relatively low cost they have not been significantly employed for industrial scale bioprocessing. Recently their ability to be readily scaled and interface easily in single-use, flexible biomanufacturing has led to industrial re-evaluation of ATPSs. The purpose of this review is to perform a SWOT analysis that includes a discussion of: (i) strengths of ATPS partitioning as an effective and simple platform for biomolecule purification; (ii) weaknesses of ATPS partitioning in regard to intrinsic problems and possible solutions; (iii) opportunities related to biotechnological challenges that ATPS partitioning may solve; and (iv) threats related to alternative techniques that may compete with ATPS in performance, economic benefits, scale up and reliability. This approach provides insight into the current status of ATPS as a bioprocessing technique and it can be concluded that most of the perceived weakness towards industrial implementation have now been largely overcome, thus paving the way for opportunities in fermentation feed clarification, integration in multi-stage operations and in single-step purification processes. PMID:26213222

  11. Partitioning in aqueous two-phase systems: Analysis of strengths, weaknesses, opportunities and threats.

    PubMed

    Soares, Ruben R G; Azevedo, Ana M; Van Alstine, James M; Aires-Barros, M Raquel

    2015-08-01

    For half a century aqueous two-phase systems (ATPSs) have been applied for the extraction and purification of biomolecules. In spite of their simplicity, selectivity, and relatively low cost they have not been significantly employed for industrial scale bioprocessing. Recently their ability to be readily scaled and interface easily in single-use, flexible biomanufacturing has led to industrial re-evaluation of ATPSs. The purpose of this review is to perform a SWOT analysis that includes a discussion of: (i) strengths of ATPS partitioning as an effective and simple platform for biomolecule purification; (ii) weaknesses of ATPS partitioning in regard to intrinsic problems and possible solutions; (iii) opportunities related to biotechnological challenges that ATPS partitioning may solve; and (iv) threats related to alternative techniques that may compete with ATPS in performance, economic benefits, scale up and reliability. This approach provides insight into the current status of ATPS as a bioprocessing technique and it can be concluded that most of the perceived weakness towards industrial implementation have now been largely overcome, thus paving the way for opportunities in fermentation feed clarification, integration in multi-stage operations and in single-step purification processes.

  12. The voluntary community health movement in India: a strengths, weaknesses, opportunities, and threats (SWOT) analysis.

    PubMed

    Sharma, M; Bhatia, G

    1996-12-01

    There has been a prolific growth of voluntary organizations in India since independence in 1947. One of the major areas of this growth has been in the field of community health. The purpose of this article is to historically trace the voluntary movement in community health in India, analyze the current status, and predict future trends of voluntary efforts. A review of the literature in the form of a Strengths, Weaknesses, Opportunities, and Threats (SWOT) analysis was the method of this study. Some of the key trends which emerged as the priority areas for progress and for strengthening voluntary organizations in the future were enhancing linkages between health and development; building upon collective force; greater utilization of participatory training; establishing egalitarian and effectual linkages for decision making at the international level; developing self-reliant community-based models; and the need for attaining holistic empowerment at individual, organizational, and community levels through "duty consciousness" as opposed to merely asking for rights. PMID:8912121

  13. Analysis of Strengths, Weaknesses, Opportunities, and Threats as a Tool for Translating Evidence into Individualized Medical Strategies (I-SWOT)

    PubMed Central

    von Kodolitsch, Yskert; Bernhardt, Alexander M.; Robinson, Peter N.; Kölbel, Tilo; Reichenspurner, Hermann; Debus, Sebastian; Detter, Christian

    2015-01-01

    Background It is the physicians’ task to translate evidence and guidelines into medical strategies for individual patients. Until today, however, there is no formal tool that is instrumental to perform this translation. Methods We introduce the analysis of strengths (S) and weaknesses (W) related to therapy with opportunities (O) and threats (T) related to individual patients as a tool to establish an individualized (I) medical strategy (I-SWOT). The I-SWOT matrix identifies four fundamental types of strategy. These comprise “SO” maximizing strengths and opportunities, “WT” minimizing weaknesses and threats, “WO” minimizing weaknesses and maximizing opportunities, and “ST” maximizing strengths and minimizing threats. Each distinct type of strategy may be considered for individualized medical strategies. Results We describe four steps of I-SWOT to establish an individualized medical strategy to treat aortic disease. In the first step, we define the goal of therapy and identify all evidence-based therapeutic options. In a second step, we assess strengths and weaknesses of each therapeutic option in a SW matrix form. In a third step, we assess opportunities and threats related to the individual patient, and in a final step, we use the I-SWOT matrix to establish an individualized medical strategy through matching “SW” with “OT”. As an example we present two 30-year-old patients with Marfan syndrome with identical medical history and aortic pathology. As a result of I-SWOT analysis of their individual opportunities and threats, we identified two distinct medical strategies in these patients. Conclusion I-SWOT is a formal but easy to use tool to translate medical evidence into individualized medical strategies. PMID:27069939

  14. Strengths, weaknesses, opportunities and threats of the pig health monitoring systems used in England.

    PubMed

    Stärk, K D C; Nevel, A

    2009-10-17

    Several systems are being used in England to record information about the health of pigs. The British Pig Health Scheme (BPHS), the National Animal Disease Information System (NADIS), the Zoonoses Action Plan (ZAP) for Salmonella and the Veterinary Investigation Diagnosis Analysis (VIDA) system have been assessed to make recommendations for their future separate or joint development. The structure, organisation, processes, data quality, dissemination, utilisation and acceptance of each system have been assessed. Information was extracted from documents and websites, and informal interviews were conducted with technical experts and stakeholders. The systems covered a broad range of objectives, used variable approaches and operated at very different scales and budgets. There was a high level of awareness and involvement by the industry. Common weaknesses of the systems were the lack of in-depth quantitative analysis of the data, the lack of assessment of each system's impact, and the unknown level of bias as a result of the voluntary or selective participation in them. PMID:19850852

  15. An Examination of the Strengths, Weaknesses, Opportunities, and Threats Associated with the Adoption of Moodle[TM] by eXtension

    ERIC Educational Resources Information Center

    Hightower, Tayla Elise; Murphrey, Theresa Pesl; Coppernoll, Susanna Mumm; Jahedkar, Jennifer; Dooley, Kim E.

    2011-01-01

    The use of technology to deliver programming across Extension has been addressed widely; however, little research has been conducted concerning the use of Moodle[TM] as a course management system for Extension. The purpose of the study reported here was to identify the strengths, weaknesses, opportunities, and threats associated with the use of…

  16. Special Education and Rehabilitation in Georgia: Strengths, Weakness, Opportunities, and Threats in a Newly-Independent State of the Former Soviet Union.

    ERIC Educational Resources Information Center

    Hobbs, Tim; Szydlowski, Steven; West, Daniel, Jr.; Germava, Otar

    2002-01-01

    Forty-nine Georgian professionals from the fields of health, education, and rehabilitation were brought together for a week-long workshop to discuss issues related to disability, rehabilitation, and special education. Workshop activities included a SWOT (strengths, weaknesses, opportunities, and threats) analysis of special education in Georgia.…

  17. SWOT analysis of Banff: strengths, weaknesses, opportunities and threats of the international Banff consensus process and classification system for renal allograft pathology.

    PubMed

    Mengel, M; Sis, B; Halloran, P F

    2007-10-01

    The Banff process defined the diagnostic histologic lesions for renal allograft rejection and created a standardized classification system where none had existed. By correcting this deficit the process had universal impact on clinical practice and clinical and basic research. All trials of new drugs since the early 1990s benefited, because the Banff classification of lesions permitted the end point of biopsy-proven rejection. The Banff process has strengths, weaknesses, opportunities and threats (SWOT). The strength is its self-organizing group structure to create consensus. Consensus does not mean correctness: defining consensus is essential if a widely held view is to be proved wrong. The weaknesses of the Banff process are the absence of an independent external standard to test the classification; and its almost exclusive reliance on histopathology, which has inherent limitations in intra- and interobserver reproducibility, particularly at the interface between borderline and rejection, is exactly where clinicians demand precision. The opportunity lies in the new technology such as transcriptomics, which can form an external standard and can be incorporated into a new classification combining the elegance of histopathology and the objectivity of transcriptomics. The threat is the degree to which the renal transplant community will participate in and support this process. PMID:17848174

  18. SWOT analysis of Banff: strengths, weaknesses, opportunities and threats of the international Banff consensus process and classification system for renal allograft pathology.

    PubMed

    Mengel, M; Sis, B; Halloran, P F

    2007-10-01

    The Banff process defined the diagnostic histologic lesions for renal allograft rejection and created a standardized classification system where none had existed. By correcting this deficit the process had universal impact on clinical practice and clinical and basic research. All trials of new drugs since the early 1990s benefited, because the Banff classification of lesions permitted the end point of biopsy-proven rejection. The Banff process has strengths, weaknesses, opportunities and threats (SWOT). The strength is its self-organizing group structure to create consensus. Consensus does not mean correctness: defining consensus is essential if a widely held view is to be proved wrong. The weaknesses of the Banff process are the absence of an independent external standard to test the classification; and its almost exclusive reliance on histopathology, which has inherent limitations in intra- and interobserver reproducibility, particularly at the interface between borderline and rejection, is exactly where clinicians demand precision. The opportunity lies in the new technology such as transcriptomics, which can form an external standard and can be incorporated into a new classification combining the elegance of histopathology and the objectivity of transcriptomics. The threat is the degree to which the renal transplant community will participate in and support this process.

  19. The interRAI Acute Care instrument incorporated in an eHealth system for standardized and web-based geriatric assessment: strengths, weaknesses, opportunities and threats in the acute hospital setting

    PubMed Central

    2013-01-01

    Background The interRAI Acute Care instrument is a multidimensional geriatric assessment system intended to determine a hospitalized older persons’ medical, psychosocial and functional capacity and needs. Its objective is to develop an overall plan for treatment and long-term follow-up based on a common set of standardized items that can be used in various care settings. A Belgian web-based software system (BelRAI-software) was developed to enable clinicians to interpret the output and to communicate the patients’ data across wards and care organizations. The purpose of the study is to evaluate the (dis)advantages of the implementation of the interRAI Acute Care instrument as a comprehensive geriatric assessment instrument in an acute hospital context. Methods In a cross-sectional multicenter study on four geriatric wards in three acute hospitals, trained clinical staff (nurses, occupational therapists, social workers, and geriatricians) assessed 410 inpatients in routine clinical practice. The BelRAI-system was evaluated by focus groups, observations, and questionnaires. The Strengths, Weaknesses, Opportunities and Threats were mapped (SWOT-analysis) and validated by the participants. Results The primary strengths of the BelRAI-system were a structured overview of the patients’ condition early after admission and the promotion of multidisciplinary assessment. Our study was a first attempt to transfer standardized data between home care organizations, nursing homes and hospitals and a way to centralize medical, allied health professionals and nursing data. With the BelRAI-software, privacy of data is guaranteed. Weaknesses are the time-consuming character of the process and the overlap with other assessment instruments or (electronic) registration forms. There is room for improving the user-friendliness and the efficiency of the software, which needs hospital-specific adaptations. Opportunities are a timely and systematic problem detection and continuity of

  20. The Hidden Strengths of Weak Theories

    PubMed Central

    Keil, Frank

    2012-01-01

    There has been a strong tradition of assuming that concepts, and their patterns of formation might be best understood in terms of how they are embedded in theory-like sets of beliefs. Although such views of concepts as embedded in theories have been criticized on five distinct grounds, there are reasonable responses to each of these usual objections. There is, however, a newly emerging concern that is much more challenging to address – people’s intuitive theories seem to be remarkably impoverished. In fact, they are so impoverished it is difficult to see how they could provide the necessary structure to explain differences between concepts and how they might form in development. One response to this recent challenge is to abandon all views of concept structure as being related to people’s intuitive theories and see concepts as essentially structure-free atoms. The alternative proposed here argues that our very weak theories might in fact do a great deal of work in explaining how we form concepts and are able to use them to successfully refer. PMID:25309684

  1. Grip Strength Cutpoints for the Identification of Clinically Relevant Weakness

    PubMed Central

    Shardell, Michelle D.; Peters, Katherine W.; McLean, Robert R.; Dam, Thuy-Tien L.; Kenny, Anne M.; Fragala, Maren S.; Harris, Tamara B.; Kiel, Douglas P.; Guralnik, Jack M.; Ferrucci, Luigi; Kritchevsky, Stephen B.; Studenski, Stephanie A.; Vassileva, Maria T.; Cawthon, Peggy M.

    2014-01-01

    Background. Weakness is common and contributes to disability, but no consensus exists regarding a strength cutpoint to identify persons at high risk. This analysis, conducted as part of the Foundation for the National Institutes of Health Sarcopenia Project, sought to identify cutpoints that distinguish weakness associated with mobility impairment, defined as gait speed less than 0.8 m/s. Methods. In pooled cross-sectional data (9,897 men and 10,950 women), Classification and Regression Tree analysis was used to derive cutpoints for grip strength associated with mobility impairment. Results. In men, a grip strength of 26–32 kg was classified as “intermediate” and less than 26 kg as “weak”; 11% of men were intermediate and 5% were weak. Compared with men with normal strength, odds ratios for mobility impairment were 3.63 (95% CI: 3.01–4.38) and 7.62 (95% CI 6.13–9.49), respectively. In women, a grip strength of 16–20 kg was classified as “intermediate” and less than 16 kg as “weak”; 25% of women were intermediate and 18% were weak. Compared with women with normal strength, odds ratios for mobility impairment were 2.44 (95% CI 2.20–2.71) and 4.42 (95% CI 3.94–4.97), respectively. Weakness based on these cutpoints was associated with mobility impairment across subgroups based on age, body mass index, height, and disease status. Notably, in women, grip strength divided by body mass index provided better fit relative to grip strength alone, but fit was not sufficiently improved to merit different measures by gender and use of a more complex measure. Conclusions. Cutpoints for weakness derived from this large, diverse sample of older adults may be useful to identify populations who may benefit from interventions to improve muscle strength and function. PMID:24737558

  2. School-Based Sexuality Education in Portugal: Strengths and Weaknesses

    ERIC Educational Resources Information Center

    Rocha, Ana Cristina; Leal, Cláudia; Duarte, Cidália

    2016-01-01

    Portugal, like many other countries, faces obstacles regarding school-based sexuality education. This paper explores Portuguese schools' approaches to implementing sexuality education at a local level, and provides a critical analysis of potential strengths and weaknesses. Documents related to sexuality education in a convenience sample of 89…

  3. Patterns of Strengths and Weaknesses in Children's Knowledge about Fractions

    ERIC Educational Resources Information Center

    Hecht, Steven A.; Vagi, Kevin J.

    2012-01-01

    The purpose of this study was to explore individual patterns of strengths and weaknesses in children's mathematical knowledge about common fractions. Tasks that primarily measure either conceptual or procedural aspects of mathematical knowledge were assessed with the same children in their fourth- and fifth-grade years (N = 181, 56% female and 44%…

  4. Radiochemistry in the twenty-first century: Strenghts, weaknesses, opportunities and threats

    NASA Astrophysics Data System (ADS)

    de Goeij, J. J. M.

    2003-01-01

    Strengths, weaknesses, opportunities and threats of radiochemistry and associated nuclear chemistry are discussed. For that purpose radiochemistry is subdivided into three categories. The first category covers fundamental aspects, e.g. nuclear reaction cross-sections, production routes with associated yields and radionuclidic impurities, decay schemes, radiochemical separations, recoil and hot-atom chemistry, isotope effects and fractionation, and interaction of radiation with matter and detection. The second category covers topics where radioactivity is inextricably involved, e.g. the nuclear fuel cycle, very heavy elements and other actinides, primordial and cosmogenic radioactivity, and radionuclide techniques for dating. The third category involves radioactivity as essential part of a technique. On one hand radioactivity is used here as source of ionising radiation for food conservation, polymerisation of plastics, sterilisation, radiotherapy and pain palliation. On the other hand it is used to get information on systems and materials, via radiotracer methods and nuclear activation techniques. In particular the latter field is experiencing strong competition with other, non-nuclear methods. In this frame it is indicated what is required to achieve a situation where nuclear analytical techniques may successfully be exploited to the full extent of their potentials, particularly in providing valuable and sometimes unique information.

  5. [Management models in clinical nutrition: weaknesses and strengths].

    PubMed

    García de Lorenzo, A; Alvarez, J; Burgos, R; Cabrerizo, L; Farrer, K; García Almeida, J M; García Luna, P P; García Peris, P; Llano, J Del; Planas, M; Piñeiro, G

    2009-01-01

    At the 6th Abbott-SENPE Debate Forum a multidisciplinary and multiprofessional discussion was established in order to seek for the model or the models of clinical management most appropriate for Clinical Nutrition and Dietetics Units (CNAD) in Spain. The weaknesses and strengths as well as opportunities for the current systems were assessed concluding that a certain degree of disparity was observed not only due to regional differences but also to different hospital types. It was proposed, from SENPE, the creation of a working group helping to standardize the models and promote the culture of Integral Control and Change Management.

  6. Committee Effectiveness in Higher Education: The Strengths and Weaknesses of Group Decision Making

    ERIC Educational Resources Information Center

    Bates, Stephen B.

    2014-01-01

    Focusing on five models of committee effectiveness for purposes of this assessment will lend insight into the strengths and weaknesses of utilizing a structured action plan as a guide to achieving and maintaining optimum committee effectiveness in higher education. In the compilation of the strengths and weaknesses of committee decision making,…

  7. Strengths and Weaknesses of NESTs and NNESTs: Perceptions of NNESTs in Hong Kong

    ERIC Educational Resources Information Center

    Ma, Lai Ping Florence

    2012-01-01

    Since non-native English speaking teachers (NNESTs) are always compared with native English speaking teachers (NESTs) on linguistic grounds, their strengths and weaknesses as English teachers are worthy of investigation. This paper reports on a mixed methods study which examines the strengths and weaknesses of NNESTs and NESTs through the…

  8. Judges Cite Current Trends, Comment on Strengths and Weaknesses.

    ERIC Educational Resources Information Center

    Smith, Helen F.

    1995-01-01

    Features opinions of newspaper and yearbook judges as to the state of student publications. Cites as strengths: graphic devices, more pull-out quotes, more double-page spreads with dominant elements, and overall improvement in the quality of magazines. Cites as trends: overdoing opinion at the expense of research, and too many stories that are…

  9. [Archaeology and criminology--Strengths and weaknesses of interdisciplinary cooperation].

    PubMed

    Bachhiesl, Christian

    2015-01-01

    Interdisciplinary cooperation of archaeology and criminology is often focussed on the scientific methods applied in both fields of knowledge. In combination with the humanistic methods traditionally used in archaeology, the finding of facts can be enormously increased and the subsequent hermeneutic deduction of human behaviour in the past can take place on a more solid basis. Thus, interdisciplinary cooperation offers direct and indirect advantages. But it can also cause epistemological problems, if the weaknesses and limits of one method are to be corrected by applying methods used in other disciplines. This may result in the application of methods unsuitable for the problem to be investigated so that, in a way, the methodological and epistemological weaknesses of two disciplines potentiate each other. An example of this effect is the quantification of qualia. These epistemological reflections are compared with the interdisciplinary approach using the concrete case of the "Eulau Crime Scene".

  10. Separate and interactive contributions of weak inhibitory control and threat sensitivity to prediction of suicide risk

    PubMed Central

    Venables, Noah C.; Sellbom, Martin; Sourander, Andre; Kendler, Kenneth S.; Joiner, Thomas E.; Drislane, Laura E.; Sillanmäki, Lauri; Elonheimo, Henrik; Parkkola, Kai; Multimaki, Petteri; Patrick, Christopher J.

    2015-01-01

    Biobehavioral dispositions can serve as valuable referents for biologically-oriented research on core processes with relevance to many psychiatric conditions. The present study examined two such dispositional variables—weak response inhibition (or disinhibition; INH−) and threat sensitivity (or fearfulness; THT+)—as predictors of the serious transdiagnostic problem of suicide risk in two samples: male and female outpatients from a U.S. clinic (N=1,078), and a population-based male military cohort from Finland (N=3,855). INH− and THT+ were operationalized through scores on scale measures of disinhibition and fear/fearlessness, known to be related to DSM-defined clinical conditions and brain biomarkers. Suicide risk was assessed by clinician ratings (clinic sample) and questionnaires (both samples). Across samples and alternative suicide indices, INH− and THT+ each contributed uniquely to prediction of suicide risk—beyond internalizing and externalizing problems in the case of the clinic sample where diagnostic data were available. Further, in both samples, INH− and THT+ interactively predicted suicide risk, with individuals scoring concurrently high on both dispositions exhibiting markedly augmented risk. Findings demonstrate that dispositional constructs of INH− and THT+ are predictive of suicide risk, and hold potential as referents for biological research on suicidal behavior. PMID:25712631

  11. Separate and interactive contributions of weak inhibitory control and threat sensitivity to prediction of suicide risk.

    PubMed

    Venables, Noah C; Sellbom, Martin; Sourander, Andre; Kendler, Kenneth S; Joiner, Thomas E; Drislane, Laura E; Sillanmäki, Lauri; Elonheimo, Henrik; Parkkola, Kai; Multimaki, Petteri; Patrick, Christopher J

    2015-04-30

    Biobehavioral dispositions can serve as valuable referents for biologically oriented research on core processes with relevance to many psychiatric conditions. The present study examined two such dispositional variables-weak response inhibition (or disinhibition; INH-) and threat sensitivity (or fearfulness; THT+)-as predictors of the serious transdiagnostic problem of suicide risk in two samples: male and female outpatients from a U.S. clinic (N=1078), and a population-based male military cohort from Finland (N=3855). INH- and THT+ were operationalized through scores on scale measures of disinhibition and fear/fearlessness, known to be related to DSM-defined clinical conditions and brain biomarkers. Suicide risk was assessed by clinician ratings (clinic sample) and questionnaires (both samples). Across samples and alternative suicide indices, INH- and THT+ each contributed uniquely to prediction of suicide risk-beyond internalizing and externalizing problems in the case of the clinic sample where diagnostic data were available. Further, in both samples, INH- and THT+ interactively predicted suicide risk, with individuals scoring concurrently high on both dispositions exhibiting markedly augmented risk. Findings demonstrate that dispositional constructs of INH- and THT+ are predictive of suicide risk, and hold potential as referents for biological research on suicidal behavior. PMID:25712631

  12. Objective Evaluation of Muscle Strength in Infants with Hypotonia and Muscle Weakness

    ERIC Educational Resources Information Center

    Reus, Linda; van Vlimmeren, Leo A.; Staal, J. Bart; Janssen, Anjo J. W. M.; Otten, Barto J.; Pelzer, Ben J.; Nijhuis-van der Sanden, Maria W. G.

    2013-01-01

    The clinical evaluation of an infant with motor delay, muscle weakness, and/or hypotonia would improve considerably if muscle strength could be measured objectively and normal reference values were available. The authors developed a method to measure muscle strength in infants and tested 81 typically developing infants, 6-36 months of age, and 17…

  13. The strength-of-weak-ties perspective on creativity: a comprehensive examination and extension.

    PubMed

    Baer, Markus

    2010-05-01

    Disentangling the effects of weak ties on creativity, the present study separated, both theoretically and empirically, the effects of the size and strength of actors' idea networks and examined their joint impact while simultaneously considering the separate, moderating role of network diversity. I hypothesized that idea networks of optimal size and weak strength were more likely to boost creativity when they afforded actors access to a wide range of different social circles. In addition, I examined whether the joint effects of network size, strength, and diversity on creativity were further qualified by the openness to experience personality dimension. As expected, results indicated that actors were most creative when they maintained idea networks of optimal size, weak strength, and high diversity and when they scored high on the openness dimension. The implications of these results are discussed.

  14. Internationally Adopted Children in the Early School Years: Relative Strengths and Weaknesses in Language Abilities

    ERIC Educational Resources Information Center

    Glennen, Sharon

    2015-01-01

    Purpose: This study aimed to determine the relative strengths and weaknesses in language and verbal short-term memory abilities of school-age children who were adopted from Eastern Europe. Method: Children adopted between 1;0 and 4;11 (years;months) of age were assessed with the Clinical Evaluation of Language Fundamentals-Preschool, Second…

  15. Patterns of Cognitive Strengths and Weaknesses: Identification Rates, Agreement, and Validity for Learning Disabilities Identification

    ERIC Educational Resources Information Center

    Miciak, Jeremy; Fletcher, Jack M.; Stuebing, Karla K.; Vaughn, Sharon; Tolar, Tammy D.

    2014-01-01

    Few empirical investigations have evaluated learning disabilities (LD) identification methods based on a pattern of cognitive strengths and weaknesses (PSW). This study investigated the reliability and validity of two proposed PSW methods: the concordance/discordance method (C/DM) and cross battery assessment (XBA) method. Cognitive assessment…

  16. Memory Profiles in Children with Mild Intellectual Disabilities: Strengths and Weaknesses

    ERIC Educational Resources Information Center

    Van der Molen, Mariet J.; Van Luit, Johannes E. H.; Jongmans, Marian J.; Van der Molen, Maurits W.

    2009-01-01

    Strengths and weaknesses in short-term memory (STM) and working memory (WM) were identified in children with mild intellectual disabilities (MID) by comparing their performance to typically developing children matched on chronological age (CA children) and to younger typically developing children with similar mental capacities (MA children).…

  17. Identifying Profiles of Reading Strengths and Weaknesses at the Secondary Level

    ERIC Educational Resources Information Center

    Trentman, Allison M. McCarthy

    2012-01-01

    The purpose of this study was to evaluate the feasibility and potential utility of reading profiles to identify common patterns of reading strengths and weaknesses among students in high school with deficit reading skills. A total of 55 students from three Midwestern high schools were administered a battery of assessments that targeted specific…

  18. The strength of weak connections in the macaque cortico-cortical network.

    PubMed

    Goulas, Alexandros; Schaefer, Alexander; Margulies, Daniel S

    2015-09-01

    Examination of the cortico-cortical network of mammals has unraveled key topological features and their role in the function of the healthy and diseased brain. Recent findings from social and biological networks pinpoint the significant role of weak connections in network coherence and mediation of information from segregated parts of the network. In the current study, inspired by such findings and proposed architectures pertaining to social networks, we examine the structure of weak connections in the macaque cortico-cortical network by employing a tract-tracing dataset. We demonstrate that the cortico-cortical connections as a whole, as well as connections between segregated communities of brain areas, comply with the architecture suggested by the so-called strength-of-weak-ties hypothesis. However, we find that the wiring of these connections is not optimal with respect to the aforementioned architecture. This configuration is not attributable to a trade-off with factors known to constrain brain wiring, i.e., wiring cost and efficiency. Lastly, weak connections, but not strong ones, appear important for network cohesion. Our findings relate a topological property to the strength of cortico-cortical connections, highlight the prominent role of weak connections in the cortico-cortical structural network and pinpoint their potential functional significance. These findings suggest that certain neuroimaging studies, despite methodological challenges, should explicitly take them into account and not treat them as negligible. PMID:25035063

  19. Extraction of Weak Transition Strengths via the (He3, t) Reaction at 420MeV

    NASA Astrophysics Data System (ADS)

    Zegers, R. G. T.; Adachi, T.; Akimune, H.; Austin, Sam M.; van den Berg, A. M.; Brown, B. A.; Fujita, Y.; Fujiwara, M.; Galès, S.; Guess, C. J.; Harakeh, M. N.; Hashimoto, H.; Hatanaka, K.; Hayami, R.; Hitt, G. W.; Howard, M. E.; Itoh, M.; Kawabata, T.; Kawase, K.; Kinoshita, M.; Matsubara, M.; Nakanishi, K.; Nakayama, S.; Okumura, S.; Ohta, T.; Sakemi, Y.; Shimbara, Y.; Shimizu, Y.; Scholl, C.; Simenel, C.; Tameshige, Y.; Tamii, A.; Uchida, M.; Yamagata, T.; Yosoi, M.

    2007-11-01

    Differential cross sections for transitions of known weak strength were measured with the (He3, t) reaction at 420 MeV on targets of C12, C13, O18, Mg26, Ni58, Ni60, Zr90, Sn118, Sn120, and Pb208. Using these data, it is shown that the proportionalities between strengths and cross sections for this probe follow simple trends as a function of mass number. These trends can be used to confidently determine Gamow-Teller strength distributions in nuclei for which the proportionality cannot be calibrated via β-decay strengths. Although theoretical calculations in the distorted-wave Born approximation overestimate the data, they allow one to understand the main experimental features and to predict deviations from the simple trends observed in some of the transitions.

  20. Extraction of weak transition strengths via the (3He, t) reaction at 420 MeV.

    PubMed

    Zegers, R G T; Adachi, T; Akimune, H; Austin, Sam M; van den Berg, A M; Brown, B A; Fujita, Y; Fujiwara, M; Galès, S; Guess, C J; Harakeh, M N; Hashimoto, H; Hatanaka, K; Hayami, R; Hitt, G W; Howard, M E; Itoh, M; Kawabata, T; Kawase, K; Kinoshita, M; Matsubara, M; Nakanishi, K; Nakayama, S; Okumura, S; Ohta, T; Sakemi, Y; Shimbara, Y; Shimizu, Y; Scholl, C; Simenel, C; Tameshige, Y; Tamii, A; Uchida, M; Yamagata, T; Yosoi, M

    2007-11-16

    Differential cross sections for transitions of known weak strength were measured with the (3He, t) reaction at 420 MeV on targets of 12C, 13C, 18O, 26Mg, 58Ni, 60Ni, 90Zr, 118Sn, 120Sn, and 208Pb. Using these data, it is shown that the proportionalities between strengths and cross sections for this probe follow simple trends as a function of mass number. These trends can be used to confidently determine Gamow-Teller strength distributions in nuclei for which the proportionality cannot be calibrated via beta-decay strengths. Although theoretical calculations in the distorted-wave Born approximation overestimate the data, they allow one to understand the main experimental features and to predict deviations from the simple trends observed in some of the transitions.

  1. Strategic marketing management for health management: cross impact matrix and TOWS (threats, opportunities, weaknesses, strengths).

    PubMed

    Proctor, T

    2000-01-01

    Organisations operate within a three-tiered environment--internal, micro and macro. The environment is a powerful force acting upon the effectiveness of strategic decision making. Failure to take cognisance of the influence of the three-tiered environment can have disastrous consequences. The cross-impact matrix and the TOWS matrix are two strategic decision-making aids that improve effective decision making. When used in conjunction with creative problem solving methods they can provide the basis of a powerful management tool.

  2. Does Weak Turbulence Impact PMSEs' Strengths Closer To The Northern Pole?

    NASA Astrophysics Data System (ADS)

    Swarnalingam, N.; Hocking, W. K.; Janches, D.; Nicolls, M. J.

    2015-12-01

    Existing 51.0 MHz VHF radar at Eureka (80N, 86W) in northern Canada is located closer to both the northern magnetic and geomagnetic poles. A recent calibrated study of Polar Mesosphere Summer Echoes (PMSE) using this radar supports the previous results by other radars that the absolute signal strength of PMSE in this region is relatively weak compared with the radar observations located at high latitudes. Although very cold temperature and existence of charged ice particles are the most important ingredient required for PMSE to appear, several other factors could potentially influence the absolute signal strengths of these echoes. One of them is neutral air turbulence. Previous studies indicate that upper mesospheric turbulence's strength decreases with latitudes, especially in the very high latitudes [Becker, 2004; Lubken et. al., 2009]. In this study, we investigate long-term mesospheric turbulence strengths at Eureka and study how they could be associated with the weak PMSE signal strengths compared with other high latitude conditions, where PMSE are strong.

  3. Strengths and weaknesses of McNamara's evolutionary psychological model of dreaming.

    PubMed

    Olliges, Sandra

    2010-10-07

    This article includes a brief overview of McNamara's (2004) evolutionary model of dreaming. The strengths and weaknesses of this model are then evaluated in terms of its consonance with measurable neurological and biological properties of dreaming, its fit within the tenets of evolutionary theories of dreams, and its alignment with evolutionary concepts of cooperation and spirituality. McNamara's model focuses primarily on dreaming that occurs during rapid eye movement (REM) sleep; therefore this article also focuses on REM dreaming.

  4. Structure and function of emergency care research networks: strengths, weaknesses, and challenges.

    PubMed

    Papa, Linda; Kuppermann, Nathan; Lamond, Katherine; Barsan, William G; Camargo, Carlos A; Ornato, Joseph P; Stiell, Ian G; Talan, David A

    2009-10-01

    The ability of emergency care research (ECR) to produce meaningful improvements in the outcomes of acutely ill or injured patients depends on the optimal configuration, infrastructure, organization, and support of emergency care research networks (ECRNs). Through the experiences of existing ECRNs, we can learn how to best accomplish this. A meeting was organized in Washington, DC, on May 28, 2008, to discuss the present state and future directions of clinical research networks as they relate to emergency care. Prior to the conference, at the time of online registration, participants responded to a series of preconference questions addressing the relevant issues that would form the basis of the breakout session discussions. During the conference, representatives from a number of existing ECRNs participated in discussions with the attendees and provided a description of their respective networks, infrastructure, and challenges. Breakout sessions provided the opportunity to further discuss the strengths and weaknesses of these networks and patterns of success with respect to their formation, management, funding, best practices, and pitfalls. Discussions centered on identifying characteristics that promote or inhibit successful networks and their interactivity, productivity, and expansion. Here the authors describe the current state of ECRNs and identify the strengths, weaknesses, and potential pitfalls of research networks. The most commonly cited strengths of population- or disease-based research networks identified in the preconference survey were access to larger numbers of patients; involvement of physician experts in the field, contributing to high-level study content; and the collaboration among investigators. The most commonly cited weaknesses were studies with too narrow a focus and restrictive inclusion criteria, a vast organizational structure with a risk of either too much or too little central organization or control, and heterogeneity of institutional

  5. Strength of iron at core pressures and evidence for a weak Earth’s inner core

    SciTech Connect

    Gleason, A. E.; Mao, W. L.

    2013-05-12

    The strength of iron at extreme conditions is crucial information for interpreting geophysical observations of the Earth’s core and understanding how the solid inner core deforms. However, the strength of iron, on which deformation depends, is challenging to measure and accurately predict at high pressure. Here we present shear strength measurements of iron up to pressures experienced in the Earth’s core. Hydrostatic X-ray spectroscopy and non-hydrostatic radial X-ray diffraction measurements of the deviatoric strain in hexagonally close-packed iron uniquely determine its shear strength to pressures above 200 GPa at room temperature. Applying numerical modelling of the rheologic behaviour of iron under pressure, we extrapolate our experimental results to inner-core pressures and temperatures, and find that the bulk shear strength of hexagonally close-packed iron is only ~ 1 GPa at the conditions of the Earth’s centre, 364 GPa and 5,500 K. This suggests that the inner core is rheologically weak, which supports dislocation creep as the dominant creep mechanism influencing deformation.

  6. A Historical Perspective on the Development of the Allan Variances and Their Strengths and Weaknesses.

    PubMed

    Allan, David W; Levine, Judah

    2016-04-01

    Over the past 50 years, variances have been developed for characterizing the instabilities of precision clocks and oscillators. These instabilities are often modeled as nonstationary processes, and the variances have been shown to be well-behaved and to be unbiased, efficient descriptors of these types of processes. This paper presents a historical overview of the development of these variances. The time-domain and frequency-domain formulations are presented and their development is described. The strengths and weaknesses of these characterization metrics are discussed. These variances are also shown to be useful in other applications, such as in telecommunication.

  7. Can stereotype threat affect motor performance in the absence of explicit monitoring processes? Evidence using a strength task.

    PubMed

    Chalabaev, Aïna; Brisswalter, Jeanick; Radel, Rémi; Coombes, Stephen A; Easthope, Christopher; Clément-Guillotin, Corentin

    2013-04-01

    Previous evidence shows that stereotype threat impairs complex motor skills through increased conscious monitoring of task performance. Given that one-step motor skills may not be susceptible to these processes, we examined whether performance on a simple strength task may be reduced under stereotype threat. Forty females and males performed maximum voluntary contractions under stereotypical or nullified-stereotype conditions. Results showed that the velocity of force production within the first milliseconds of the contraction decreased in females when the negative stereotype was induced, whereas maximal force did not change. In males, the stereotype induction only increased maximal force. These findings suggest that stereotype threat may impair motor skills in the absence of explicit monitoring processes, by influencing the planning stage of force production. PMID:23535978

  8. Can stereotype threat affect motor performance in the absence of explicit monitoring processes? Evidence using a strength task.

    PubMed

    Chalabaev, Aïna; Brisswalter, Jeanick; Radel, Rémi; Coombes, Stephen A; Easthope, Christopher; Clément-Guillotin, Corentin

    2013-04-01

    Previous evidence shows that stereotype threat impairs complex motor skills through increased conscious monitoring of task performance. Given that one-step motor skills may not be susceptible to these processes, we examined whether performance on a simple strength task may be reduced under stereotype threat. Forty females and males performed maximum voluntary contractions under stereotypical or nullified-stereotype conditions. Results showed that the velocity of force production within the first milliseconds of the contraction decreased in females when the negative stereotype was induced, whereas maximal force did not change. In males, the stereotype induction only increased maximal force. These findings suggest that stereotype threat may impair motor skills in the absence of explicit monitoring processes, by influencing the planning stage of force production.

  9. Biotic indices for assessing the status of coastal waters: a review of strengths and weaknesses.

    PubMed

    Martínez-Crego, Begoña; Alcoverro, Teresa; Romero, Javier

    2010-05-01

    Biotic indices have become key assessment tools in most recent national and trans-national policies aimed at improving the quality of coastal waters and the integrity of their associated ecosystems. In this study we analyzed 90 published biotic indices, classified them into four types, and analyzed the strengths and weaknesses of each type in relation to the requirements of these policies. We identified three main type-specific weaknesses. First, the problems of applicability, due to practical and conceptual difficulties, which affect most indices related to ecosystem function. Second, the failure of many indices based on structural attributes of the community (e.g. taxonomic composition) to link deterioration with causative stressors, or to provide an early-detection capacity. Third, the poor relevance to the ecological integrity of indices based on attributes at the sub-individual level (e.g. multi-biomarkers). Additionally, most indices still fail on two further aspects: the broad-scale applicability and the definition of reference conditions. Nowadays, the most promising approach seems to be the aggregation of indices with complementary strengths, and obtained from different biological communities. PMID:20383392

  10. Supplementary WMS-III tables for determining primary subtest strengths and weaknesses.

    PubMed

    Ryan, J J; Arb, J D; Ament, P A

    2000-06-01

    It is common practice to evaluate the age-adjusted subtest scores from the Wechsler intelligence scales to determine strengths and weaknesses within a profile. The Wechsler Memory Scale-III (WMS-III; D. Wechsler, 1997a) represents a significant improvement over its predecessors and, for the first time, provides age-adjusted subtest scores for interpretation, just as the Wechsler intelligence scales have done for 60 years. It is reasonable to assume that examiners will evaluate the WMS-III subtest profiles for strengths and weaknesses. However, the WMS-III Administration and Scoring Manual and the WAIS-III-WMS-III Technical Manual (The Psychological Corporation, 1997) provide no assistance for accomplishing this goal. Data from the WMS-III standardization sample, as described in the WAIS-III-WMS-III Technical Manual, were used to develop tables for determining both confidence levels and infrequency of differences between individual subtest scores and the means of 5 subtest combinations that may be clinically relevant for individual cases.

  11. Communicable Diseases Surveillance System in East Azerbaijan Earthquake: Strengths and Weaknesses

    PubMed Central

    Babaie, Javad; Fatemi, Farin; Ardalan, Ali; Mohammadi, Hamed; Soroush, Mahmood

    2014-01-01

    Background: A Surveillance System was established for 19 diseases/syndromes in order to prevent and control communicable diseases after 2012 East Azerbaijan earthquakes. This study was conducted to investigate the strengths and weaknesses of the established SS. Methods: This study was carried out on an interview-based qualitative study using content analysis in 2012. Data was collected by semi-structured deep interviews and surveillance data. Fifteen interviews were conducted with experts and health system managers who were engaged in implementing the communicable disease surveillance system in the affected areas. The selection of participants was purposeful. Data saturation supported the sample size. The collected data was analyzed using the principles suggested by Strauss and Corbin. Results: Establishment of the disease surveillance system was rapid and inexpensive. It collected the required data fast. It also increased confidence in health authorities that the diseases would be under control in earthquake-stricken regions. Non estimated denominator for calculating the rates (incidence & prevalence), non-participation of the private sector and hospitals, rapid turnover of health staff and unfamiliarity with the definitions of the diseases were the weak points of the established disease SS. Conclusion: During the time when surveillance system was active, no significant outbreak of communicable diseases was reported. However, the surveillance system had some weaknesses. Thus, considering Iran’s susceptibility to various natural hazards, repeated exercises should be conducted in the preparedness phase to decrease the weaknesses. In addition, other types of surveillance system such as web-based or mobile-based systems should be piloted in disaster situations for future. PMID:25685619

  12. The Janus-faced nature of comparative psychology--strength or weakness?

    PubMed

    Burghardt, Gordon M

    2013-07-18

    What is the nature of comparative psychology and how does or should it relate to evolutionary psychology? This is a time of reassessment of both fields and this article reviews the history of comparative psychology and its relationships with evolutionary psychology, ethology, and other approaches to behavior from the perspective of a former editor of the Journal of Comparative Psychology who has spent many decades engaged in research in animal behavior. Special attention is given to a reassessment of comparative psychology that was carried out in 1987. The various tensions and orientations that seem endemic to comparative psychology may, in fact, be both a strength and weakness as comparative psychology and evolutionary approaches to human psychology return to issues prominent in the late 19th Century, when both fields were just becoming established.

  13. Strengths and weaknesses of Problem Based Learning from the professional perspective of registered nurses 1

    PubMed Central

    Cónsul-Giribet, María; Medina-Moya, José Luis

    2014-01-01

    OBJECTIVE: to identify competency strengths and weaknesses as perceived by nursing professionals who graduated with a integrated curriculum and competency-based through Problem Based Learning in small groups. METHOD: an intrinsic case study method was used, which analyzes this innovation through former students (from the first class) with three years of professional experience. The data were collected through a questionnaire and discussion groups. RESULTS: the results show that their competency level is valued in a very satisfactory manner. This level paradoxically contrasts with the lack of theoretical knowledge they perceived at the end of their education, when they started working in clinical practice. CONCLUSIONS: the teaching strategy was key to motivate an in-depth study and arouse the desire to know. In addition, Problem Based Learning favors and reinforces the decision to learn, which is that necessary in the course of professional life. PMID:25493666

  14. The availability of attentional resources modulates the inhibitory strength related to weakly activated priming.

    PubMed

    Wang, Yongchun; Wang, Yonghui; Liu, Peng; Dai, Dongyang; Di, Meilin; Chen, Qiang

    2016-08-01

    The current study investigated the role of attention in inhibitory processes (the inhibitory processes described in the current study refer only to those associated with masked or flanked priming) using a mixed paradigm involving the negative compatibility effect (NCE) and object-based attention. Accumulating evidence suggests that attention can be spread more easily within the same object, which increases the availability of attentional resources, than across different objects. Accordingly, we manipulated distractor location (with primes presented in the same object versus presented in different objects) together with prime/target compatibility (compatible versus incompatible) and prime-distractor stimulus onset asynchrony (SOA, 23 ms vs 70 ms). The aim was to investigate whether inhibitory processes related to weakly activated priming, which have been previously assumed to be automatic, depend on the availability of attentional resources. The results of Experiment 1 showed a significant NCE for the 70-ms SOA when the prime and distractor were presented in the same object (greater attentional resource availability); however, reversed NCEs were obtained for all other conditions. Experiment 2 was designed to disentangle whether the results of Experiment 1 were affected by the prime position, and the results indicated that the prime position did not modulate the NCE in Experiment 1. Together, these results are consistent with the claim that the availability of attentional resources modulates the inhibitory strength related to weakly activated priming. Specifically, if attentional resources are assigned to the distractor when it is presented in the same object as the prime, the strength of the inhibition elicited by the distractor may increase and reverse the activation elicited by the prime, which could lead to a significant NCE. PMID:27198916

  15. Strengths and weaknesses of in-tube solid-phase microextraction: A scoping review.

    PubMed

    Fernández-Amado, M; Prieto-Blanco, M C; López-Mahía, P; Muniategui-Lorenzo, S; Prada-Rodríguez, D

    2016-02-01

    In-tube solid-phase microextraction (in-tube SPME or IT-SPME) is a sample preparation technique which has demonstrated over time its ability to couple with liquid chromatography (LC), as well as its advantages as a miniaturized technique. However, the in-tube SPME perspectives in the forthcoming years depend on solutions that can be brought to the environmental, industrial, food and biomedical analysis. The purpose of this scoping review is to examine the strengths and weaknesses of this technique during the period 2009 to 2015 in order to identify research gaps that should be addressed in the future, as well as the tendencies that are meant to strengthen the technique. In terms of methodological aspects, this scoping review shows the in-tube SPME strengths in the coupling with LC (LC-mass spectrometry, capillary LC, ultra-high-pressure LC), in the new performances (magnetic IT-SPME and electrochemically controlled in-tube SPME) and in the wide range of development of coatings and capillaries. Concerning the applicability, most in-tube SPME studies (around 80%) carry out environmental and biomedical analyses, a lower number food analyses and few industrial analyses. Some promising studies in proteomics have been performed. The review makes a critical description of parameters used in the optimization of in-tube SPME methods, highlighting the importance of some of them (i.e. type of capillary coatings). Commercial capillaries in environmental analysis and laboratory-prepared capillaries in biomedical analysis have been employed with good results. The most consolidated configuration is in-valve mode, however the cycle mode configuration is frequently chosen for biomedical analysis. This scoping review revealed that some aspects such as the combination of in-tube SPME with other sample treatment techniques for the analysis of solid samples should be developed in depth in the near future.

  16. The global health concept of the German government: strengths, weaknesses, and opportunities.

    PubMed

    Bozorgmehr, Kayvan; Bruchhausen, Walter; Hein, Wolfgang; Knipper, Michael; Korte, Rolf; Razum, Oliver; Tinnemann, Peter

    2014-01-01

    Recognising global health as a rapidly emerging policy field, the German federal government recently released a national concept note for global health politics (July 10, 2013). As the German government could have a significant impact on health globally by making a coherent, evidence-informed, and long-term commitment in this field, we offer an initial appraisal of the strengths, weaknesses, and opportunities for development recognised in this document. We conclude that the national concept is an important first step towards the implementation of a coherent global health policy. However, important gaps were identified in the areas of intellectual property rights and access to medicines. In addition, global health determinants such as trade, economic crises, and liberalisation as well as European Union issues such as the health of migrants, refugees, and asylum seekers are not adequately addressed. Furthermore, little information is provided about the establishment of instruments to ensure an effective inter-ministerial cooperation. Finally, because implementation aspects for the national concept are critical for the success of this initiative, we call upon the newly elected 2013 German government to formulate a global health strategy, which includes a concrete plan of action, a time scale, and measurable goals.

  17. The global health concept of the German government: strengths, weaknesses, and opportunities.

    PubMed

    Bozorgmehr, Kayvan; Bruchhausen, Walter; Hein, Wolfgang; Knipper, Michael; Korte, Rolf; Razum, Oliver; Tinnemann, Peter

    2014-01-01

    Recognising global health as a rapidly emerging policy field, the German federal government recently released a national concept note for global health politics (July 10, 2013). As the German government could have a significant impact on health globally by making a coherent, evidence-informed, and long-term commitment in this field, we offer an initial appraisal of the strengths, weaknesses, and opportunities for development recognised in this document. We conclude that the national concept is an important first step towards the implementation of a coherent global health policy. However, important gaps were identified in the areas of intellectual property rights and access to medicines. In addition, global health determinants such as trade, economic crises, and liberalisation as well as European Union issues such as the health of migrants, refugees, and asylum seekers are not adequately addressed. Furthermore, little information is provided about the establishment of instruments to ensure an effective inter-ministerial cooperation. Finally, because implementation aspects for the national concept are critical for the success of this initiative, we call upon the newly elected 2013 German government to formulate a global health strategy, which includes a concrete plan of action, a time scale, and measurable goals. PMID:24560258

  18. Analysis of the strengths and weaknesses of acid rain electronic data reports

    SciTech Connect

    Schott, J.

    1997-12-31

    Entergy Corporation is a Phase II utility with a fossil generation base composed primarily of natural gas and low sulfur coal. This paper presents an analysis of a large Phase II utility`s continuous emissions monitoring data reported to EPA under Title IV Acid Rain. Electric utilities currently report hourly emissions of NO{sub x}, SO{sub 2}, CO{sub 2}, fuel use, and generation through electronic data reports to EPA. This paper describes strengths and weaknesses of the data reported to EPA as determined through an analysis of 1995 data. Emissions reported by this company under acid rain for SO{sub 2} and NO{sub x} are very different from emissions reported to state agencies for annual emission inventory purposes in past years and will represent a significant break with historic trends. A comparison of emissions has been made of 1995 emissions reported under Electronic Data Reports to the emissions that would have been reported using emission factors and fuel data in past years. In addition, the paper examines the impacts of 40 CFR Part 75 Acid Rain requirements such as missing data substitution and monitor bias adjustments. Measurement system errors including stack flow measurement and false NO{sub x}Lb/MMBtu readings at very low loads are discussed. This paper describes the implications for public policy, compliance, emissions inventories, and business decisions of Part 75 acid rain monitoring and reporting requirements.

  19. Patterns of Cognitive Strengths and Weaknesses: Identification Rates, Agreement, and Validity for Learning Disabilities Identification

    PubMed Central

    Miciak, Jeremy; Fletcher, Jack M.; Stuebing, Karla; Vaughn, Sharon; Tolar, Tammy D.

    2014-01-01

    Purpose Few empirical investigations have evaluated LD identification methods based on a pattern of cognitive strengths and weaknesses (PSW). This study investigated the reliability and validity of two proposed PSW methods: the concordance/discordance method (C/DM) and cross battery assessment (XBA) method. Methods Cognitive assessment data for 139 adolescents demonstrating inadequate response to intervention was utilized to empirically classify participants as meeting or not meeting PSW LD identification criteria using the two approaches, permitting an analysis of: (1) LD identification rates; (2) agreement between methods; and (3) external validity. Results LD identification rates varied between the two methods depending upon the cut point for low achievement, with low agreement for LD identification decisions. Comparisons of groups that met and did not meet LD identification criteria on external academic variables were largely null, raising questions of external validity. Conclusions This study found low agreement and little evidence of validity for LD identification decisions based on PSW methods. An alternative may be to use multiple measures of academic achievement to guide intervention. PMID:24274155

  20. The global health concept of the German government: strengths, weaknesses, and opportunities

    PubMed Central

    Bozorgmehr, Kayvan; Bruchhausen, Walter; Hein, Wolfgang; Knipper, Michael; Korte, Rolf; Razum, Oliver; Tinnemann, Peter

    2014-01-01

    Recognising global health as a rapidly emerging policy field, the German federal government recently released a national concept note for global health politics (July 10, 2013). As the German government could have a significant impact on health globally by making a coherent, evidence-informed, and long-term commitment in this field, we offer an initial appraisal of the strengths, weaknesses, and opportunities for development recognised in this document. We conclude that the national concept is an important first step towards the implementation of a coherent global health policy. However, important gaps were identified in the areas of intellectual property rights and access to medicines. In addition, global health determinants such as trade, economic crises, and liberalisation as well as European Union issues such as the health of migrants, refugees, and asylum seekers are not adequately addressed. Furthermore, little information is provided about the establishment of instruments to ensure an effective inter-ministerial cooperation. Finally, because implementation aspects for the national concept are critical for the success of this initiative, we call upon the newly elected 2013 German government to formulate a global health strategy, which includes a concrete plan of action, a time scale, and measurable goals. PMID:24560258

  1. The relationship between early ego strength and adolescent responses to the threat of nuclear war

    SciTech Connect

    Andrekus, N.J.

    1989-01-01

    Ego resiliency and ego control, measured when subjects were 3 or 4 years old, were related to expectation of war, concern for the future, and activism in response to the threat of nuclear war, measured when subjects were 18 years old. Data from 92 participants in a longitudinal study of ego and cognitive development conducted by Jeanne and Jack Block at the University of California, Berkeley were used to test hypotheses. Assessments with the California Child Q-set, composited across multiple independent observers, provide measures of ego resiliency and ego control. Adolescent interviews regarding the perception of likelihood of nuclear war, how this affects their future, and their antinuclear and general political activism were scaled and rated. Early ego resiliency and ego under control were hypothesized to account for the variance in adolescent nuclear responses and activism. The only significant longitudinal relationships were in the female sample, where ego under control was found to be a significant predictor of both general political activism (p<.01) and ideas of the future being affected by the nuclear threat (p<.05). Among males, the relationship between early ego resiliency and adolescent antinuclear activism approached significance (p<.10). Adolescent personality was significantly related to several measures of nuclear response. In girls, adolescent ego under control related to perception of likelihood of nuclear war (p<.05) and antinuclear activism (p<.05), and the interaction of ego resiliency and ego under control predicted general political activism (p<.0005). In boys, adolescent ego resiliency correlated with antinuclear activism (p<.05). These findings were discussed in terms of antecedent parenting styles, and conceptual links were drawn between children's ego resiliency and security of attachment, perspective taking, and moral development.

  2. Validation of the Chinese Strengths and Weaknesses of ADHD-Symptoms and Normal-Behaviors Questionnaire in Hong Kong

    ERIC Educational Resources Information Center

    Lai, Kelly Y. C.; Leung, Patrick W. L.; Luk, Ernest S. L.; Wong, Ann S. Y.; Law, Lawrence S. C.; Ho, Karen K. Y.

    2013-01-01

    Objective: Unlike rating scales that focus on the severity of ADHD symptoms, the Strengths and Weaknesses of ADHD-Symptoms and Normal-Behaviors (SWAN) rating scale is phrased in neutral or positive terms for carers to compare the index child's behaviors with that of their peers. This study explores its psychometric properties when applied to…

  3. Evaluation of the strengths and weaknesses of community-based education from the viewpoint of students

    PubMed Central

    MOKHTARPOUR, SEDIGHEH; AMINI, MITRA; MOUSAVINEZHAD, HOURI; CHOOBINEH, ALIREZA; NABEIEI, PARISA

    2016-01-01

    Introduction: Responsive medicine is an appropriate training method which trains the graduates who can act effectively in initial and secondary aspects of health issues in the society. Methods: This was a cross-sectional descriptive-analytic study which was done using quantitative method. The target population of this study was all the students of the Nutrition and Health School of Shiraz University of Medical Sciences. The sample was randomly selected in this study and 75 students were selected based on the methodologist’s comments and similar studies and random-number table from a list obtained from the school’s department of education. This questionnaire was a researcher-made one which consisted of 23 questions in 2 sections with 21 closed-ended questions and 2 open-ended questions; 70 questionnaires were completed correctly. The closed-ended questions had 4 aspects (completely agree to completely disagree) answered in 5-point Likert scale type. Its face validity was confirmed by 4 faculty members. The construct validity of the questionnaire was analyzed by factor analysis test and its reliability was assessed by a pilot on 20 students with a Cronbach’s alpha of 0.85. The data were analyzed using descriptive statistical tests (mean, standard deviation, …) and the Pearson coefficient (p<0.001). Results: The results of this study showed that the maximum mean score was 3.58±0.65 which was related to the context of these courses and the minimum mean was 2.66±1.14 which was related to the logbook implementation. The 2 open-ended questions indicated that the most important strengths were the use of logbooks as a guide and determining the minimum training; of the weaknesses was the mismatch between the theoretical education and the practical activities. Also, developing the minimum training that an expert should know and using the common topics related to theoretical education were the most important points mentioned by the respondents. Conclusions: The

  4. The Strength of Weak Identities: Social Structural Sources of Self, Situation and Emotional Experience

    ERIC Educational Resources Information Center

    Smith-Lovin, Lynn

    2007-01-01

    Modern societies are highly differentiated, with relatively uncorrelated socially salient dimensions and a preponderance of weak, unidimensional (as opposed to strong, multiplex) ties. What are the implications of a society with fewer strong ties and more weak ties for the self? What do these changes mean for our emotional experience in everyday…

  5. While Heisenberg Is Not Looking: The Strength of "Weak Measurements" in Educational Research

    ERIC Educational Resources Information Center

    Geelan, David R.

    2015-01-01

    The concept of "weak measurements" in quantum physics is a way of "cheating" the Uncertainty Principle. Heisenberg stated (and 85 years of experiments have demonstrated) that it is impossible to know both the position and momentum of a particle with arbitrary precision. More precise measurements of one decrease the precision…

  6. Scoring the Strengths and Weaknesses of Underage Drinking Laws in the United States

    PubMed Central

    Fell, James C.; Thomas, Sue; Scherer, Michael; Fisher, Deborah A.; Romano, Eduardo

    2015-01-01

    Several studies have examined the impact of a number of minimum legal drinking age 21 (MLDA-21) laws on underage alcohol consumption and alcohol-related crashes in the United States. These studies have contributed to our understanding of how alcohol control laws affect drinking and driving among those who are under age 21. However, much of the extant literature examining underage drinking laws use a “Law/No law” coding which may obscure the variability inherent in each law. Previous literature has demonstrated that inclusion of law strengths may affect outcomes and overall data fit when compared to “Law/No law” coding. In an effort to assess the relative strength of states’ underage drinking legislation, a coding system was developed in 2006 and applied to 16 MLDA-21 laws. The current article updates the previous endeavor and outlines a detailed strength coding mechanism for the current 20 MLDA-21 laws. PMID:26097775

  7. Registration of weak ULF/ELF oscillations of the surface electric field strength

    NASA Astrophysics Data System (ADS)

    Boldyrev, A. I.; Vyazilov, A. E.; Ivanov, V. N.; Kemaev, R. V.; Korovin, V. Ya.; Melyashinskii, A. V.; Pamukhin, K. V.; Panov, V. N.; Shvyrev, Yu. N.

    2016-07-01

    Measurements of the atmospheric electric field strength made by an electrostatic fluxmeter with a unique threshold sensitivity for such devices (6 × 10-2-10-3 V m-1 Hz-1/2 in the 10-3-25 Hz frequency range) and wide dynamic (120 dB) and spectral (0-25 Hz) ranges, are presented. The device parameters make it possible to observe the electric component of global electromagnetic Schumann resonances and long-period fluctuations in the atmospheric electric field strength.

  8. The Strengths, Weaknesses, Opportunities and Threats of Using Social Software in Higher and Further Education Teaching and Learning

    ERIC Educational Resources Information Center

    Schroeder, A.; Minocha, S.; Schneider, C.

    2010-01-01

    Social software is increasingly being used in higher and further education to support teaching and learning processes. These applications provide students with social and cognitive stimulation and also add to the interaction between students and educators. However, in addition to the benefits the introduction of social software into a course…

  9. The expression and interpretation of uncertain forensic science evidence: verbal equivalence, evidence strength, and the weak evidence effect.

    PubMed

    Martire, Kristy A; Kemp, Richard I; Watkins, Ian; Sayle, Malindi A; Newell, Ben R

    2013-06-01

    Standards published by the Association of Forensic Science Providers (2009, Standards for the formulation of evaluative forensic science expert opinion, Science & Justice, Vol. 49, pp. 161-164) encourage forensic scientists to express their conclusions in the form of a likelihood ratio (LR), in which the value of the evidence is conveyed verbally or numerically. In this article, we report two experiments (using undergraduates and Mechanical Turk recruits) designed to investigate how much decision makers change their beliefs when presented with evidence in the form of verbal or numeric LRs. In Experiment 1 (N = 494), participants read a summary of a larceny trial containing inculpatory expert testimony in which evidence strength (low, moderate, high) and presentation method (verbal, numerical) varied. In Experiment 2 (N = 411), participants read the same larceny trial, this time including either exculpatory or inculpatory expert evidence that varied in strength (low, high) and presentation method (verbal, numerical). Both studies found a reasonable degree of correspondence in observed belief change resulting from verbal and numeric formats. However, belief change was considerably smaller than Bayesian calculations would predict. In addition, participants presented with evidence weakly supporting guilt tended to "invert" the evidence, thereby counterintuitively reducing their belief in the guilt of the accused. This "weak evidence effect" was most apparent in the verbal presentation conditions of both experiments, but only when the evidence was inculpatory. These findings raise questions about the interpretability of LRs by jurors and appear to support an expectancy-based account of the weak evidence effect.

  10. A Review of Meta-Analyses in Education: Methodological Strengths and Weaknesses

    ERIC Educational Resources Information Center

    Ahn, Soyeon; Ames, Allison J.; Myers, Nicholas D.

    2012-01-01

    The current review addresses the validity of published meta-analyses in education that determines the credibility and generalizability of study findings using a total of 56 meta-analyses published in education in the 2000s. Our objectives were to evaluate the current meta-analytic practices in education, identify methodological strengths and…

  11. Gifted Students with Spatial Strengths and Sequential Weaknesses: An Overlooked and Underidentified Population

    ERIC Educational Resources Information Center

    Mann, Rebecca L.

    2005-01-01

    Gifted students with spatial strengths are often overlooked and underserved in American schools. These students have remarkable areas of talent but often have verbal learning difficulties that prevent them from being identified for gifted services. This article focuses on definitions of spatial ability, characteristics of these learners, possible…

  12. Strength of weak layers in cascading failures on multiplex networks: case of the international trade network.

    PubMed

    Lee, Kyu-Min; Goh, K-I

    2016-01-01

    Many real-world complex systems across natural, social, and economical domains consist of manifold layers to form multiplex networks. The multiple network layers give rise to nonlinear effect for the emergent dynamics of systems. Especially, weak layers that can potentially play significant role in amplifying the vulnerability of multiplex networks might be shadowed in the aggregated single-layer network framework which indiscriminately accumulates all layers. Here we present a simple model of cascading failure on multiplex networks of weight-heterogeneous layers. By simulating the model on the multiplex network of international trades, we found that the multiplex model produces more catastrophic cascading failures which are the result of emergent collective effect of coupling layers, rather than the simple sum thereof. Therefore risks can be systematically underestimated in single-layer network analyses because the impact of weak layers can be overlooked. We anticipate that our simple theoretical study can contribute to further investigation and design of optimal risk-averse real-world complex systems. PMID:27211291

  13. Strength of weak layers in cascading failures on multiplex networks: case of the international trade network

    PubMed Central

    Lee, Kyu-Min; Goh, K.-I.

    2016-01-01

    Many real-world complex systems across natural, social, and economical domains consist of manifold layers to form multiplex networks. The multiple network layers give rise to nonlinear effect for the emergent dynamics of systems. Especially, weak layers that can potentially play significant role in amplifying the vulnerability of multiplex networks might be shadowed in the aggregated single-layer network framework which indiscriminately accumulates all layers. Here we present a simple model of cascading failure on multiplex networks of weight-heterogeneous layers. By simulating the model on the multiplex network of international trades, we found that the multiplex model produces more catastrophic cascading failures which are the result of emergent collective effect of coupling layers, rather than the simple sum thereof. Therefore risks can be systematically underestimated in single-layer network analyses because the impact of weak layers can be overlooked. We anticipate that our simple theoretical study can contribute to further investigation and design of optimal risk-averse real-world complex systems. PMID:27211291

  14. Strength of weak layers in cascading failures on multiplex networks: case of the international trade network

    NASA Astrophysics Data System (ADS)

    Lee, Kyu-Min; Goh, K.-I.

    2016-05-01

    Many real-world complex systems across natural, social, and economical domains consist of manifold layers to form multiplex networks. The multiple network layers give rise to nonlinear effect for the emergent dynamics of systems. Especially, weak layers that can potentially play significant role in amplifying the vulnerability of multiplex networks might be shadowed in the aggregated single-layer network framework which indiscriminately accumulates all layers. Here we present a simple model of cascading failure on multiplex networks of weight-heterogeneous layers. By simulating the model on the multiplex network of international trades, we found that the multiplex model produces more catastrophic cascading failures which are the result of emergent collective effect of coupling layers, rather than the simple sum thereof. Therefore risks can be systematically underestimated in single-layer network analyses because the impact of weak layers can be overlooked. We anticipate that our simple theoretical study can contribute to further investigation and design of optimal risk-averse real-world complex systems.

  15. The Strengths and Weaknesses of Logic Formalisms to Support Mishap Analysis

    NASA Technical Reports Server (NTRS)

    Johnson, C. W.; Holloway, C. M.

    2002-01-01

    The increasing complexity of many safety critical systems poses new problems for mishap analysis. Techniques developed in the sixties and seventies cannot easily scale-up to analyze incidents involving tightly integrated software and hardware components. Similarly, the realization that many failures have systemic causes has widened the scope of many mishap investigations. Organizations, including NASA and the NTSB, have responded by starting research and training initiatives to ensure that their personnel are well equipped to meet these challenges. One strand of research has identified a range of mathematically based techniques that can be used to reason about the causes of complex, adverse events. The proponents of these techniques have argued that they can be used to formally prove that certain events created the necessary and sufficient causes for a mishap to occur. Mathematical proofs can reduce the bias that is often perceived to effect the interpretation of adverse events. Others have opposed the introduction of these techniques by identifying social and political aspects to incident investigation that cannot easily be reconciled with a logic-based approach. Traditional theorem proving mechanisms cannot accurately capture the wealth of inductive, deductive and statistical forms of inference that investigators routinely use in their analysis of adverse events. This paper summarizes some of the benefits that logics provide, describes their weaknesses, and proposes a number of directions for future research.

  16. Lessons from Dwarf8 on the Strengths and Weaknesses of Structured Association Mapping

    PubMed Central

    Larsson, Sara J.; Lipka, Alexander E.; Buckler, Edward S.

    2013-01-01

    The strengths of association mapping lie in its resolution and allelic richness, but spurious associations arising from historical relationships and selection patterns need to be accounted for in statistical analyses. Here we reanalyze one of the first generation structured association mapping studies of the Dwarf8 (d8) locus with flowering time in maize using the full range of new mapping populations, statistical approaches, and haplotype maps. Because this trait was highly correlated with population structure, we found that basic structured association methods overestimate phenotypic effects in the region, while mixed model approaches perform substantially better. Combined with analysis of the maize nested association mapping population (a multi-family crossing design), it is concluded that most, if not all, of the QTL effects at the general location of the d8 locus are from rare extended haplotypes that include other linked QTLs and that d8 is unlikely to be involved in controlling flowering time in maize. Previous independent studies have shown evidence for selection at the d8 locus. Based on the evidence of population bottleneck, selection patterns, and haplotype structure observed in the region, we suggest that multiple traits may be strongly correlated with population structure and that selection on these traits has influenced segregation patterns in the region. Overall, this study provides insight into how modern association and linkage mapping, combined with haplotype analysis, can produce results that are more robust. PMID:23437002

  17. OECI accreditation of the European Institute of Oncology of Milan: strengths and weaknesses.

    PubMed

    Deriu, Pietro L; Basso, Silvia; Mastrilli, Fabrizio; Orecchia, Roberto

    2015-01-01

    The European Institute of Oncology began the process to reach the accreditation promoted by the Organisation of European Cancer Institutes (OECI) in 2012. This accreditation integrates the quality and safety path started in 2001 with accreditation by the Joint Commission International. Despite the presence of diversified accreditations and certifications and the clear need of time, effort, and commitment, the models are complementary. Each model is not to be considered as an end but as a tool for improvement: e.g., mixing accreditation standards led to an improvement in the quality and safety of processes. The present article details the OECI accreditation experience of the European Institute of Oncology, in particular the following strengths of OECI standards: collaboration among several involved parties (patient, volunteer, patient's general practitioner) in the clinical and quality/safety processes; a larger involvement of support personnel (psycho-oncologists, dieticians, physical therapists); and the development of clinical/translational research and innovation in prevention, diagnosis, and treatment to guarantee the best available practice in diagnosis and treatment. The OECI accreditation is specific to oncology and therefore its standards are tailored to a cancer center, both in terms of language used in the standards manual and in terms of patient needs. The OECI accreditation system puts an auditor team with a standards manual in charge of verifying quality and confirms the definition of IEO as a Comprehensive Cancer Center. PMID:27096268

  18. Weak hydrogen bridges: a systematic theoretical study on the nature and strength of C--H...F--C interactions.

    PubMed

    Hyla-Kryspin, Isabella; Haufe, Günter; Grimme, Stefan

    2004-07-19

    We present a comparative study on the nature and strength of weak hydrogen bonding between the C(sp3)-H, C(sp2)-H, and C(sp)-H donor bonds and F-C(sp3) acceptors. The series of molecules CH3F.CH4 (2 a, 2 b), CH3F.C2H4 (3), CH3F.C2H2 (4), as well as model complexes of experimentally characterized 2-fluoro-2-phenylcyclopropane derivatives, C3H6.C3H5F (5 a, 5 b) and C3H5F.C3H5F (6) were investigated. Comparative studies were also performed for two conformers of the methane dimer (1 a, 1 b). The calculations were carried out in hierarchies of basis sets [SV(d,p), TZV(d,p), aug-TZV(d,p), TZV(2df,2pd), aug-TZV(2df,2pd), QZV(3d2fg,2pd), aug-QZV(3d2fg,2pdf)] by means of ab initio [HF, MP2, QCISD, QCISD(T)] methods and density functional theory (DFT/B3LYP, DFT/PBE). It is shown that well-balanced basis sets of at least TZV(2df,2pd) quality are needed for a proper description of the weakly bonded systems. In the case of 2, 3, 5, and 6, the dispersion interaction is the dominant term of the entire attraction, which is not accounted for at the B3LYP level. Significant electrostatic contributions are observed for 6 and 3. For 4, these forces have a dominating contribution to the hydrogen bonding. The C(sp)--H...F--C(sp(3)) interaction in 4, though weak, exhibits the same characteristics as conventional hydrogen bridges. Despite showing longer H.F/H contacts compared to 1 a, 2 a, and 5 a the bifurcated structures, 1 b, 2 b, 5 b, are characterized by larger dispersion interactions leading to stronger bonding. For the systems with only one H.F contact, the MP2/QZV(3d2fg,2pd) interaction energy increases in the order 2 a (-1.62 kJ mol(-1)), 3 (-2.79 kJ mol(-1)), 5 a (-5.97 kJ mol(-1)), 4 (-7.25 kJ mol(-1)), and 6 (-10.02 kJ mol(-1)). This contradicts the estimated proton donor ability of the C--H bonds (2 a<5 a<3<6<4).

  19. The Effect of Achievement Test Selection on Identification of Learning Disabilities within a Patterns of Strengths and Weaknesses Framework

    PubMed Central

    Miciak, Jeremy; Taylor, Pat; Denton, Carolyn A.; Fletcher, Jack M.

    2014-01-01

    Purpose Few empirical investigations have evaluated learning disabilities (LD) identification methods based on a pattern of cognitive strengths and weaknesses (PSW). This study investigated the reliability of LD classification decisions of the concordance/discordance method (C/DM) across different psychoeducational assessment batteries. Methods C/DM criteria were applied to assessment data from 177 second grade students based on two psychoeducational assessment batteries. The achievement tests were different, but were highly correlated and measured the same latent construct. Resulting LD identifications were then evaluated for agreement across batteries on LD status and the academic domain of eligibility. Results The two batteries identified a similar number of participants as having LD (80 and 74). However, indices of agreement for classification decisions were low (kappa = .29), especially for percent positive agreement (62%). The two batteries demonstrated agreement on the academic domain of eligibility for only 25 participants. Conclusions Cognitive discrepancy frameworks for LD identification are inherently unstable because of imperfect reliability and validity at the observed level. Methods premised on identifying a PSW profile may never achieve high reliability because of these underlying psychometric factors. An alternative is to directly assess academic skills to identify students in need of intervention. PMID:25243467

  20. A Study of Strengths and Weaknesses of Descriptive Assessment from Principals, Teachers and Experts Points of View in Chaharmahal and Bakhteyari Primary Schools

    ERIC Educational Resources Information Center

    Sharief, Mostafa; Naderi, Mahin; Hiedari, Maryam Shoja; Roodbari, Omolbanin; Jalilvand, Mohammad Reza

    2012-01-01

    The aim of current study is to determine the strengths and weaknesses of descriptive evaluation from the viewpoint of principals, teachers and experts of Chaharmahal and Bakhtiari province. A descriptive survey was performed. Statistical population includes 208 principals, 303 teachers, and 100 executive experts of descriptive evaluation scheme in…

  1. Wildfire Prevention and Suppression plans enhancing: a first overview on strength and weakness in Italian stakeholders experiences and perception.

    NASA Astrophysics Data System (ADS)

    Bonora, Laura; Conese, Claudio; Barbati, Anna

    2014-05-01

    Fires and wildfires represent an element of vulnerability for forests, considering that have now reached a level beyond which further burning would seriously endanger the ecosystem services and their sustainable management. It is fundamental to support fire-fighting Centres by giving them tools, useful to faces future trends; in this sense the first step is to examine technical and operative procedures to evaluate their strong and weak aspects, in collaboration with personnel responsible of risk management, suppression coordination and patrol responsible of direct attack. The aims this work is to identify present elements of strength ad problematic aspects to tuning the wildfire suppression actions to future changes; this is a crucial challenge both for policy and territory planners and managers. Historical investigation lines on forest fire covered the basilar and fundamental dynamics which understanding was necessary to confine and fight the wildfire phenomenon. At the present all the competences, knowledge and connections acquired are translating and including in the Plans, sharing innovative strategies -with the "direct involved actors"- trying to decrease the fire trend. Stakeholders underlined that collaboration between research and territorial Institutions are producing positive results, showing the conceptual rightness and the well-run of the in-progress implementations. The Italian framework of wildfire prevention plans is very peculiar because the Plans related to prevention and active intervention procedure are coincident. Normative, procedural, economic and logistic aspects are considered and handled in the same general document; each year the local structures, designed by the Regions, have in charge the draft of the operative plan, defining and managing the means and patrols distribution and turnover. In the present work 3 Italian Regions (Tuscany, Puglia and Sardinia, with different territorial and vegetation characteristics and affected by different

  2. AERONET-OC: Strengths and Weaknesses of a Network for the Validation of Satellite Coastal Radiometric Products

    NASA Technical Reports Server (NTRS)

    Zibordi, Giuseppe; Holben, Brent; Slutsker, Ilya; Giles, David; D'Alimonte, Davide; Melin, Frederic; Berthon, Jean-Francois; Vandemark, Doug; Feng, Hui; Schuster, Gregory; Fabbri, Bryan E.; Kaitala, Seppo; Seppala, Jukka

    2008-01-01

    The Ocean Color component of the Aerosol Robotic Network (AERONET-OC) has been implemented to support long-term satellite ocean color investigations through cross-site consistent and accurate measurements collected by autonomous radiometer systems deployed on offshore fixed platforms. The ultimate purpose of AERONET-OC is the production of standardized measurements performed at different sites with identical measuring systems and protocols, calibrated using a single reference source and method, and processed with the same code. The AERONET-OC primary data product is the normalized water leaving radiance determined at center-wavelengths of interest for satellite ocean color applications, with an uncertainty lower than 5% in the blue-green spectral regions and higher than 8% in the red. Measurements collected at 6 sites counting the northern Adriatic Sea, the Baltic Proper, the Gulf of Finland, the Persian Gulf, and, the northern and southern margins of the Middle Atlantic Bay, have shown the capability of producing quality assured data over a wide range of bio-optical conditions including Case-2 yellow substance- and sedimentdominated waters. This work briefly introduces network elements like: deployment sites, measurement method, instrument calibration, processing scheme, quality-assurance, uncertainties, data archive and products accessibility. Emphases is given to those elements which underline the network strengths (i.e., mostly standardization of any network element) and its weaknesses (i.e., the use of consolidated, but old-fashioned technology). The work also addresses the application of AERONET-OC data to the validation of primary satellite radiometric products over a variety of complex coastal waters and finally provides elements for the identification of new deployment sites most suitable to support satellite ocean color missions.

  3. Strengths and weaknesses of weak-strong cluster problems: A detailed overview of state-of-the-art classical heuristics versus quantum approaches

    NASA Astrophysics Data System (ADS)

    Mandrà, Salvatore; Zhu, Zheng; Wang, Wenlong; Perdomo-Ortiz, Alejandro; Katzgraber, Helmut G.

    2016-08-01

    To date, a conclusive detection of quantum speedup remains elusive. Recently, a team by Google Inc. [V. S. Denchev et al., Phys. Rev. X 6, 031015 (2016), 10.1103/PhysRevX.6.031015] proposed a weak-strong cluster model tailored to have tall and narrow energy barriers separating local minima, with the aim to highlight the value of finite-range tunneling. More precisely, results from quantum Monte Carlo simulations as well as the D-Wave 2X quantum annealer scale considerably better than state-of-the-art simulated annealing simulations. Moreover, the D-Wave 2X quantum annealer is ˜108 times faster than simulated annealing on conventional computer hardware for problems with approximately 103 variables. Here, an overview of different sequential, nontailored, as well as specialized tailored algorithms on the Google instances is given. We show that the quantum speedup is limited to sequential approaches and study the typical complexity of the benchmark problems using insights from the study of spin glasses.

  4. Gamow-Teller strength distributions and stellar weak-interaction rates for ^{76}Ge and ^{82}Se using the deformed pn-QRPA model

    NASA Astrophysics Data System (ADS)

    Nabi, Jameel-Un; Ishfaq, Mavra

    2016-07-01

    We calculate Gamow-Teller strength distributions for β β-decay nuclei ^{76}Ge and ^{82}Se using the deformed pn-QRPA model. We use a deformed Nilsson basis and consider pairing correlations within the deformed BCS theory. Ground state correlations and two-particle and two-hole mixing states were included in our pn-QRPA model. Our calculated strength distributions were compared with experimental data and previous calculation. The total Gamow-Teller strength and centroid placement calculated in our model compares well with the measured value. We calculate β-decay and positron capture rates on ^{76}Ge and ^{82}Se in supernovae environments and compare them to those obtained from experimental data and previous calculation. Our study shows that positron capture rates command the total weak rates at high stellar temperatures. We also calculate energy rates of β-delayed neutrons and their emission probabilities.

  5. Supraspinatus and infraspinatus weakness in overhead athletes with scapular dyskinesis: strength assessment before and after restoration of scapular musculature balance.

    PubMed

    Merolla, Giovanni; De Santis, Elisa; Campi, Fabrizio; Paladini, Paolo; Porcellini, Giuseppe

    2010-12-01

    A disturbance in scapulohumeral rhythm may cause negative biomechanic effects on rotator cuff (RC). Alteration in scapular motion and shoulder pain can influence RC strength. Purpose of this study was to assess supraspinatus and infraspinatus strength in 29 overhead athletes with scapular dyskinesis, before and after 3 and 6 months of rehabilitation aimed to restore scapular musculature balance. A passive posterior soft tissues stretching was prescribed to balance shoulder mobility. Scapular dyskinesis patterns were evaluated according to Kibler et al. Clinical assessment was performed with the empty can (EC) test and infraspinatus strength test (IST). Strength values were recorded by a dynamometer; scores for pain were assessed with VAS scale. Changes of shoulder IR were measured. The force values increased at 3 months (P < 0.01) and at 6 months (P < 0.01). Changes of glenohumeral IR and decrease in pain scores were found at both follow-up. Outcomes registered on pain and strength confirm the role of a proper scapular position for an optimal length-tension relationship of the RC muscles. These data should encourage those caring for athletes to consider restoring of scapular musculature balance as essential part of the athletic training. PMID:21069487

  6. Strength and weaknesses of modeling the dynamics of mode-locked lasers by means of collective coordinates

    NASA Astrophysics Data System (ADS)

    Alsaleh, M.; Mback, C. B. L.; Tchomgo Felenou, E.; Tchofo Dinda, P.; Grelu, Ph; Porsezian, K.

    2016-07-01

    We address the efficiency of theoretical tools used in the development and optimization of mode-locked fiber lasers. Our discussion is based on the practical case of modeling the dynamics of a dispersion-managed fiber laser. One conventional approach uses discrete propagation equations, followed by the analysis of the numerical results through a collective coordinate projection. We compare the latter with our dynamical collective coordinate approach (DCCA), which combines both modeling and analysis in a compact form. We show that for single pulse dynamics, the DCCA allows a much quicker solution mapping in the space of cavity parameters than the conventional approach, along with a good accuracy. We also discuss the weaknesses of the DCCA, in particular when multiple pulsing bifurcations occur.

  7. Time-resolved carrier dynamics and electron-phonon coupling strength in proximized weak ferromagnet-superconductor nanobilayers

    NASA Astrophysics Data System (ADS)

    Taneda, T.; Pepe, G. P.; Parlato, L.; Golubov, A. A.; Sobolewski, Roman

    2007-05-01

    We present our femtosecond optical pump-probe studies of proximized ferromagnet-superconductor nanobilayers. The weak ferromagnetic nature of a thin NiCu film makes it possible to observe the dynamics of the nonequilibrium carriers through the near-surface optical reflectivity change measurements. The subpicosecond biexponential reflectivity decay has been identified as electron-phonon Debye and acoustic phonon relaxation times, and the decay of Debye phonons versus temperature dependence was used to evaluate the electron-phonon coupling constants for both the pure Nb and proximized Nb/NiCu heterostructures down to low temperatures. We have also demonstrated that the NiCu overlay on top of Nb dramatically reduced the slow, bolometric component of the photoresponse component, making such bilayers attractive for future radiation detector applications.

  8. Threats and vulnerabilities

    NASA Astrophysics Data System (ADS)

    Ahonen, Pasi; Alahuhta, Petteri; Daskala, Barbara; Delaitre, Sabine; Hert, Paul De; Lindner, Ralf; Maghiros, Ioannis; Moscibroda, Anna; Schreurs, Wim; Verlinden, Michiel

    In this chapter, we present a review of threats and vulnerabilities that could afflict society and individuals in the AmI world in the context of the key policy issues of privacy, identity, trust, security and digital divide. We define a threat as the potential for one or more unwanted consequences caused by a circumstance, capability, action or event that could be harmful to a system or person. Threats can be caused naturally, accidentally or intentionally. In essence, a threat is a ubiquitous phenomenon. A vulnerability is a flaw or weakness in a system's design, its implementation, operation or management that could be exploited to violate the system and, consequently, cause a threat. Vulnerabilities may have different dimensions: technical, functional or behavioural.1

  9. Studies of a weak polyampholyte at the air-buffer interface: The effect of varying pH and ionic strength

    NASA Astrophysics Data System (ADS)

    Cicuta, Pietro; Hopkinson, Ian

    2001-05-01

    We have carried out experiments to probe the static and dynamic interfacial properties of β-casein monolayers spread at the air-buffer interface, and analyzed these results in the context of models of weak polyampholytes. Measurements have been made systematically over a wide range of ionic strength and pH. In the semidilute regime of surface concentration a scaling exponent, which can be linked to the degree of chain swelling, is found. This shows that at pH close to the isoelectric point, the protein is compact. At pH away from the isoelectric pH the protein is extended. The transition between compact and extended states is continuous. As a function of increasing ionic strength, we observe swelling of the protein at the isoelectric pH but contraction of the protein at pH values away from it. These behaviors are typical of a those predicted theoretically for a weak polyampholyte. Dilational moduli measurements, made as a function of surface concentration exhibit maxima that are linked to the collapse of hydrophilic regions of the protein into the subphase. Based on this data we present a configuration map of the protein configuration in the monolayer. These findings are supported by strain (surface pressure) relaxation measurements and surface quasielastic light scattering measurements which suggest the existence of loops and tails in the subphase at higher surface concentrations.

  10. The Application of Strengths, Weaknesses, Opportunities and Threats (SWOT) Analysis for Managing Vocational and Technical Education (VTE) Programmes for Improved Efficiency in Nigeria

    ERIC Educational Resources Information Center

    Adepoju, T. L.; Famade, Olu Adesola

    2010-01-01

    This paper reviews the current status of vocational and technical education programmes (VTE) in Nigeria and the major innovations of the Nigerian Government in the recent times in the sector vis-a-vis the demands of the modern world for vocational and technological development. It therefore, proposes a paradigm shift in the operation of VTE…

  11. Biological Threats

    MedlinePlus

    ... Thunderstorms & Lightning Tornadoes Tsunamis Volcanoes Wildfires Main Content Biological Threats Biological agents are organisms or toxins that ... Centers for Disease Control and Prevention . Before a Biological Threat Unlike an explosion, a biological attack may ...

  12. The Reliability and Validity of the English and Spanish Strengths and Weaknesses of ADHD and Normal Behavior Rating Scales in a Preschool Sample: Continuum Measures of Hyperactivity and Inattention

    ERIC Educational Resources Information Center

    Lakes, Kimberley D.; Swanson, James M.; Riggs, Matt

    2012-01-01

    Objective: To evaluate the reliability and validity of the English and Spanish versions of the Strengths and Weaknesses of ADHD-symptom and Normal-behavior (SWAN) rating scale. Method: Parents of preschoolers completed both a SWAN and the well-established Strengths and Difficulties Questionnaire (SDQ) on two separate occasions over a span of 3…

  13. Stereotype Threat.

    PubMed

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  14. Spatial Noise in Coupling Strength and Natural Frequency within a Pacemaker Network; Consequences for Development of Intestinal Motor Patterns According to a Weakly Coupled Phase Oscillator Model.

    PubMed

    Parsons, Sean P; Huizinga, Jan D

    2016-01-01

    Pacemaker activities generated by networks of interstitial cells of Cajal (ICC), in conjunction with the enteric nervous system, orchestrate most motor patterns in the gastrointestinal tract. It was our objective to understand the role of network features of ICC associated with the myenteric plexus (ICC-MP) in the shaping of motor patterns of the small intestine. To that end, a model of weakly coupled oscillators (oscillators influence each other's phase but not amplitude) was created with most parameters derived from experimental data. The ICC network is a uniform two dimensional network coupled by gap junctions. All ICC generate pacemaker (slow wave) activity with a frequency gradient in mice from 50/min at the proximal end of the intestine to 40/min at the distal end. Key features of motor patterns, directly related to the underlying pacemaker activity, are frequency steps and dislocations. These were accurately mimicked by reduction of coupling strength at a point in the chain of oscillators. When coupling strength was expressed as a product of gap junction density and conductance, and gap junction density was varied randomly along the chain (i.e., spatial noise) with a long-tailed distribution, plateau steps occurred at pointsof low density. As gap junction conductance was decreased, the number of plateaus increased, mimicking the effect of the gap junction inhibitor carbenoxolone. When spatial noise was added to the natural interval gradient, as gap junction conductance decreased, the number of plateaus increased as before but in addition the phase waves frequently changed direction of apparent propagation, again mimicking the effect of carbenoxolone. In summary, key features of the motor patterns that are governed by pacemaker activity may be a direct consequence of biological noise, specifically spatial noise in gap junction coupling and pacemaker frequency. PMID:26869875

  15. Spatial Noise in Coupling Strength and Natural Frequency within a Pacemaker Network; Consequences for Development of Intestinal Motor Patterns According to a Weakly Coupled Phase Oscillator Model

    PubMed Central

    Parsons, Sean P.; Huizinga, Jan D.

    2016-01-01

    Pacemaker activities generated by networks of interstitial cells of Cajal (ICC), in conjunction with the enteric nervous system, orchestrate most motor patterns in the gastrointestinal tract. It was our objective to understand the role of network features of ICC associated with the myenteric plexus (ICC-MP) in the shaping of motor patterns of the small intestine. To that end, a model of weakly coupled oscillators (oscillators influence each other's phase but not amplitude) was created with most parameters derived from experimental data. The ICC network is a uniform two dimensional network coupled by gap junctions. All ICC generate pacemaker (slow wave) activity with a frequency gradient in mice from 50/min at the proximal end of the intestine to 40/min at the distal end. Key features of motor patterns, directly related to the underlying pacemaker activity, are frequency steps and dislocations. These were accurately mimicked by reduction of coupling strength at a point in the chain of oscillators. When coupling strength was expressed as a product of gap junction density and conductance, and gap junction density was varied randomly along the chain (i.e., spatial noise) with a long-tailed distribution, plateau steps occurred at pointsof low density. As gap junction conductance was decreased, the number of plateaus increased, mimicking the effect of the gap junction inhibitor carbenoxolone. When spatial noise was added to the natural interval gradient, as gap junction conductance decreased, the number of plateaus increased as before but in addition the phase waves frequently changed direction of apparent propagation, again mimicking the effect of carbenoxolone. In summary, key features of the motor patterns that are governed by pacemaker activity may be a direct consequence of biological noise, specifically spatial noise in gap junction coupling and pacemaker frequency. PMID:26869875

  16. Predicted and measured concentrations of pharmaceuticals in hospital effluents. Examination of the strengths and weaknesses of the two approaches through the analysis of a case study.

    PubMed

    Verlicchi, Paola; Zambello, Elena

    2016-09-15

    This study deals with the chemical characterization of hospital effluents in terms of the predicted and measured concentrations of 38 pharmaceuticals belonging to 11 different therapeutic classes. The paper outlines the strengths and weaknesses of the two approaches through an analysis of a case study referring to a large hospital. It highlights the observed (and expected) ranges of variability for the parameters of the adopted model, presents the results of an uncertainty analysis of direct measurements (due to sampling mode and frequency and chemical analysis) and a sensitivity analysis of predicted concentrations (based on the annual consumption of pharmaceuticals, their excretion rate and annual wastewater volume generated by the hospital). Measured concentrations refer to two sampling campaigns carried out in summer and winter in order to investigate seasonal variability of the selected compounds. Predicted concentrations are compared to measured ones in the three scenarios: summer, winter and the whole year. It was found that predicted and measured concentrations are in agreement for a limited number of compounds (namely atenolol, atorvastatin and hydrochlorothiazide), and for most compounds the adoption of the model leads to a large overestimation in all three periods. Uncertainties in predictions are mainly due to the wastewater volume and excretion factor, whereas for measured concentrations, uncertainties are mainly due to sampling mode. PMID:27161130

  17. Facing ambiguous threats.

    PubMed

    Roberto, Michael A; Bohmer, Richard M J; Edmondson, Amy C

    2006-11-01

    On February 1, 2003, the world watched in horror as the Columbia space shuttle broke apart while reentering the earth's atmosphere, killing all seven astronauts. Some have argued that NASA's failure to respond with appropriate intensity to the so-called foam strike that led to the accident was evidence of irresponsible or incompetent management. The authors' research, however, suggests that NASA was exhibiting a natural, albeit unfortunate, pattern of behavior common in many organizations. The foam strike is a prime example of what the authors call an ambiguous threat-a signal that may or may not portend future harm. Ambiguous threats differ from threats with obvious causes-say, a fire in the building-for which the response is clear. They also differ from unmistakable threats that may lack straightforward response paths (such as the frightening oxygen-tank explosion aboard Apollo 13). However, when the warning sign is ambiguous and the threat's potential effect is unclear, managers may choose to ignore or discount the risk. Such an approach can be catastrophic. Firms that do a good job of dealing with ambiguous threats do not improvise during a crisis; rather, they apply a rigorous set of detection and response capabilities that they have developed and practiced beforehand. In this article, the authors outline how to put such capabilities in place long before a crisis strikes. First, companies need to hone their teamwork and rapid problem-solving skills through practice. Second, they must learn to recognize weak signals, amplify the threat, and encourage employees to ask disconcerting "what if" questions in a safe environment. Finally, they should explore possible responses to threats through quick, low-cost experimentation.

  18. Facing ambiguous threats.

    PubMed

    Roberto, Michael A; Bohmer, Richard M J; Edmondson, Amy C

    2006-11-01

    On February 1, 2003, the world watched in horror as the Columbia space shuttle broke apart while reentering the earth's atmosphere, killing all seven astronauts. Some have argued that NASA's failure to respond with appropriate intensity to the so-called foam strike that led to the accident was evidence of irresponsible or incompetent management. The authors' research, however, suggests that NASA was exhibiting a natural, albeit unfortunate, pattern of behavior common in many organizations. The foam strike is a prime example of what the authors call an ambiguous threat-a signal that may or may not portend future harm. Ambiguous threats differ from threats with obvious causes-say, a fire in the building-for which the response is clear. They also differ from unmistakable threats that may lack straightforward response paths (such as the frightening oxygen-tank explosion aboard Apollo 13). However, when the warning sign is ambiguous and the threat's potential effect is unclear, managers may choose to ignore or discount the risk. Such an approach can be catastrophic. Firms that do a good job of dealing with ambiguous threats do not improvise during a crisis; rather, they apply a rigorous set of detection and response capabilities that they have developed and practiced beforehand. In this article, the authors outline how to put such capabilities in place long before a crisis strikes. First, companies need to hone their teamwork and rapid problem-solving skills through practice. Second, they must learn to recognize weak signals, amplify the threat, and encourage employees to ask disconcerting "what if" questions in a safe environment. Finally, they should explore possible responses to threats through quick, low-cost experimentation. PMID:17131567

  19. Emergicenters. Opportunity or threat?

    PubMed

    Meyer, L C

    1983-01-01

    Political, social, and economic pressures on the healthcare industry are resulting in the development of new approaches to the delivery of quality health care to consumers. One of the newest responses to these change forces has been the development and proliferation of freestanding emergency centers. This article examines the underlying causes behind their development, describes the distinct services and strengths of the "emergicenter" concept, and shows how medical group practices can turn a potential competitive threat into an opportunity for future growth.

  20. Strengths and weaknesses of Global Positioning System (GPS) data-loggers and semi-structured interviews for capturing fine-scale human mobility: findings from Iquitos, Peru.

    PubMed

    Paz-Soldan, Valerie A; Reiner, Robert C; Morrison, Amy C; Stoddard, Steven T; Kitron, Uriel; Scott, Thomas W; Elder, John P; Halsey, Eric S; Kochel, Tadeusz J; Astete, Helvio; Vazquez-Prokopec, Gonzalo M

    2014-06-01

    Quantifying human mobility has significant consequences for studying physical activity, exposure to pathogens, and generating more realistic infectious disease models. Location-aware technologies such as Global Positioning System (GPS)-enabled devices are used increasingly as a gold standard for mobility research. The main goal of this observational study was to compare and contrast the information obtained through GPS and semi-structured interviews (SSI) to assess issues affecting data quality and, ultimately, our ability to measure fine-scale human mobility. A total of 160 individuals, ages 7 to 74, from Iquitos, Peru, were tracked using GPS data-loggers for 14 days and later interviewed using the SSI about places they visited while tracked. A total of 2,047 and 886 places were reported in the SSI and identified by GPS, respectively. Differences in the concordance between methods occurred by location type, distance threshold (within a given radius to be considered a match) selected, GPS data collection frequency (i.e., 30, 90 or 150 seconds) and number of GPS points near the SSI place considered to define a match. Both methods had perfect concordance identifying each participant's house, followed by 80-100% concordance for identifying schools and lodgings, and 50-80% concordance for residences and commercial and religious locations. As the distance threshold selected increased, the concordance between SSI and raw GPS data increased (beyond 20 meters most locations reached their maximum concordance). Processing raw GPS data using a signal-clustering algorithm decreased overall concordance to 14.3%. The most common causes of discordance as described by a sub-sample (n=101) with whom we followed-up were GPS units being accidentally off (30%), forgetting or purposely not taking the units when leaving home (24.8%), possible barriers to the signal (4.7%) and leaving units home to recharge (4.6%). We provide a quantitative assessment of the strengths and weaknesses of

  1. Evaluation and intercomparison of downscaled daily precipitation indices over Japan in present-day climate: Strengths and weaknesses of dynamical and bias correction-type statistical downscaling methods

    NASA Astrophysics Data System (ADS)

    Iizumi, Toshichika; Nishimori, Motoki; Dairaku, Koji; Adachi, Sachiho A.; Yokozawa, Masayuki

    2011-01-01

    In this study, we evaluate the accuracy of four regional climate models (NHRCM, NRAMS, TRAMS, and TWRF) and one bias correction-type statistical model (CDFDM) for daily precipitation indices under the present-day climate (1985-2004) over Japan on a 20 km grid interval. The evaluated indices are (1) mean precipitation, (2) number of days with precipitation ≥1 mm/d (corresponds to number of wet days), (3) mean amount per wet day, (4) 90th percentile of daily precipitation, and (5) number of days with precipitation ≥90th percentile of daily precipitation. The boundary conditions of the dynamical models and the predictors of the statistical model are given from the single reanalysis data, i.e., JRA25. Both types of models successfully improved the accuracy of the indices relative to the reanalysis data in terms of bias, seasonal cycle, geographical pattern, cumulative distribution function of wet-day amount, and interannual variation pattern. In most aspects, NHRCM is the best model of all indices. Through the intercomparison between the dynamical and statistical models, respective strengths and weaknesses emerged. Briefly, (1) many dynamical models simulate too many wet days with a small amount of precipitation in humid climate zones, such as summer in Japan, relative to the statistical model, unless the cumulus convection scheme improved for such a condition is incorporated; (2) a few dynamical models can derive a better high-order percentile of daily precipitation (e.g., 90th percentile) than the statistical model; (3) both the dynamical and statistical models are still insufficient in the representation of the interannual variation pattern of the number of days with precipitation ≥90th percentile of daily precipitation; (4) the statistical model is comparable to the dynamical models in the long-term mean geographical pattern of the indices even on a 20 km grid interval if a dense observation network is applicable; (5) the statistical model is less accurate

  2. Strengths and Weaknesses of Global Positioning System (GPS) Data-Loggers and Semi-structured Interviews for Capturing Fine-scale Human Mobility: Findings from Iquitos, Peru

    PubMed Central

    Paz-Soldan, Valerie A.; Reiner, Robert C.; Morrison, Amy C.; Stoddard, Steven T.; Kitron, Uriel; Scott, Thomas W.; Elder, John P.; Halsey, Eric S.; Kochel, Tadeusz J.; Astete, Helvio; Vazquez-Prokopec, Gonzalo M.

    2014-01-01

    Quantifying human mobility has significant consequences for studying physical activity, exposure to pathogens, and generating more realistic infectious disease models. Location-aware technologies such as Global Positioning System (GPS)-enabled devices are used increasingly as a gold standard for mobility research. The main goal of this observational study was to compare and contrast the information obtained through GPS and semi-structured interviews (SSI) to assess issues affecting data quality and, ultimately, our ability to measure fine-scale human mobility. A total of 160 individuals, ages 7 to 74, from Iquitos, Peru, were tracked using GPS data-loggers for 14 days and later interviewed using the SSI about places they visited while tracked. A total of 2,047 and 886 places were reported in the SSI and identified by GPS, respectively. Differences in the concordance between methods occurred by location type, distance threshold (within a given radius to be considered a match) selected, GPS data collection frequency (i.e., 30, 90 or 150 seconds) and number of GPS points near the SSI place considered to define a match. Both methods had perfect concordance identifying each participant's house, followed by 80–100% concordance for identifying schools and lodgings, and 50–80% concordance for residences and commercial and religious locations. As the distance threshold selected increased, the concordance between SSI and raw GPS data increased (beyond 20 meters most locations reached their maximum concordance). Processing raw GPS data using a signal-clustering algorithm decreased overall concordance to 14.3%. The most common causes of discordance as described by a sub-sample (n = 101) with whom we followed-up were GPS units being accidentally off (30%), forgetting or purposely not taking the units when leaving home (24.8%), possible barriers to the signal (4.7%) and leaving units home to recharge (4.6%). We provide a quantitative assessment of the strengths and

  3. Tips from the toolkit: 2--assessing organisational strengths.

    PubMed

    Steer, Neville

    2010-03-01

    'SWOT' is a familiar term used in the development of business strategy. It is based on the identification of strengths, weaknesses, opportunities and threats as part of a strategic analysis approach. While there are a range of more sophisticated models for analysing and developing business strategy, it is a useful model for general practice as it is less time consuming than other approaches. The following article discusses some ways to apply this framework to assess organisational strengths (and weaknesses). It is based on The Royal Australian College of General Practitioners' "General practice management toolkit".

  4. Parallel inhibition of active force and relaxed fiber stiffness by caldesmon fragments at physiological ionic strength and temperature conditions: additional evidence that weak cross-bridge binding to actin is an essential intermediate for force generation.

    PubMed Central

    Kraft, T; Chalovich, J M; Yu, L C; Brenner, B

    1995-01-01

    Previously we showed that stiffness of relaxed fibers and active force generated in single skinned fibers of rabbit psoas muscle are inhibited in parallel by actin-binding fragments of caldesmon, an actin-associated protein of smooth muscle, under conditions in which a large fraction of cross-bridges is weakly attached to actin (ionic strength of 50 mM and temperature of 5 degrees C). These results suggested that weak cross-bridge attachment to actin is essential for force generation. The present study provides evidence that this is also true for physiological ionic strength (170 mM) at temperatures up to 30 degrees C, suggesting that weak cross-bridge binding to actin is generally required for force generation. In addition, we show that the inhibition of active force is not a result of changes in cross-bridge cycling kinetics but apparently results from selective inhibition of weak cross-bridge binding to actin. Together with our previous biochemical, mechanical, and structural studies, these findings support the proposal that weak cross-bridge attachment to actin is an essential intermediate on the path to force generation and are consistent with the concept that isometric force mainly results from an increase in strain of the attached cross-bridge as a result of a structural change associated with the transition from a weakly bound to a strongly bound actomyosin complex. This mechanism is different from the processes responsible for quick tension recovery that were proposed by Huxley and Simmons (Proposed mechanism of force generation in striated muscle. Nature. 233:533-538.) to represent the elementary mechanism of force generation. Images FIGURE 1 PMID:7647245

  5. From Weakness to Strength: C-H/π-Interaction-Guided Self-Assembly and Gelation of Poly(benzyl ether) Dendrimers.

    PubMed

    Peng, Yi; Feng, Yu; Deng, Guo-Jun; He, Yan-Mei; Fan, Qing-Hua

    2016-09-13

    The C-H/π interactions as the key driving force for the construction of supramolecular gels remain a great challenge because of their weak nature. We hereby employed for the first time weak C-H/π interactions for the construction of supramolecular dendritic gels based on peripherally methyl-functionalized poly(benzyl ether) dendrimers. Their gelation property is highly dependent on the nature of the peripheral methyl groups. Furthermore, single-crystal X-ray analysis and NMR spectroscopy revealed that multiple C-H/π interactions between the proton of the methyl group and the electron-rich peripheral methyl-substituted aryl ring played significant roles in the formation of supramolecular nanofibers and organogels. This study uncovers the critical role of weak noncovalent interactions and provides new insights into the further design of self-assembled nanomaterials.

  6. From Weakness to Strength: C-H/π-Interaction-Guided Self-Assembly and Gelation of Poly(benzyl ether) Dendrimers.

    PubMed

    Peng, Yi; Feng, Yu; Deng, Guo-Jun; He, Yan-Mei; Fan, Qing-Hua

    2016-09-13

    The C-H/π interactions as the key driving force for the construction of supramolecular gels remain a great challenge because of their weak nature. We hereby employed for the first time weak C-H/π interactions for the construction of supramolecular dendritic gels based on peripherally methyl-functionalized poly(benzyl ether) dendrimers. Their gelation property is highly dependent on the nature of the peripheral methyl groups. Furthermore, single-crystal X-ray analysis and NMR spectroscopy revealed that multiple C-H/π interactions between the proton of the methyl group and the electron-rich peripheral methyl-substituted aryl ring played significant roles in the formation of supramolecular nanofibers and organogels. This study uncovers the critical role of weak noncovalent interactions and provides new insights into the further design of self-assembled nanomaterials. PMID:27538342

  7. Evaluation of hospital palliative care teams: strengths and weaknesses of the before-after study design and strategies to improve it.

    PubMed

    Simon, S; Higginson, I J

    2009-01-01

    Hospital palliative care teams (HPCTs) are well established as multi-professional services to provide palliative care in an acute hospital setting and are increasing in number. However, there is still limited evaluation of them, in terms of efficacy and effectiveness. The gold standard method of evaluation is a randomised control trial, but because of methodological (e.g., randomisation), ethical and practical difficulties such trials are often not possible. HPCT is a complex intervention, and the specific situation in palliative care makes it challenging to evaluate (e.g., distress and cognitive impairment of patients). The quasi-experimental before-after study design has the advantage of enabling an experimental character without randomisation. But this has other weaknesses and is prone to bias, for example, temporal trends and selection bias. As for every study design, avoidance and minimisation of bias is important to improve validity. Therefore, strategies of selecting an appropriate control group or time series and applying valid outcomes and measurement tools help reducing bias and strengthen the methods. Special attention is needed to plan and define the design and applied method.

  8. Strengths and weaknesses in the supply of school food resulting from the procurement of family farm produce in a municipality in Brazil.

    PubMed

    Soares, Panmela; Martinelli, Suellen Secchi; Melgarejo, Leonardo; Davó-Blanes, Mari Carmen; Cavalli, Suzi Barletto

    2015-06-01

    The objective of this study was to assess compliance with school food programme recommendations for the procurement of family farm produce. This study consists of an exploratory descriptive study utilising a qualitative approach based on semistructured interviews with key informants in a municipality in the State of Santa Catarina in Brazil. Study participants were managers and staff of the school food programme and department of agriculture, and representatives of a farmers' organisation. The produce delivery and demand fulfilment stages of the procurement process were carried out in accordance with the recommendations. However, nonconformities occurred in the elaboration of the public call for proposals, elaboration of the sales proposal, and fulfilment of produce quality standards. It was observed that having a diverse range of suppliers and the exchange of produce by the cooperative with neighbouring municipalities helped to maintain a regular supply of produce. The elaboration of menus contributed to planning agricultural production. However, agricultural production was not mapped before elaborating the menus in this case study and an agricultural reform settlement was left out of the programme. A number of weaknesses in the programme were identified which need to be overcome in order to promote local family farming and improve the quality of school food in the municipality.

  9. Strength from weakness: conformational divergence between solid and solution states of substituted cyclitols facilitated by CH···O hydrogen bonding.

    PubMed

    Vibhute, Amol M; Sureshan, Kana M

    2014-06-01

    We have investigated the conformational preferences of a series of cyclitol derivatives, namely mono- and diesters of 1,2:5,6-di-O-isopropylidene-myo-inositol and 1,2:5,6-di-O-cyclohexylidene-myo-inositol, in both solid and solution states. The solid-state conformations were determined by single-crystal X-ray analysis. The solution-state conformations were determined by using NMR. The experimental (3)J(HH) values were applied in the Haasnoot-Altona equation to calculate the dihedral angle (ϕ) between the respective vicinal protons. By fixing the dihedral angle between different sets of vicinal protons, the molecules were energy-minimized by MM2 method to visualize their conformation in solution. As the solvent polarities can influence the conformational preference, we have determined the conformations of these molecules in various solvents of different polarities such as benzene-d6, chloroform-d, acetonitrile-d3, acetone-d6, methanol-d4, and DMSO-d6. All of the compounds adopted boat conformations in solution irrespective of the solvents, acyl groups, or alkylidene protecting groups. This conformation places H6 and O3 of the cyclitol ring in proximity, such that an intramolecular CH···O hydrogen bond between them stabilizes this otherwise unstable conformation. However, in the solid state, several intermolecular CH···O hydrogen bonds force these molecules to adopt the chair conformation. This study uncovers the role of weak noncovalent interactions in influencing the molecular conformations differentially in different states.

  10. Characterizing the Long-Term PM2.5 Concentration-Response Function: Comparing the Strengths and Weaknesses of Research Synthesis Approaches.

    PubMed

    Fann, Neal; Gilmore, Elisabeth A; Walker, Katherine

    2016-09-01

    The magnitude, shape, and degree of certainty in the association between long-term population exposure to ambient fine particulate matter (PM2.5 ) and the risk of premature death is one of the most intensely studied issues in environmental health. For regulatory risk analysis, this relationship is described quantitatively by a concentration-response (C-R) function that relates exposure to ambient concentrations with the risk of premature mortality. Four data synthesis techniques develop the basis for, and derive, this function: systematic review, expert judgment elicitation, quantitative meta-analysis, and integrated exposure-response (IER) assessment. As part of an academic workshop aiming to guide the use of research synthesis approaches, we developed criteria with which to evaluate and select among the approaches for their ability to inform policy choices. These criteria include the quality and extent of scientific support for the method, its transparency and verifiability, its suitability to the policy problem, and the time and resources required for its application. We find that these research methods are both complementary and interdependent. A systematic review of the multidisciplinary evidence is a starting point for all methods, providing the broad conceptual basis for the nature, plausibility, and strength of the associations between PM exposure and adverse health effects. Further, for a data-rich application like PM2.5 and premature mortality, all three quantitative approaches can produce estimates that are suitable for regulatory and benefit analysis. However, when fewer data are available, more resource-intensive approaches such as expert elicitation may be more important for understanding what scientists know, where they agree or disagree, and what they believe to be the most important areas of uncertainty. Whether implicitly or explicitly, all require considerable judgment by scientists. Finding ways for all these methods to acknowledge

  11. When Students Make Threats

    ERIC Educational Resources Information Center

    Kanan, Linda M.

    2010-01-01

    Much has been written about the use of threat assessment. Schools are encouraged to have threat assessment teams and a threat assessment process as part of a comprehensive safe schools effort. Encouraging and enabling members of the school community to report possible threats in a timely manner is an essential component of an effective threat…

  12. When Students Make Threats

    ERIC Educational Resources Information Center

    Kanan, Linda M.

    2010-01-01

    Much has been written about the use of threat assessment. Schools are encouraged to have threat assessment teams and a threat assessment process as part of a comprehensive safe schools effort. Encouraging and enabling all members of the school community to report possible threats in a timely manner is an essential component of an effective threat…

  13. Cyber threat metrics.

    SciTech Connect

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  14. Effect of the pH and the ionic strength on overloaded band profiles of weak bases onto neutral and charged surface hybrid stationary phases in reversed-phase liquid chromatography.

    PubMed

    Gritti, Fabrice; Guiochon, Georges

    2013-03-22

    This work reports on the effects of the solution pH and its ionic strength on the overloaded band profiles and the parameters of the adsorption isotherms of nortriptylinium hydrochloride on the bridge ethylene hybrid (BEH) and the charged surface hybrid (CSH) C18-bonded columns. The mobile phases used were mixtures of acetonitrile and water buffered with hydrogenophosphate, formate, acetate, and dihydrogenophosphate buffers. The results show that the adsorption behavior of this protonated base onto the BEH-C18 column depends barely on the mobile phase pH and is slightly affected by its ionic strength. From both physical and statistical viewpoints, the Linear-Langmuir model is the most relevant adsorption isotherm. According to the inverse method of chromatography, this model is consistent with weak dispersive interactions taking place onto the C18-bonded chains and some strong ion-dipole interactions with residual silanols. In contrast, adsorption on the CSH-C18 column depends on the applied W(S)pH, e.g., on the degree of ionization of the amine groups tethered to the CSH surface. For W(S)pH<3, the electrostatically modified Langmuir model (EML) is acceptable because analyte molecules cannot access and interact with any active sites due to the electrostatic repulsion by the positively charged adsorbent surface. At W(S)pH>7.0, the Linear-bi-Langmuir model describes best the weak adsorption of the protonated base molecules onto the C18 chains and their strong adsorption onto the residual silanols and neutral amine groups. PMID:23415137

  15. Weak bond screening system

    NASA Astrophysics Data System (ADS)

    Chuang, S. Y.; Chang, F. H.; Bell, J. R.

    Consideration is given to the development of a weak bond screening system which is based on the utilization of a high power ultrasonic (HPU) technique. The instrumentation of the prototype bond strength screening system is described, and the adhesively bonded specimens used in the system developmental effort are detailed. Test results obtained from these specimens are presented in terms of bond strength and level of high power ultrasound irradiation. The following observations were made: (1) for Al/Al specimens, 2.6 sec of HPU irradiation will screen weak bond conditions due to improper preparation of bonding surfaces; (2) for composite/composite specimens, 2.0 sec of HPU irradiation will disrupt weak bonds due to under-cured conditions; (3) for Al honeycomb core with composite skin structure, 3.5 sec of HPU irradiation will disrupt weak bonds due to bad adhesive or oils contamination of bonding surfaces; and (4) for Nomex honeycomb with Al skin structure, 1.3 sec of HPU irradiation will disrupt weak bonds due to bad adhesive.

  16. Muscle strength and BMI as predictors of major mobility disability in the lifestyle interventions and independence for elders pilot (LIFE-P)

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Muscle weakness and obesity are two significant threats to mobility facing the increasing number of older adults. To date, there are no studies that have examined the association of strength and body mass index (BMI) on event rates on a widely used performance measure of major mobility disability. T...

  17. The Zirconia Ceramic: Strengths and Weaknesses

    PubMed Central

    Daou, Elie E.

    2014-01-01

    Metal ceramic restorations were considered the gold standard as reliable materials. Increasing demand for esthetics supported the commercialization of new metal free restorations. A growing demand is rising for zirconia prostheses. Peer-reviewed articles published till July 2013 were identified through a Medline (Pubmed and Elsevier). Emphasizing was made on zirconia properties and applications. Zirconia materials are able to withstand posterior physiologic loads. Although zirconia cores are considered as reliable materials, these restorations are not problem free. PMID:24851138

  18. Weak Interactions

    DOE R&D Accomplishments Database

    Lee, T. D.

    1957-06-01

    Experimental results on the non-conservation of parity and charge conservation in weak interactions are reviewed. The two-component theory of the neutrino is discussed. Lepton reactions are examined under the assumption of the law of conservation of leptons and that the neutrino is described by a two- component theory. From the results of this examination, the universal Fermi interactions are analyzed. Although reactions involving the neutrino can be described, the same is not true of reactions which do not involve the lepton, as the discussion of the decay of K mesons and hyperons shows. The question of the invariance of time reversal is next examined. (J.S.R.)

  19. External threat and the definition of deviance.

    PubMed

    Laudedale, P; Smith-Cunnien, P; Parker, J; Inverarity, J

    1984-05-01

    Research ( Lauderdale , 1976; Schachter , 1951) suggests that an external threat to a group can lead to the rejection of deviant members of the group and alteration of group communication patterns and solidarity. This study sought to extend those findings, integrate them with concepts from Simmel 's (1917/1955) work on group conflict, and link them to key issues in the societal reaction approach to deviant behavior. We examined the effect of variation in level of threat, the relationship between deviant status and nonconformity to the central task norm, the role of high-status actors in deviance designation, the relationship between rejection and negative definition of the deviant, and the effects of rejection and negative definition on group solidarity. Hypotheses were tested in an experimental design involving three conditions (strong threat, weak threat, and no threat). The results suggest that (a) the level of threat is directly related to the extent of rejection and negative definition, (b) nonconformity to the central task norm is not systematically related to deviant status, (c) high-status actors are more involved in the rejection of the deviant, (d) sociometric rejection of the deviant is accompanied by negative definition in the strong-threat condition, and (e) the level of group solidarity is related to the extent of rejection and negative definition. Implications of these findings are discussed relative to the societal reaction approach to deviant behavior and analogous processes in other social groups.

  20. Ancient woodlands: modern threats.

    PubMed

    Rackham, Oliver

    2008-01-01

    This review discusses the following adverse influences on long-established forests, wood-pastures, and savannas in Europe and other continents: destruction and fragmentation; depletion; pollution and eutrophication; fire and lack of fire; excessive shade; excessive numbers of deer; invasive species and cultivars; infilling of savanna; climate change; and globalization of plant diseases. Human influences on the world's mainland forests and savannas have been pervasive throughout the Holocene, to the extent that recovering 'virgin forest' becomes a somewhat nebulous conservation objective. Present and future threats arise both from increasing human activities and from withdrawal of the human activities that have shaped forests in the past. The severity of different threats depends on so many factors, especially the properties of different plants and animals, that generalization is impossible; however, in the long term, spread of pathogens is probably the most serious threat. PMID:18771472

  1. Credible threats and promises.

    PubMed Central

    McNamara, John M; Houston, Alasdair I

    2002-01-01

    We consider various implications of information about the other player in two-player evolutionary games. A simple model of desertion shows that information about the partner's behaviour can be disadvantageous, and highlights the idea of credible threats. We then discuss the general issue of whether the partner can convince the focal player that it will behave in a specific way, i.e. whether the focal player can make credible threats or promises. We show that when desertion decisions depend on reserves, a player can manipulate its reserves so as to create a credible threat of desertion. We then extend previous work on the evolution of trust and commitment, discussing conditions under which it is advantageous to assume that a partner will behave in a certain way even though it is not in its best interest. PMID:12495517

  2. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    PubMed

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  3. Quantum discord with weak measurements

    SciTech Connect

    Singh, Uttam Pati, Arun Kumar

    2014-04-15

    Weak measurements cause small change to quantum states, thereby opening up the possibility of new ways of manipulating and controlling quantum systems. We ask, can weak measurements reveal more quantum correlation in a composite quantum state? We prove that the weak measurement induced quantum discord, called as the “super quantum discord”, is always larger than the quantum discord captured by the strong measurement. Moreover, we prove the monotonicity of the super quantum discord as a function of the measurement strength and in the limit of strong projective measurement the super quantum discord becomes the normal quantum discord. We find that unlike the normal discord, for pure entangled states, the super quantum discord can exceed the quantum entanglement. Our results provide new insights on the nature of quantum correlation and suggest that the notion of quantum correlation is not only observer dependent but also depends on how weakly one perturbs the composite system. We illustrate the key results for pure as well as mixed entangled states. -- Highlights: •Introduced the role of weak measurements in quantifying quantum correlation. •We have introduced the notion of the super quantum discord (SQD). •For pure entangled state, we show that the SQD exceeds the entanglement entropy. •This shows that quantum correlation depends not only on observer but also on measurement strength.

  4. Cognitive appraisals of stereotype threat.

    PubMed

    Berjot, S; Roland-Levy, C; Girault-Lidvan, N

    2011-04-01

    Using the cognitive appraisal conceptualisation of the transactional model of stress, the goal was to assess how victims of stereotype threat respond to this situation in terms of primary appraisals (threat/challenge) and to investigate whether those appraisals may mediate the relation between stereotype threat and performance. Results show that, while participants from North Africa living in France did appraise the situation more as a threat and less as a challenge, only challenge appraisal mediated between stereotype threat and performance.

  5. Spin effects in the weak interaction

    SciTech Connect

    Freedman, S.J. Chicago Univ., IL . Dept. of Physics Chicago Univ., IL . Enrico Fermi Inst.)

    1990-01-01

    Modern experiments investigating the beta decay of the neutron and light nuclei are still providing important constraints on the theory of the weak interaction. Beta decay experiments are yielding more precise values for allowed and induced weak coupling constants and putting constraints on possible extensions to the standard electroweak model. Here we emphasize the implications of recent experiments to pin down the strengths of the weak vector and axial vector couplings of the nucleon.

  6. Distance mitigates perceived threat.

    PubMed

    Stamps, Arthur E

    2011-12-01

    It has previously been shown that distance mitigates the extent to which visual cues convey perceived threat. It was hypothesized that the visual cues of eye contact, sex, facial expression, and posture would all convey threat. It was further hypothesized that the effects of visual cues on the perception of threat would decrease with distance, but the extent of those decreases was unknown. In the present study, participants were exposed to images of people situated in a physical venue. The images were created to exhibit combinations of the levels of the four visual cues (yes or no for eye contact, male or female for sex, hostile or benign for facial expression, and hostile or benign for posture). Participants were given an opportunity to record how threatening the images of the people seemed to be. The results supported all a priori hypotheses regarding the effects of the visual cues. The results also generated estimates of the distances at which those visual cues ceased to convey threat.

  7. The Population Threat

    ERIC Educational Resources Information Center

    McNamara, Robert S.

    1969-01-01

    In an address delivered at the University of Notre Dame, May 1969, Secretary McNamara discussed the threat of unmanageable population pressure which is undervalued and misunderstood by the general public. Unrestricted population growth will have catastrophic consequences unless it is dealt with rapidly and rationally. Copies from: Office of…

  8. ThreatView

    2007-09-25

    The ThreatView project is based on our prior work with the existing ParaView open-source scientific visualization application. Where ParaView provides a grapical client optimized scientific visualization over the VTK parallel client server architecture, ThreatView provides a client optimized for more generic visual analytics over the same architecture. Because ThreatView is based on the VTK parallel client-server architecture, data sources can reside on remote hosts, and processing and rendering can be performed in parallel. As seenmore » in Fig. 1, ThreatView provides four main methods for visualizing data: Landscape View, which displays a graph using a landscape metaphor where clusters of graph nodes produce "hills" in the landscape; Graph View, which displays a graph using a traditional "ball-and-stick" style; Table View, which displays tabular data in a standard spreadsheet; and Attribute View, which displays a tabular "histogram" of input data - for a selected table column, the Attribute View displays each unique value within the column, and the number of times that value appears in the data. There are two supplemental view types: Text View, which displays tabular data one-record-at-a-time; and the Statistics View, which displays input metadata, such as the number of vertices and edges in a graph, the number of rows in a table, etc.« less

  9. Proliferation: Threat and response

    SciTech Connect

    1996-04-01

    ;Table of Contents: Section I: The Regional Proliferation Challenge; Northeast Asia; The Middle East and North Africa; The Former Soviet Union: Russia, Ukrane, Kazakstan, And Belarus; South Asia; The International Threat: Dangers from Terrorism, Insurgencies, Civil Wars, And Organized Crime; Section II: Department of Defense Response; Technical Annex: Accessible Technologies; Glossary.

  10. [Bioterrorism--real threat].

    PubMed

    Wiackowski, Stanisław K

    2004-01-01

    In the presented paper natural and artificial threat concern of possible use of biological weapon was discussed. Special attention was given to viruses and bacteria which may be used by terrorists and methods of their application, utilisation of different organisms for example: insects such as intermediate hosts or transport medium of contagious microorganisms. PMID:15682939

  11. Ethical Proactive Threat Research

    NASA Astrophysics Data System (ADS)

    Aycock, John; Sullins, John

    Through a provocative examination of the positive effects of computer security research on regular users, we argue that traditional security research is insufficient. Instead, we turn to a largely untapped alternative, proactive threat research, a fruitful research area but an ethical minefield. We discuss practices for ethical research and dissemination of proactive research.

  12. Threat Assessment Plans

    ERIC Educational Resources Information Center

    Pascopella, Angela

    2008-01-01

    With every new case of school violence, district leaders are urged to be proactive in hopes of averting potential violence. Experts say part of that proactive work comes from a threat assessment plan that every district should have. While every district that receives funds from the U.S. Department of Education for school safety is required to have…

  13. ThreatView

    SciTech Connect

    Shead, Timothy M.; Wylie, Brian

    2007-09-25

    The ThreatView project is based on our prior work with the existing ParaView open-source scientific visualization application. Where ParaView provides a grapical client optimized scientific visualization over the VTK parallel client server architecture, ThreatView provides a client optimized for more generic visual analytics over the same architecture. Because ThreatView is based on the VTK parallel client-server architecture, data sources can reside on remote hosts, and processing and rendering can be performed in parallel. As seen in Fig. 1, ThreatView provides four main methods for visualizing data: Landscape View, which displays a graph using a landscape metaphor where clusters of graph nodes produce "hills" in the landscape; Graph View, which displays a graph using a traditional "ball-and-stick" style; Table View, which displays tabular data in a standard spreadsheet; and Attribute View, which displays a tabular "histogram" of input data - for a selected table column, the Attribute View displays each unique value within the column, and the number of times that value appears in the data. There are two supplemental view types: Text View, which displays tabular data one-record-at-a-time; and the Statistics View, which displays input metadata, such as the number of vertices and edges in a graph, the number of rows in a table, etc.

  14. Environmental Threats at School

    ERIC Educational Resources Information Center

    Green, Twhanna

    2005-01-01

    Children can be exposed to dangerous chemicals and toxins in the most unlikely of places: Their schools. This brief article describes the types of threats that school environments pose to students' health, including such pollution and chemical exposures as lead, mercury, arsenic, molds, and poor indoor air quality. The article provides tips for…

  15. Threat in dreams: an adaptation?

    PubMed

    Malcolm-Smith, Susan; Solms, Mark; Turnbull, Oliver; Tredoux, Colin

    2008-12-01

    Revonsuo's influential Threat Simulation Theory (TST) predicts that people exposed to survival threats will have more threat dreams, and evince enhanced responses to dream threats, compared to those living in relatively safe conditions. Participants in a high crime area (South Africa: n=208) differed significantly from participants in a low crime area (Wales, UK: n=116) in having greater recent exposure to a life-threatening event (chi([1,N=186])(2)=14.84, p<.00012). Contrary to TST's predictions, the SA participants reported significantly fewer threat dreams (chi([1,N=287])(2)=6.11, p<.0134), and did not differ from the Welsh participants in responses to dream threats (Fisher's Exact test, p=.2478). Overall, the incidence of threat in dreams was extremely low-less than 20% of dreams featured realistic survival threats. Escape from dream threats occurred in less than 2% of dreams. We conclude that this evidence contradicts key aspects of TST.

  16. Airborne Particulate Threat Assessment

    SciTech Connect

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  17. Proliferation: Threat and response

    SciTech Connect

    1996-04-01

    During the height of the Cold War, the Russian physicist Andre Sakharov said, `Reducing the risk of annihilating humanity in a nuclear war carries an absolute priority over all other considerations.` The end of the Cold War has reduced the threat of global nuclear war, but today a new threat is rising from the global spread of nuclear, biological, and chemical weapons. Hostile groups and nations have tried - or have been able - to obtain these weapons, the technology, and homegrown ability to make them or ballistic missiles that can deliver the massive annihilation, poison, and death of these weapons hundreds of miles away. For rogue nations, these weapons are a ticket to power, stature, and confidence in regional war.

  18. Pollution: a global threat.

    PubMed

    McCrink-Goode, Melissa

    2014-07-01

    Over the past several decades, several large-scale seemingly unrelated events have unfolded in all corners of the world. Within the oceans, coral reef systems have been facing unprecedented mass bleaching episodes, sea turtles worldwide are currently experiencing an epidemic in the form of fibropapilloma, and global phytoplankton populations have declined by 40%. Within the Earth's terrestrial systems, similar phenomena have appeared in the form of colony collapse disorder (CCD) currently devastating honey bee colonies, White Nose Syndrome decimating bat populations, and the chytrid fungus plaguing amphibian populations. On the surface these events appear to be unrelated yet at the root of each phenomenon there appears an underlying threat - pollution. This paper will investigate the commonality of these occurrences as well as investigate the current and potential solutions to the threat.

  19. Pollution: a global threat.

    PubMed

    McCrink-Goode, Melissa

    2014-07-01

    Over the past several decades, several large-scale seemingly unrelated events have unfolded in all corners of the world. Within the oceans, coral reef systems have been facing unprecedented mass bleaching episodes, sea turtles worldwide are currently experiencing an epidemic in the form of fibropapilloma, and global phytoplankton populations have declined by 40%. Within the Earth's terrestrial systems, similar phenomena have appeared in the form of colony collapse disorder (CCD) currently devastating honey bee colonies, White Nose Syndrome decimating bat populations, and the chytrid fungus plaguing amphibian populations. On the surface these events appear to be unrelated yet at the root of each phenomenon there appears an underlying threat - pollution. This paper will investigate the commonality of these occurrences as well as investigate the current and potential solutions to the threat. PMID:24727071

  20. Space collision threat mitigation

    NASA Astrophysics Data System (ADS)

    Zatezalo, Aleksandar; Stipanović, Dušan; Mehra, Raman K.; Pham, Khanh

    2014-06-01

    Mitigation of possible collision threats to current and future operations in space environments is an important an challenging task considering high nonlinearity of orbital dynamics and discrete measurement updates. Such discrete observations are relatively scarce with respect to space dynamics including possible unintentional or intentional rocket propulsion based maneuvers even in scenarios when measurement collections are focused to a one single target of interest. In our paper, this problem is addressed in terms of multihypothesis and multimodel estimation in conjunction with multi-agent multigoal game theoretic guaranteed evasion strategies. Collision threat estimation is formulated using conditional probabilities of time dependent hypotheses and spacecraft controls which are computed using Liapunov-like approach. Based on this formulation, time dependent functional forms of multi-objective utility functions are derived given threat collision risk levels. For demonstrating developed concepts, numerical methods are developed using nonlinear filtering methodology for updating hypothesis sets and corresponding conditional probabilities. Space platform associated sensor resources are managed using previously developed and demonstrated information-theoretic objective functions and optimization methods. Consequently, estimation and numerical methods are evaluated and demonstrated on a realistic Low Earth Orbit collision encounter.

  1. [Counterfeit medicines: a growing threat].

    PubMed

    Barbereau, S

    2006-12-01

    The medical drug market has undergone considerable transformation in recent years. Like other products, medicines have been affected by globalization. Free trade policies have had a number of negative effects including a reduction in quality control not only for some products but also for raw materials and finished products. The global environment has also created conditions conducive to counterfeit medicines. The term counterfeit medicine is defined differently from one country to another in terms of quality, legality and fraudulent intent. This situation prompted the WHO to propose the following definition: "A counterfeit medicine is one which is deliberately and fraudulently mislabeled with respect to identity and/or source. Counterfeiting can apply to both branded and generic products and counterfeit products may include products with the correct ingredients or with the wrong ingredients, without active ingredients, with insufficient active ingredients or with fake packaging." Weak pharmaceutical regulation often compounded by widespread corruption in developing countries has greatly facilitated the development of this illicit market with harmful and costly effects on public health. Due to the lack of pharmocovigilance accidents involving use of counterfeit drugs go unreported. For this reason it is not possible to measure the economic impact. While counterfeiting has become a major threat in developing countries, it also affects industrialized countries. Fraudulent behavior occurs all over the world.

  2. Not All Threats Are Equal

    ERIC Educational Resources Information Center

    Surface, Jeanne L.

    2011-01-01

    School leaders must be fully prepared to respond to all types of threats that occur. In order to respond to threats most appropriately, the school needs to have a systematic approach that combines education, prevention, intervention, discipline, security, and crisis preparedness measures. All threats must be assessed carefully and swiftly,…

  3. Combating emerging viral threats

    PubMed Central

    Bekerman, Elena; Einav, Shirit

    2015-01-01

    Synopsis Most approved antiviral therapeutics selectively inhibit proteins encoded by a single virus, thereby providing a “one drug-one bug” solution. As a result of this narrow spectrum of coverage and the high cost of drug development, therapies are currently approved for fewer than ten viruses out of the hundreds known to cause human disease. This perspective summarizes progress and challenges in the development of broad-spectrum antiviral therapies. These strategies include targeting enzymatic functions shared by multiple viruses and host cell machinery by newly discovered compounds or by repurposing approved drugs. These approaches offer new practical means for developing therapeutics against existing and emerging viral threats. PMID:25883340

  4. Threats to international science

    NASA Astrophysics Data System (ADS)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  5. The moderating role of age-group identification and perceived threat on stereotype threat among older adults.

    PubMed

    Kang, Sonia K; Chasteen, Alison L

    2009-01-01

    Although research has shown that older adults are negatively affected by aging stereotypes, relatively few studies have attempted to identify those older adults who may be especially susceptible to these effects. The current research takes steps toward identifying older adults most susceptible to the effects of stereotype threat and investigates the consequence of stereotype threat on the well-being of older adults. Older adults were tested on their recall of a prose passage under normal or stereotype threatening conditions. Memory decrements for those in the threat condition were moderated by perceived stereotype threat such that greater decrements were seen for those who reported greater perceived threat. A similar pattern was observed for negative emotion, such that those in the threat condition who reported higher perceptions of threat experienced a greater decrease in positive emotions. Age group identification also proved to be an important factor, with the strongly identified performing worse than the weakly identified. As well, high age-group identification buffered some of the negative affective consequences associated with stereotype threat, which is consistent with some models of coping with stigma.

  6. Addressing the insider threat

    SciTech Connect

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-05-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  7. Addressing the insider threat

    SciTech Connect

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-01-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  8. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    PubMed

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective. PMID:21441217

  9. Categorizing threat : building and using a generic threat matrix.

    SciTech Connect

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  10. Mediators of Stereotype Threat among Black College Students.

    PubMed

    Massey, Douglas S; Owens, Jayanti

    2014-04-01

    We hypothesize that the manner in which stereotype threat affects college grade achievement is mediated by institutional context as well as individual characteristics. Drawing on a sample of black students from the National Longitudinal Survey of Freshmen we find weak and inconsistent evidence that institutional characteristics influence the operation of stereotype threat. We find more consistent evidence to indicate that the effect of stereotype threat is conditioned by individual factors such as skin color, multiracial origins, and an integrated upbringing. Most of the effect on grade achievement occurs through the internalization pathway, in which the internalization of negative stereotypes leads to disinvestment manifested by a reduction in academic effort. The reduction in work effort, in turn, lowers grades. We also find evidence that immigrant origin confers protection from the negative effects of stereotype threat through both internalization and externalization mechanisms, though the ultimate effect of grade achievement is rather small.

  11. Weak scale supersymmetry

    SciTech Connect

    Hall, L.J. California Univ., Berkeley, CA . Dept. of Physics)

    1990-11-12

    An introduction to the ideas and current state of weak scale supersymmetry is given. It is shown that LEP data on Z decays has already excluded two of the most elegant models of weak scale supersymmetry. 14 refs.

  12. Application of modified threat reduction assessments in Lebanon.

    PubMed

    Matar, Diane A; Anthony, Brandon P

    2010-10-01

    Worldwide efforts have concentrated on developing monitoring methods that would enhance the assessment of progress toward achieving the 2010 conservation objectives of the Convention on Biological Diversity. Threat reduction assessment is one such method. It provides an indirect measure of the effects of a conservation project by evaluating changes in human-induced direct threats to protected areas. We applied modified threat reduction assessments and the 2008 International Union for Conservation of Nature standardized lexicon for classification of threats to Horsh Ehden and Al-Shouf Cedar nature reserves in Lebanon. Our goal was in part to test the suitability of this tool for improving monitoring and management effectiveness of protected forests in Lebanon. In Horsh Ehden, composite threats decreased by 24% from 1997 to 2002, and then increased from 2002 to 2009 by 78% in the core area of the reserve and by 118% in the reserve's buffer zone (surrounds core area, conservation and recreational activities allowed). In Al-Shouf Cedar reserve threats decreased by 51% from 2006 to 2009. Management teams from both reserves have integrated the use of this method to prioritize actions for new management plans. We believe that in Lebanon and other countries with limited resources and weak monitoring programs or that are experiencing political instability threat reduction assessments could be used to improve the effectiveness of protected areas management.

  13. Lizard threat display handicaps endurance.

    PubMed Central

    Brandt, Y

    2003-01-01

    Honest-signalling theory asserts that threat displays reliably advertise attributes that influence fighting success. Endurance, as measured by treadmill performance, predicts the outcome of agonistic interactions among lizards. If threat displays in lizards function to advertise endurance capacity then variation in threat displays should correlate with endurance. I tested this prediction for the duration of threat posturing in male side-blotched lizards (Uta stansburiana) and examined whether threat displays act as quality handicaps, reliable signals that expend the attribute that is advertised. Individual variation in the duration of threat posturing correlated with endurance, while an experimental reduction of endurance diminished the duration of threat posturing. As expected of a quality handicap, endurance fell below baseline after display production. A restriction of aerobic metabolism can account for this effect. In threat posturing, lateral compression of the thorax may interfere with respiration or with circulation, limiting aerobic metabolism and causing a compensatory increase in anaerobic metabolism, thereby generating lactate and diminishing locomotor capacity. Concentrations of lactate measured after display production were higher than baseline, consistent with the proposed mechanism. By restricting aerobic metabolism, the threat posture can act as a quality handicap, simultaneously advertising and expending the endurance capacity of displaying lizards. PMID:12803896

  14. Shoulder weakness in professional baseball pitchers.

    PubMed

    Magnusson, S P; Gleim, G W; Nicholas, J A

    1994-01-01

    The purposes of this study were to: 1) compare shoulder range of motion and strength in professional baseball pitchers (N = 47) compared with age-matched controls (N = 16), and 2) examine the relationship of injury history to strength and range of motion. Based on injury history pitchers were categorized as: 1) none (N = 26), 2) injury requiring conservative intervention (N = 9), or 3) injury requiring surgical intervention (N = 12). Range of motion was measured for internal rotation (IROM) and external rotation (EROM). Eccentric strength was measured by hand-held dynamometer for internal rotation (IR), external rotation (ER), abduction (ABD), and supraspinatus muscle (SUP) strength. Injury history had no effect on strength and range of motion. Dominant EROM was greater in pitchers, P < 0.0001, and controls, P < 0.05, with pitchers having greater EROM motion bilaterally, P < 0.0001. Pitchers were weaker in SUP on the dominant vs nondominant side, P < 0.0001, and on the dominant side for weight adjusted ER, ABD, P < 0.01, and SUP, P < 0.0001, compared with controls. In conclusion, dominance and pitching resulted in soft tissue adaptation. Pitchers displayed weakness in three of four tests by comparison with controls, suggesting that the demands of pitching are insufficient to produce eccentric strength gains and may in fact lead to weakness. Dominant-side SUP weakness in pitchers may reflect subclinical pathology or chronic fatigue.

  15. Postselected weak measurement beyond the weak value

    SciTech Connect

    Geszti, Tamas

    2010-04-15

    Closed expressions are derived for the quantum measurement statistics of pre- and postselected Gaussian particle beams. The weakness of the preselection step is shown to compete with the nonorthogonality of postselection in a transparent way. The approach is shown to be useful in analyzing postselection-based signal amplification, allowing measurements to be extended far beyond the range of validity of the well-known Aharonov-Albert-Vaidman limit. Additionally, the present treatment connects postselected weak measurement to the topic of phase-contrast microscopy.

  16. Bomb Threat Assessments. Fact Sheet

    ERIC Educational Resources Information Center

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  17. Threat Assessment in College Settings

    ERIC Educational Resources Information Center

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  18. Bio-threat microparticle simulants

    SciTech Connect

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  19. Bio-threat microparticle simulants

    DOEpatents

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  20. Linking Stereotype Threat and Anxiety

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2007-01-01

    Claude Steele's stereotype threat hypothesis has attracted significant attention in recent years. This study tested one of the main tenets of his theory--that stereotype threat serves to increase individual anxiety levels, thus hurting performance--using real-time measures of physiological arousal. Subjects were randomly assigned to either high or…

  1. Distribution of muscle weakness of central and peripheral origin.

    PubMed

    Thijs, R D; Notermans, N C; Wokke, J H; van der Graaf, Y; van Gijn, J

    1998-11-01

    According to the established clinical tradition about the distribution of weakness, the ratios of flexor/extensor strength of patients with upper motor neuron lesions are expected to be relatively high for the elbow and wrist and low for the knee. To assess the diagnostic value of these patterns of weakness, muscle strength of 70 patients with limb weakness of central or peripheral origin was measured with a hand held dynamometer. The ratios of flexor/extensor strength at the knee, elbow, and wrist did not differ significantly between patients with central or peripheral origin of muscle weakness. The examination of tendon jerks proved to be of more value as a localising feature. The traditional notion about the distribution of weakness in upper motor neuron lesions may be explained by an intrinsically greater strength in antigravity muscles, together with the effects of hypertonia. PMID:9810962

  2. Psychoanalysis and the nuclear threat

    SciTech Connect

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  3. Threat expert system technology advisor

    NASA Technical Reports Server (NTRS)

    Kurrasch, E. R.; Tripp, L. R.

    1987-01-01

    A prototype expert system was developed to determine the feasibility of using expert system technology to enhance the performance and survivability of helicopter pilots in a combat threat environment while flying NOE (Nap of the Earth) missions. The basis for the concept is the potential of using an Expert System Advisor to reduce the extreme overloading of the pilot who flies NOE mission below treetop level at approximately 40 knots while performing several other functions. The ultimate goal is to develop a Threat Expert System Advisor which provides threat information and advice that are better than even a highly experienced copilot. The results clearly show that the NOE pilot needs all the help in decision aiding and threat situation awareness that he can get. It clearly shows that heuristics are important and that an expert system for combat NOE helicopter missions can be of great help to the pilot in complex threat situations and in making decisions.

  4. Aperiodic Weak Topological Superconductors

    NASA Astrophysics Data System (ADS)

    Fulga, I. C.; Pikulin, D. I.; Loring, T. A.

    2016-06-01

    Weak topological phases are usually described in terms of protection by the lattice translation symmetry. Their characterization explicitly relies on periodicity since weak invariants are expressed in terms of the momentum-space torus. We prove the compatibility of weak topological superconductors with aperiodic systems, such as quasicrystals. We go beyond usual descriptions of weak topological phases and introduce a novel, real-space formulation of the weak invariant, based on the Clifford pseudospectrum. A nontrivial value of this index implies a nontrivial bulk phase, which is robust against disorder and hosts localized zero-energy modes at the edge. Our recipe for determining the weak invariant is directly applicable to any finite-sized system, including disordered lattice models. This direct method enables a quantitative analysis of the level of disorder the topological protection can withstand.

  5. Aperiodic Weak Topological Superconductors.

    PubMed

    Fulga, I C; Pikulin, D I; Loring, T A

    2016-06-24

    Weak topological phases are usually described in terms of protection by the lattice translation symmetry. Their characterization explicitly relies on periodicity since weak invariants are expressed in terms of the momentum-space torus. We prove the compatibility of weak topological superconductors with aperiodic systems, such as quasicrystals. We go beyond usual descriptions of weak topological phases and introduce a novel, real-space formulation of the weak invariant, based on the Clifford pseudospectrum. A nontrivial value of this index implies a nontrivial bulk phase, which is robust against disorder and hosts localized zero-energy modes at the edge. Our recipe for determining the weak invariant is directly applicable to any finite-sized system, including disordered lattice models. This direct method enables a quantitative analysis of the level of disorder the topological protection can withstand. PMID:27391744

  6. Apple Strength Issues

    SciTech Connect

    Syn, C

    2009-12-22

    Strength of the apple parts has been noticed to decrease, especially those installed by the new induction heating system since the LEP campaign started. Fig. 1 shows the ultimate tensile strength (UTS), yield strength (YS), and elongation of the installed or installation-simulated apples on various systems. One can clearly see the mean values of UTS and YS of the post-LEP parts decreased by about 8 ksi and 6 ksi respectively from those of the pre-LEP parts. The slight increase in elongation seen in Fig.1 can be understood from the weak inverse relationship between the strength and elongation in metals. Fig.2 shows the weak correlation between the YS and elongation of the parts listed in Fig. 1. Strength data listed in Figure 1 were re-plotted as histograms in Figs. 3 and 4. Figs. 3a and 4a show histograms of all UTS and YS data. Figs. 3b and 4b shows histograms of pre-LEP data and Figs. 3c and 4c of post-LEP data. Data on statistical scatter of tensile strengths have been rarely published by material suppliers. Instead, only the minimum 'guaranteed' strength data are typically presented. An example of strength distribution of aluminum 7075-T6 sheet material, listed in Fig. 5, show that its scatter width of both UTS and YS for a single sheet can be about 6 ksi and for multi-lot scatter can be as large as 11 ksi even though the sheets have been produced through well-controlled manufacturing process. By approximating the histograms shown in Figs. 3 and 4 by a Gaussian or similar type of distribution curves, one can plausibly see the strength reductions in the later or more recent apples. The pre-LEP data in Figs. 3b and 4b show wider scatter than the post-LEP data in Figs. 3c and 4c and seem to follow the binomial distribution of strength indicating that the apples might have been made from two different lots of material, either from two different vendors or from two different melts of perhaps slightly different chemical composition by a single vendor. The post

  7. Stereotype Threat as Validity Threat: The Anxiety-Sex-Threat Interaction

    ERIC Educational Resources Information Center

    Delgado, Ana R.; Prieto, Gerardo

    2008-01-01

    Stereotype threat has been invoked to explain underperformance on a variety of groups for whom the stereotypes allege inferior cognitive abilities. In math testing, stereotype threat has been used to explain sex differences in test performance. This paper describes an experimental study on a large sample (n = 313), in which the role of anxiety and…

  8. Many-body chaos at weak coupling

    NASA Astrophysics Data System (ADS)

    Stanford, Douglas

    2016-10-01

    The strength of chaos in large N quantum systems can be quantified using λ L , the rate of growth of certain out-of-time-order four point functions. We calculate λ L to leading order in a weakly coupled matrix Φ4 theory by numerically diagonalizing a ladder kernel. The computation reduces to an essentially classical problem.

  9. Experimental noiseless linear amplification using weak measurements

    NASA Astrophysics Data System (ADS)

    Ho, Joseph; Boston, Allen; Palsson, Matthew; Pryde, Geoff

    2016-09-01

    The viability of quantum communication schemes rely on sending quantum states of light over long distances. However, transmission loss can degrade the signal strength, adding noise. Heralded noiseless amplification of a quantum signal can provide a solution by enabling longer direct transmission distances and by enabling entanglement distillation. The central idea of heralded noiseless amplification—a conditional modification of the probability distribution over photon number of an optical quantum state—is suggestive of a parallel with weak measurement: in a weak measurement, learning partial information about an observable leads to a conditional back-action of a commensurate size. Here we experimentally investigate the application of weak, or variable-strength, measurements to the task of heralded amplification, by using a quantum logic gate to weakly couple a small single-optical-mode quantum state (the signal) to an ancilla photon (the meter). The weak measurement is carried out by choosing the measurement basis of the meter photon and, by conditioning on the meter outcomes, the signal is amplified. We characterise the gain of the amplifier as a function of the measurement strength, and use interferometric methods to show that the operation preserves the coherence of the signal.

  10. Managing biosecurity threats in China.

    PubMed

    Huang, Yanzhong

    2011-03-01

    Compared to the extensive literature on bioterrorism and biosecurity in the United States, less analysis has been conducted on similar challenges in China. This article seeks to fill this void by providing an integrated and updated assessment of 3 major biosecurity threats China faces: biowarfare, bioterrorism, and biocrimes. An analysis of China's biosecurity threats and biodefense building suggest varying levels of risk associated with each threat type. First, a direct bioweapons attack on China is highly unlikely, although the threat of biowarfare cannot be simply written off. Second, potential perpetrators of bioterrorism have capabilities at their disposal for carrying out such attacks. While terrorist organizations in China do not have a strong interest in bioterrorism, the limited state capability to counter such a threat may increase the risk in the future. Third, unlike the threats of biowarfare and bioterrorism, potential perpetrators of biocrimes have both incentives and capabilities, and biocrimes can produce reactions far out of proportion to the actual number of casualties. Despite the distinct biosecurity challenges it faces, China has yet to articulate a differentiated and coherent strategy to effectively tackle the challenges. Assessing different types of biosecurity threats in terms of degrees of risk not only provides greater analytical clarity but also has important implications for the strategies required to manage the risks.

  11. China. Population. New threat.

    PubMed

    Although China's population growth rate in 1980 was the lowest in 31 years, doubling of marriages and increasing life expectancy have emerged as threats to the government plan to hold national population growth to 1200 million by the end of the present century, a Beijing official magazine reported. Liaowang (Observation), published by the government's Xinhua news agency, quoted state family planning officials as saying that a subsequent doubling of marriages this year "threatens another baby boom in the world's most populous nation." The officials said the country's population stood at 982.55 million at the end of 1980, roughly equivalent to 20% of the world's total. According to the magazine, the natural population growth rate declined to 8.97 million last year as the number of births fell to 14.99 million and that of deaths stood at 6.02 million. During the past decade, the natural increase rate of China's population dropped from 26/1000 in 1970 to just 12/1000 in 1980. Owing to increase in production and living standards, along with expansion and improvement of medical facilities, the mortality rate fell from almost 30/1000 before the founding of the People's Republic of China to around 6-8/1000 by the 1970s. According to U.N. statistics prepared for the recently-held international conference on population and development in Beijing, China succeeded in reducing its birth rate by as much as 23.1% between 1960-65 and 1970-75. But such accomplishment is now in danger of being wiped out by a new birth peak expected during the next 10 or more years as those born during the baby boom of the 1960s reached childbearing age during the present decade. In addition, the population control program is also threatened by the rising life expectancy of the Chinese people. Latest statistics compiled by the Ministry of Public Health showed that the average life span of the Chinese population had doubled to 68 years in 1980 from 35 years in 1949.

  12. Global Threats to Child Safety.

    PubMed

    Mace, Sharon E

    2016-02-01

    Children have rights, as enumerated in the Declaration of the Rights of the Child, and need protection from violence, exploitation, and abuse. Global threats to child safety exist. These threats include lack of basic needs (food, clean water, sanitation), maltreatment, abandonment, child labor, child marriage, female genital mutilation, child trafficking, disasters, and armed conflicts/wars. Recent disasters and armed conflicts have led to a record number of displaced people especially children and their families. Strategies and specific programs can be developed and implemented for eliminating threats to the safety of children. PMID:26613687

  13. Global Threats to Child Safety.

    PubMed

    Mace, Sharon E

    2016-02-01

    Children have rights, as enumerated in the Declaration of the Rights of the Child, and need protection from violence, exploitation, and abuse. Global threats to child safety exist. These threats include lack of basic needs (food, clean water, sanitation), maltreatment, abandonment, child labor, child marriage, female genital mutilation, child trafficking, disasters, and armed conflicts/wars. Recent disasters and armed conflicts have led to a record number of displaced people especially children and their families. Strategies and specific programs can be developed and implemented for eliminating threats to the safety of children.

  14. Strength Testing.

    ERIC Educational Resources Information Center

    Londeree, Ben R.

    1981-01-01

    Postural deviations resulting from strength and flexibility imbalances include swayback, scoliosis, and rounded shoulders. Screening tests are one method for identifying strength problems. Tests for the evaluation of postural problems are described, and exercises are presented for the strengthening of muscles. (JN)

  15. Bomb Threat Becomes Real News.

    ERIC Educational Resources Information Center

    Gastaldo, Evann

    1999-01-01

    Discusses how the staff of the newspaper at Camarillo High School (California) covered a bomb threat at their school. Describes how they, overnight, conducted interviews, took and developed photographs, produced the layout, and published the newspaper. (RS)

  16. Attentional bias to threat: a perceptual accuracy approach.

    PubMed

    Van Damme, Stefaan; Crombez, Geert; Notebaert, Lies

    2008-12-01

    To investigate attentional bias to threatening information, the authors propose a new version of the spatial cueing paradigm in which the focus is on perceptual accuracy instead of response speed. In two experiments, healthy volunteers made unspeeded discriminations between three visual targets presented left or right. Each target was preceded by a visual cue (colored rectangle) at either the same (valid) or opposite (invalid) location. By means of differential classical conditioning with aversive white noise, a threat cue and a control cue were created. Analyses of error rates showed that cueing effects (lower proportion of errors in valid trials relative to invalid trials) were more pronounced in threat trials than in neutral trials. This threat-related bias was particularly because of threat cues reducing accuracy in invalid trials, indicating difficulty disengaging attention from threatening information. Engagement of attention was not affected by threat, as threat cues did not facilitate the processing of targets in valid trials. The findings are discussed in light of the strengths and limitations of spatial cueing tasks.

  17. Combating the Insider Cyber Threat

    SciTech Connect

    Greitzer, Frank L.; Moore, Andrew P.; Cappelli, Dawn M.; Andrews, Dee H.; Carroll, Lynn; Hull, Thomas D.

    2008-01-02

    This article represents a collaboration between PNNL, CERT/CMU, and AFRL that describes needs and related efforts by these institutions to develop technologies and approaches to counter cyber threats by insiders to informatin systems. The main focus of this article is on the need for effective training on insider threat to raise staff awareness and encourage organizations to adopt a more effective approach to identifying potential risks and take proactive steps to mitigate them.

  18. Mitigating Inadvertent Insider Threats with Incentives

    NASA Astrophysics Data System (ADS)

    Liu, Debin; Wang, Xiaofeng; Camp, L. Jean

    Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a malicious outsider to use the privileges of the inattentive insider to implement an insider attack. This risk is as old as conversion of a weak user password into root access, but the term inadvertent insider is recently coined to identify the link between the behavior and the vulnerability. In this paper, we propose to mitigate this threat using a novel risk budget mechanism that offers incentives to an insider to behave according to the risk posture set by the organization. We propose assigning an insider a risk budget, which is a specific allocation of risk points, allowing employees to take a finite number of risk-seeking choice. In this way, the employee can complete her tasks without subverting the security system, as with absolute prohibitions. In the end, the organization penalizes the insider if she fails to accomplish her task within the budget while rewards her in the presence of a surplus. Most importantly. the risk budget requires that the user make conscious visible choices to take electronic risks. We describe the theory behind the system, including specific work on the insider threats. We evaluated this approach using human-subject experiments, which demonstrate the effectiveness of our risk budget mechanism. We also present a game theoretic analysis of the mechanism.

  19. The difference isn't black and white: stereotype threat and the race gap on Raven's Advanced Progressive Matrices.

    PubMed

    Brown, Ryan P; Day, Eric Anthony

    2006-07-01

    This study addresses recent criticisms aimed at the interpretation of stereotype threat research and methodological weaknesses of previous studies that have examined race differences on Raven's Advanced Progressive Matrices (APM). African American and White undergraduates completed the APM under three conditions. In two threat conditions, participants received either standard APM instructions (standard threat) or were told that the APM was an IQ test (high threat). In a low threat condition, participants were told that the APM was a set of puzzles and that the researchers wanted their opinions of them. Results supported the stereotype threat interpretation of race differences in cognitive ability test scores. Although African American participants underperformed Whites under both standard and high threat instructions, they performed just as well as Whites did under low threat instructions.

  20. Weak measure expansive flows

    NASA Astrophysics Data System (ADS)

    Lee, Keonhee; Oh, Jumi

    2016-01-01

    A notion of measure expansivity for flows was introduced by Carrasco-Olivera and Morales in [3] as a generalization of expansivity, and they proved that there were no measure expansive flows on closed surfaces. In this paper we introduce a concept of weak measure expansivity for flows which is really weaker than that of measure expansivity, and show that there is a weak measure expansive flow on a closed surface. Moreover we show that any C1 stably weak measure expansive flow on a C∞ closed manifold M is Ω-stable, and any C1 stably measure expansive flow on M satisfies both Axiom A and the quasi-transversality condition.

  1. Coupling-deformed pointer observables and weak values

    NASA Astrophysics Data System (ADS)

    Zhang, Yu-Xiang; Wu, Shengjun; Chen, Zeng-Bing

    2016-03-01

    While the novel applications of weak values have recently attracted wide attention, weak measurement, the usual way to extract weak values, suffers from risky approximations and severe quantum noises. In this paper, we show that the weak-value information can be obtained exactly in strong measurement with postselections, via measuring the coupling-deformed pointer observables, i.e., the observables selected according to the coupling strength. With this approach, we keep all the advantages claimed by weak-measurement schemes and at the same time solve some widely criticized problems thereof, such as the questionable universality, systematical bias, and drastic inefficiency.

  2. History of Weak Interactions

    DOE R&D Accomplishments Database

    Lee, T. D.

    1970-07-01

    While the phenomenon of beta-decay was discovered near the end of the last century, the notion that the weak interaction forms a separate field of physical forces evolved rather gradually. This became clear only after the experimental discoveries of other weak reactions such as muon-decay, muon-capture, etc., and the theoretical observation that all these reactions can be described by approximately the same coupling constant, thus giving rise to the notion of a universal weak interaction. Only then did one slowly recognize that the weak interaction force forms an independent field, perhaps on the same footing as the gravitational force, the electromagnetic force, and the strong nuclear and sub-nuclear forces.

  3. Overview of inhalation exposure techniques: strengths and weaknesses.

    PubMed

    Pauluhn, Jürgen

    2005-07-01

    The vast majority of toxicity studies and risk evaluations deal with single chemicals. Due to the growing interest in potential human health risks originating from exposure to environmental pollutants or lifestyle-related complex chemical mixtures, well thought-out tailor-made mechanistic inhalation toxicity studies have been performed. In contrast to the complex mixtures potentially encountered from hazardous waste sites, drinking water disinfection by-products, natural flavoring complexes or the cumulative intake of food additives and pesticide residues, the scientific evaluation of complex airborne mixtures, such as acid aerosols, atmospheres produced by combustion or thermolysis, e.g. residual oil fly ash (ROFA), diesel and gasoline exhaust, and tobacco smoke, or volatile organic chemicals (VOCs) in residential areas, to mention but a few, is a daunting challenge for experimental toxicologists. These challenges include the controlled in situ generation of exposure atmospheres, the compositions of which are often process-determined and metastable. This means that volatile agents may partition with liquid aerosols or be adsorbed onto surfaces of solid aerosols. Similarly, the nature and composition of test atmospheres might change continuously through oxidation and aging of constituents or coagulation of particles. This, in turn, poses additional challenges to the analytical characterization of such complex test atmospheres, including the identification of potential experimental artifacts. Accordingly, highly standardized and controlled inhalation studies are required for hazard identification of complex mixtures and the results of inhalation studies have to be analyzed judiciously due to the great number of experimental variables. These variables may be related to technical issues or to the specific features of the animal model. Although inhalation exposure of animals mimics human exposure best, not all results obtained under such rigorous test conditions might necessarily also occur under real-life exposure conditions. In addition, to simulate experimentally specific use or exposure patterns may impose a particular challenge to traditional approaches in terms of relevant exposure metrics and the analytes chosen to characterize exposure atmospheres. This paper addresses major developments in the discipline of inhalation toxicology with particular emphasis on the state-of-the-art testing of complex mixtures.

  4. Cognitive Strengths and Weaknesses Associated with Prader-Willi Syndrome.

    ERIC Educational Resources Information Center

    Conners, Frances A.; Rosenquist, Celia J.; Atwell, Julie A.; Klinger, Laura Grofer

    2000-01-01

    Nine adults with Prader-Willi syndrome (PWS) and nine age- and IQ-matched adults with PWS completed standardized tests of long-term and short-term memory, visual and auditory processing, and reading and mathematics achievement. Contrary to previous findings, long-term memory in PWS subjects was strong relative to IQ and there was no evidence that…

  5. Finnish Vocational Education and Training in Comparison: Strengths and Weaknesses

    ERIC Educational Resources Information Center

    Virolainen, Maarit; Stenström, Marja-Leena

    2014-01-01

    The study investigates how the Finnish model of providing initial vocational education and training (IVET) has succeeded in terms of enhancing educational progress and employability. A relatively high level of participation in IVET makes the Finnish model distinctive from those of three other Nordic countries: Denmark, Norway and Sweden. All four…

  6. The Strengths and Weaknesses of ISO 9000 in Vocational Education

    ERIC Educational Resources Information Center

    Bevans-Gonzales, Theresa L.; Nair, Ajay T.

    2004-01-01

    ISO 9000 is a set of quality standards that assists an organization to identify, correct and prevent errors, and to promote continual improvement. Educational institutions worldwide are implementing ISO 9000 as they face increasing external pressure to maintain accountability for funding. Similar to other countries, in the United States vocational…

  7. Nonexperimental Research: Strengths, Weaknesses and Issues of Precision

    ERIC Educational Resources Information Center

    Reio, Thomas G., Jr.

    2016-01-01

    Purpose: Nonexperimental research, defined as any kind of quantitative or qualitative research that is not an experiment, is the predominate kind of research design used in the social sciences. How to unambiguously and correctly present the results of nonexperimental research, however, remains decidedly unclear and possibly detrimental to applied…

  8. Heterogeneous, weakly coupled map lattices

    NASA Astrophysics Data System (ADS)

    Sotelo Herrera, M.a. Dolores; San Martín, Jesús; Porter, Mason A.

    2016-07-01

    Coupled map lattices (CMLs) are often used to study emergent phenomena in nature. It is typically assumed (unrealistically) that each component is described by the same map, and it is important to relax this assumption. In this paper, we characterize periodic orbits and the laminar regime of type-I intermittency in heterogeneous weakly coupled map lattices (HWCMLs). We show that the period of a cycle in an HWCML is preserved for arbitrarily small coupling strengths even when an associated uncoupled oscillator would experience a period-doubling cascade. Our results characterize periodic orbits both near and far from saddle-node bifurcations, and we thereby provide a key step for examining the bifurcation structure of heterogeneous CMLs.

  9. From stereotype threat to stereotype threats: implications of a multi-threat framework for causes, moderators, mediators, consequences, and interventions.

    PubMed

    Shapiro, Jenessa R; Neuberg, Steven L

    2007-05-01

    More than 100 articles have examined the construct of stereotype threat and its implications. However, stereotype threat seems to mean different things to different researchers and has been employed to describe and explain processes and phenomena that appear to be fundamentally distinct. Complementing existing models, the authors posit a Multi-Threat Framework in which six qualitatively distinct stereotype threats arise from the intersection of two dimensions--the target of the threat (the self/one's group) and the source of the threat (the self/outgroup others/ingroup others). The authors propose that these threats constitute the core of the broader stereotype threat construct and provide the foundation for understanding additional, as of yet uncharacterized, stereotype threats. The proposed threats likely differentially peril those with different stigmatizable characteristics, have different eliciting conditions and moderators, are mediated by somewhat different processes, are coped with and compensated for in different ways, and require different interventions to overcome.

  10. Media use and children's perceptions of societal threat and personal vulnerability.

    PubMed

    Comer, Jonathan S; Furr, Jami M; Beidas, Rinad S; Babyar, Heather M; Kendall, Philip C

    2008-07-01

    This study examined children's media use (i.e., amount of television and Internet usage) and relationships to children's perceptions of societal threat and personal vulnerability. The sample consisted of 90 community youth aged 7 to 13 years (M = 10.8; 52.2% male) from diverse economic backgrounds. Analyses found children's television use to be associated with elevated perceptions of personal vulnerability to world threats (i.e., crime, terrorism, earthquakes, hurricanes, and floods). An interactive model of television use and child anxiety in accounting for children's personal threat perceptions was supported, in which the strength of television consumption in predicting children's personal threat perceptions was greater for children with greater anxiety. Relationships were found neither between children's Internet use and threat perceptions nor between media use and perceptions of societal threat.

  11. Cyber threats within civil aviation

    NASA Astrophysics Data System (ADS)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  12. The Social Construction of the Soviet Threat.

    ERIC Educational Resources Information Center

    Nathanson, Charles E.; Skelly, James M.

    For almost 40 years the perception of a Soviet threat has influenced much foreign and domestic political behavior in the United States. How to respond to the threat has been a subject of intense debate, but the reality of the threat has been taken for granted. Conviction about the reality of this threat dates back to George Kennan's long telegram…

  13. Comparative Environmental Threat Analysis: Three Case Studies.

    ERIC Educational Resources Information Center

    Latour, J. B.; Reiling, R.

    1994-01-01

    Reviews how carrying capacity for different environmental problems is operationalized. Discusses whether it is possible to compare threats, using the exceeding of carrying capacity as a yardstick. Points out problems in comparative threat analysis using three case studies: threats to European groundwater resources, threats to ecosystems in Europe,…

  14. Race and imprisonments: vigilante violence, minority threat, and racial politics.

    PubMed

    Jacobs, David; Malone, Chad; Iles, Gale

    2012-01-01

    The effects of lynchings on criminal justice outcomes have seldom been examined. Recent findings also are inconsistent about the effects of race on imprisonments. This study uses a pooled time-series design to assess lynching and racial threat effects on state imprisonments from 1972 to 2000. After controlling for Republican strength, conservatism, and other factors, lynch rates explain the growth in admission rates. The findings also show that increases in black residents produce subsequent expansions in imprisonments that likely are attributable to white reactions to this purported menace. But after the percentage of blacks reaches a substantial threshold—and the potential black vote becomes large enough to begin to reduce these harsh punishments—reductions in prison admissions occur. These results also confirm a political version of racial threat theory by indicating that increased Republican political strength produces additional imprisonments. PMID:22616115

  15. Race and imprisonments: vigilante violence, minority threat, and racial politics.

    PubMed

    Jacobs, David; Malone, Chad; Iles, Gale

    2012-01-01

    The effects of lynchings on criminal justice outcomes have seldom been examined. Recent findings also are inconsistent about the effects of race on imprisonments. This study uses a pooled time-series design to assess lynching and racial threat effects on state imprisonments from 1972 to 2000. After controlling for Republican strength, conservatism, and other factors, lynch rates explain the growth in admission rates. The findings also show that increases in black residents produce subsequent expansions in imprisonments that likely are attributable to white reactions to this purported menace. But after the percentage of blacks reaches a substantial threshold—and the potential black vote becomes large enough to begin to reduce these harsh punishments—reductions in prison admissions occur. These results also confirm a political version of racial threat theory by indicating that increased Republican political strength produces additional imprisonments.

  16. Strength nutrition.

    PubMed

    Volek, Jeff S

    2003-08-01

    Muscle strength is determined by muscle size and factors related to neural recruitment. Resistance training is a potent stimulus for increasing muscle size and strength. These increases are, to a large extent, influenced and mediated by changes in hormones that regulate important events during the recovery process following exercise. Provision of nutrients in the appropriate amounts and at the appropriate times is necessary to optimize the recovery process. This review discusses the results of research that has examined the potential for nutrition and dietary supplements to impact the acute response to resistance exercise and chronic adaptations to resistance training. To date, the most promising strategies to augment gains in muscle size and strength appear to be consumption of protein-carbohydrate calories before and after resistance exercise, and creatine supplementation.

  17. Weak shock reflection

    NASA Astrophysics Data System (ADS)

    Hunter, John K.; Brio, Moysey

    2000-05-01

    We present numerical solutions of a two-dimensional inviscid Burgers equation which provides an asymptotic description of the Mach reflection of weak shocks. In our numerical solutions, the incident, reflected, and Mach shocks meet at a triple point, and there is a supersonic patch behind the triple point, as proposed by Guderley for steady weak-shock reflection. A theoretical analysis indicates that there is an expansion fan at the triple point, in addition to the three shocks. The supersonic patch is extremely small, and this work is the first time it has been resolved.

  18. The Threat to College Teaching.

    ERIC Educational Resources Information Center

    Barol, Bill

    1984-01-01

    A new generation of young academics, known as gypsy scholars, find themselves hired temporarily, drawing the worst teaching assignments, having the heaviest workloads, and having the lowest pay. Tenure is seen as academia's brass ring. The threat to tenure in Nevada is discussed. (MLW)

  19. Cyber Threats to Nuclear Infrastructures

    SciTech Connect

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  20. Threats to the Inclusive Movement.

    ERIC Educational Resources Information Center

    Feiler, Anthony; Gibson, Howard

    1999-01-01

    This article explores four key threats to the movement toward inclusion within the field of special educational needs: the lack of precision in definitions of inclusion; the lack of research evidence, the tendency for some children to experience internal exclusion in the schools, and the continuing inclination to label children. (Author/CR)

  1. Measuring Vulnerability to Stereotype Threat

    ERIC Educational Resources Information Center

    Barnard, Lucy; Burley, Hansel; Olivarez, Arturo; Crooks, Steven

    2008-01-01

    Introduction: In this study, we examined the psychometric properties of an instrument intended to measure vulnerability to stereotype threat. Method: We revised the instrument through assessing score reliability and then examined a domain specific model using confirmatory factor analyses. After examining the responses of the total sample…

  2. Bomb Threats Taking Financial Toll

    ERIC Educational Resources Information Center

    Bowman, Darcia Harris

    2004-01-01

    Despite all its efforts to crack down on the bomb scares that disrupted classes again and again in 2003, North Carolina's Orange County district fell victim to yet another false alarm this school year, 2004. For some schools, bomb threats have become more routine than fire drills, with each incident ringing up multi-thousand-dollar tabs for…

  3. A Review of the Theory and Research Underlying the StrengthsQuest Program for Students. The Quest for Strengths

    ERIC Educational Resources Information Center

    Hodges, Timothy D.; Harter, James K.

    2005-01-01

    StrengthsQuest is a student program that focuses on strengths rather than weaknesses. It is intended to lead students to discover their natural talents and gain unique and valuable insights into how to develop such talents into strengths--strengths that equip them to succeed and to make important decisions that enable them to balance the demands…

  4. Weak interactions, omnivory and emergent food-web properties.

    PubMed Central

    Emmerson, Mark; Yearsley, Jon M.

    2004-01-01

    Empirical studies have shown that, in real ecosystems, species-interaction strengths are generally skewed in their distribution towards weak interactions. Some theoretical work also suggests that weak interactions, especially in omnivorous links, are important for the local stability of a community at equilibrium. However, the majority of theoretical studies use uniform distributions of interaction strengths to generate artificial communities for study. We investigate the effects of the underlying interaction-strength distribution upon the return time, permanence and feasibility of simple Lotka-Volterra equilibrium communities. We show that a skew towards weak interactions promotes local and global stability only when omnivory is present. It is found that skewed interaction strengths are an emergent property of stable omnivorous communities, and that this skew towards weak interactions creates a dynamic constraint maintaining omnivory. Omnivory is more likely to occur when omnivorous interactions are skewed towards weak interactions. However, a skew towards weak interactions increases the return time to equilibrium, delays the recovery of ecosystems and hence decreases the stability of a community. When no skew is imposed, the set of stable omnivorous communities shows an emergent distribution of skewed interaction strengths. Our results apply to both local and global concepts of stability and are robust to the definition of a feasible community. These results are discussed in the light of empirical data and other theoretical studies, in conjunction with their broader implications for community assembly. PMID:15101699

  5. In praise of weakness

    NASA Astrophysics Data System (ADS)

    Steinberg, Aephraim; Feizpour, Amir; Rozema; Mahler; Hayat

    2013-03-01

    Quantum physics is being transformed by a radical new conceptual and experimental approach known as weak measurement that can do everything from tackling basic quantum mysteries to mapping the trajectories of photons in a Young's double-slit experiment. Aephraim Steinberg, Amir Feizpour, Lee Rozema, Dylan Mahler and Alex Hayat unveil the power of this new technique.

  6. Hypernuclear Weak Decays

    NASA Astrophysics Data System (ADS)

    Itonaga, K.; Motoba, T.

    The recent theoretical studies of Lambda-hypernuclear weak decaysof the nonmesonic and pi-mesonic ones are developed with the aim to disclose the link between the experimental decay observables and the underlying basic weak decay interactions and the weak decay mechanisms. The expressions of the nonmesonic decay rates Gamma_{nm} and the decay asymmetry parameter alpha_1 of protons from the polarized hypernuclei are presented in the shell model framework. We then introduce the meson theoretical Lambda N -> NN interactions which include the one-meson exchanges, the correlated-2pi exchanges, and the chiral-pair-meson exchanges. The features of meson exchange potentials and their roles on the nonmesonic decays are discussed. With the adoption of the pi + 2pi/rho + 2pi/sigma + omega + K + rhopi/a_1 + sigmapi/a_1 exchange potentials, we have carried out the systematic calculations of the nonmesonic decay observables for light-to-heavy hypernuclei. The present model can account for the available experimental data of the decay rates, Gamma_n/Gamma_p ratios, and the intrinsic asymmetry parameters alpha_Lambda (alpha_Lambda is related to alpha_1) of emitted protons well and consistently within the error bars. The hypernuclear lifetimes are evaluated by converting the total weak decay rates Gamma_{tot} = Gamma_pi + Gamma_{nm} to tau, which exhibit saturation property for the hypernuclear mass A ≥ 30 and agree grossly well with experimental data for the mass range from light to heavy hypernuclei except for the very light ones. Future extensions of the model and the remaining problems are also mentioned. The pi-mesonic weak processes are briefly surveyed, and the calculations and predictions are compared and confirmed by the recent high precision FINUDA pi-mesonic decay data. This shows that the theoretical basis seems to be firmly grounded.

  7. The threat simulation theory of the evolutionary function of dreaming: Evidence from dreams of traumatized children.

    PubMed

    Valli, Katja; Revonsuo, Antti; Pälkäs, Outi; Ismail, Kamaran Hassan; Ali, Karzan Jalal; Punamäki, Raija-Leena

    2005-03-01

    The threat simulation theory of dreaming (TST) () states that dream consciousness is essentially an ancient biological defence mechanism, evolutionarily selected for its capacity to repeatedly simulate threatening events. Threat simulation during dreaming rehearses the cognitive mechanisms required for efficient threat perception and threat avoidance, leading to increased probability of reproductive success during human evolution. One hypothesis drawn from TST is that real threatening events encountered by the individual during wakefulness should lead to an increased activation of the system, a threat simulation response, and therefore, to an increased frequency and severity of threatening events in dreams. Consequently, children who live in an environment in which their physical and psychological well-being is constantly threatened should have a highly activated dream production and threat simulation system, whereas children living in a safe environment that is relatively free of such threat cues should have a weakly activated system. We tested this hypothesis by analysing the content of dream reports from severely traumatized and less traumatized Kurdish children and ordinary, non-traumatized Finnish children. Our results give support for most of the predictions drawn from TST. The severely traumatized children reported a significantly greater number of dreams and their dreams included a higher number of threatening dream events. The dream threats of traumatized children were also more severe in nature than the threats of less traumatized or non-traumatized children.

  8. Weak Gravitational Lensing

    NASA Astrophysics Data System (ADS)

    Pires, Sandrine; Starck, Jean-Luc; Leonard, Adrienne; Réfrégier, Alexandre

    2012-03-01

    This chapter reviews the data mining methods recently developed to solve standard data problems in weak gravitational lensing. We detail the different steps of the weak lensing data analysis along with the different techniques dedicated to these applications. An overview of the different techniques currently used will be given along with future prospects. Until about 30 years ago, astronomers thought that the Universe was composed almost entirely of ordinary matter: protons, neutrons, electrons, and atoms. The field of weak lensing has been motivated by the observations made in the last decades showing that visible matter represents only about 4-5% of the Universe (see Figure 14.1). Currently, the majority of the Universe is thought to be dark, that is, does not emit electromagnetic radiation. The Universe is thought to be mostly composed of an invisible, pressure less matter - potentially relic from higher energy theories - called "dark matter" (20-21%) and by an even more mysterious term, described in Einstein equations as a vacuum energy density, called "dark energy" (70%). This "dark" Universe is not well described or even understood; its presence is inferred indirectly from its gravitational effects, both on the motions of astronomical objects and on light propagation. So this point could be the next breakthrough in cosmology. Today's cosmology is based on a cosmological model that contains various parameters that need to be determined precisely, such as the matter density parameter Omega_m or the dark energy density parameter Omega_lambda. Weak gravitational lensing is believed to be the most promising tool to understand the nature of dark matter and to constrain the cosmological parameters used to describe the Universe because it provides a method to directly map the distribution of dark matter (see [1,6,60,63,70]). From this dark matter distribution, the nature of dark matter can be better understood and better constraints can be placed on dark energy

  9. Composite weak bosons

    SciTech Connect

    Suzuki, M.

    1988-04-01

    Dynamical mechanism of composite W and Z is studied in a 1/N field theory model with four-fermion interactions in which global weak SU(2) symmetry is broken explicitly by electromagnetic interaction. Issues involved in such a model are discussed in detail. Deviation from gauge coupling due to compositeness and higher order loop corrections are examined to show that this class of models are consistent not only theoretically but also experimentally.

  10. Sequential weak measurement

    SciTech Connect

    Mitchison, Graeme; Jozsa, Richard; Popescu, Sandu |||

    2007-12-15

    The notion of weak measurement provides a formalism for extracting information from a quantum system in the limit of vanishing disturbance to its state. Here we extend this formalism to the measurement of sequences of observables. When these observables do not commute, we may obtain information about joint properties of a quantum system that would be forbidden in the usual strong measurement scenario. As an application, we provide a physically compelling characterization of the notion of counterfactual quantum computation.

  11. Effect of grain strength distribution on rock fracture

    SciTech Connect

    Woffington, Austin

    1996-05-01

    This report discloses my contributions to the study of grain strength distribution and its effects in computer modeled rock lattices. Frackrock v35.15 developed by Blair and Cook, was used to model bimodal grain strength distribution and test the lattices under stress. New data was gathered by running trials with a standardized weak grain strength and compared to the original data with a mean weak grain strength. The new data set shows lattice failure to be less predictable with a higher percentage of weak sites. Strain on the lattice is affected by the wide distribution of grain strengths: the closer the grain strengths are to each other, the more predictable they get. Further testing needs to be done on larger lattices, boundary less lattices, and multiple grain strength distributions. This will show the effects of size and stress on the grain distribution strength and will add to advancing our knowledge of how rocks crack and break under stressful conditions.

  12. Cardiovascular indices of challenge and threat states predict competitive performance.

    PubMed

    Turner, Martin J; Jones, Marc V; Sheffield, David; Cross, Sophie L

    2012-10-01

    Cardiovascular (CV) reactivity is proposed by both the Biopsychosocial Model and the Theory of Challenge and Threat States in Athletes to predict competitive performance. The association between CV reactivity and competitive performance was examined in cognitive (Study 1) and motor (Study 2) tasks. In Study 1, 25 participants (9 female) completed a modified Stroop Test, and in Study 2, 21 female netballers completed a netball shooting task, under competition. Measures of CV reactivity, self-report measures of self-efficacy, control, achievement-goals and emotions along with baseline and competitive task performance were taken. CV reactivity indicative of a challenge state predicted superior performance in both tasks compared to CV reactivity indicative of a threat state. In both studies the purported relationships between CV reactivity and the psychological and emotional responses were weak or absent. The mechanisms for the observed association between CV reactivity and task performance are discussed alongside implications of the findings for future research and practice.

  13. Group Threat and Policy Change: The Spatial Dynamics of Prohibition Politics, 1890-1919.

    PubMed

    Andrews, Kenneth T; Seguin, Charles

    2015-09-01

    The authors argue that group threat is a key driver of the adoption of new and controversial policies. Conceptualizing threat in spatial terms, they argue that group threat is activated through the joint occurrence of (1) proximity to threatening groups and (2) the population density of threatened groups. By analyzing the adoption of county and state "dry laws" banning alcohol from 1890 to 1919, they first show that prohibition victories were driven by the relative strength of supportive constituencies such as native whites and rural residents, vis-à-vis opponents such as Irish, Italian, or German immigrants or Catholics. Second, they show that threat contributed to prohibition victories: counties bordering large immigrant or urban populations, which did not themselves contain similar populations, were more likely to adopt dry laws. Threat arises primarily from interactions between spatially proximate units at the local level, and therefore higher-level policy change is not reducible to the variables driving local policy.

  14. Gonococcal endocarditis: an ever-present threat

    PubMed Central

    Kawabata, Vitor Sérgio; Bittencourt, Márcio Sommer; Lovisolo, Silvana Maria; Felipe-Silva, Aloísio; de Lemos, Ana Paula Silva

    2016-01-01

    The incidence of severe complications of the Neisseria gonorrhoeae infection has presented variations over recent decades since the advent of penicillin. Gonococcal endocarditis (GE) still remains an ever-present threat afflicting the society’s poor and sexually active young population. This entity frequently requires surgical intervention and usually exhibits a poor outcome. The interval between the onset of symptoms and the diagnosis does not usually exceed 4 weeks. One of the characteristics of GE is a proclivity for aortic valve involvement with large vegetation and valve ring abscess formation. The authors report the case of a young man with a 2-week history of fever, malaise, weakness, and progressive heart failure symptoms, who had no previous history of genital complaints or cardiopathy. The physical examination was consistent with acute aortic insufficiency, which was most probably of an infectious origin. The echocardiogram showed thickened aortic cusps and valve insufficiency. After hospital admission, the patient’s clinical status worsened rapidly and he died on the second day. The autopsy findings disclosed aortic valve destruction with vegetation and a ring abscess besides signs of septic shock, such as diffuse alveolar damage, acute tubular necrosis, and zone 3 hepatocellular necrosis. The blood culture isolated N. gonorrhoeae resistant to penicillin and ciprofloxacin. The authors call attention to the pathogen of this particular infectious endocarditis, and the need for early diagnosis and evaluation by a cardiac surgery team. PMID:27547739

  15. Gonococcal endocarditis: an ever-present threat.

    PubMed

    de Campos, Fernando Peixoto Ferraz; Kawabata, Vitor Sérgio; Bittencourt, Márcio Sommer; Lovisolo, Silvana Maria; Felipe-Silva, Aloísio; de Lemos, Ana Paula Silva

    2016-01-01

    The incidence of severe complications of the Neisseria gonorrhoeae infection has presented variations over recent decades since the advent of penicillin. Gonococcal endocarditis (GE) still remains an ever-present threat afflicting the society's poor and sexually active young population. This entity frequently requires surgical intervention and usually exhibits a poor outcome. The interval between the onset of symptoms and the diagnosis does not usually exceed 4 weeks. One of the characteristics of GE is a proclivity for aortic valve involvement with large vegetation and valve ring abscess formation. The authors report the case of a young man with a 2-week history of fever, malaise, weakness, and progressive heart failure symptoms, who had no previous history of genital complaints or cardiopathy. The physical examination was consistent with acute aortic insufficiency, which was most probably of an infectious origin. The echocardiogram showed thickened aortic cusps and valve insufficiency. After hospital admission, the patient's clinical status worsened rapidly and he died on the second day. The autopsy findings disclosed aortic valve destruction with vegetation and a ring abscess besides signs of septic shock, such as diffuse alveolar damage, acute tubular necrosis, and zone 3 hepatocellular necrosis. The blood culture isolated N. gonorrhoeae resistant to penicillin and ciprofloxacin. The authors call attention to the pathogen of this particular infectious endocarditis, and the need for early diagnosis and evaluation by a cardiac surgery team. PMID:27547739

  16. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... individual poses a direct threat to the health or safety of others. (b) Direct threat means a significant risk to the health or safety of others that cannot be eliminated by a modification of policies... individual poses a direct threat to the health or safety of others, a public accommodation must make...

  17. Identifying Separation Threats in Family Therapy.

    ERIC Educational Resources Information Center

    Argles, Paul

    1983-01-01

    Outlines the types of separation threats common in troubled families. Signs that threats are being used may include inappropriate clinging behavior, phobias, psychosomatic symptoms, and anxious attachment. Therapists may find other behaviors, often seen as problems in themselves, that are really reactions to perceived separation threats. (JAC)

  18. Stereotype Threat, Test Anxiety, and Mathematics Performance

    ERIC Educational Resources Information Center

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  19. Threat Assessment Teams Target School Crisis

    ERIC Educational Resources Information Center

    Stover, Del

    2005-01-01

    In this article, the author discusses the creation of a threat-assessment team to be utilized in order to analyze each threat and the usage of threat-assessment protocols for the purpose of guiding school administrators through a crisis. These are actually developed with the advice from the US Department of Education and the Secret Service. When a…

  20. `Weak A' phenotypes

    PubMed Central

    Cartron, J. P.; Gerbal, A.; Hughes-Jones, N. C.; Salmon, C.

    1974-01-01

    Thirty-five weak A samples including fourteen A3, eight Ax, seven Aend, three Am and three Ae1 were studied in order to determine their A antigen site density, using an IgG anti-A labelled with 125I. The values obtained ranged between 30,000 A antigen sites for A3 individuals, and 700 sites for the Ae1 red cells. The hierarchy of values observed made it possible to establish a quantitative relationship between the red cell agglutinability of these phenotypes measured under standard conditions, and their antigen site density. PMID:4435836

  1. Weakly broken galileon symmetry

    SciTech Connect

    Pirtskhalava, David; Santoni, Luca; Trincherini, Enrico; Vernizzi, Filippo

    2015-09-01

    Effective theories of a scalar ϕ invariant under the internal galileon symmetryϕ→ϕ+b{sub μ}x{sup μ} have been extensively studied due to their special theoretical and phenomenological properties. In this paper, we introduce the notion of weakly broken galileon invariance, which characterizes the unique class of couplings of such theories to gravity that maximally retain their defining symmetry. The curved-space remnant of the galileon’s quantum properties allows to construct (quasi) de Sitter backgrounds largely insensitive to loop corrections. We exploit this fact to build novel cosmological models with interesting phenomenology, relevant for both inflation and late-time acceleration of the universe.

  2. Weak decay of hypernuclei

    SciTech Connect

    Grace, R.

    1983-01-01

    The Moby Dick spectrometer (at BNL) in coincidence with a range spectrometer and a TOF neutron detector will be used to study the weak decay modes of /sup 12/C. The Moby Dick spectrometer will be used to reconstruct and tag events in which specific hypernuclear states are formed in the reaction K/sup -/ + /sup 12/C ..-->.. ..pi../sup -/ + /sup 12/C. Subsequent emission of decay products (pions, protons and neutrons) in coincidence with the fast forward pion will be detected in a time and range spectrometer, and a neutron detector.

  3. Weakly broken galileon symmetry

    SciTech Connect

    Pirtskhalava, David; Santoni, Luca; Trincherini, Enrico; Vernizzi, Filippo E-mail: luca.santoni@sns.it E-mail: filippo.vernizzi@cea.fr

    2015-09-01

    Effective theories of a scalar φ invariant under the internal galileon symmetry φ→φ+b{sub μ} x{sup μ} have been extensively studied due to their special theoretical and phenomenological properties. In this paper, we introduce the notion of weakly broken galileon invariance, which characterizes the unique class of couplings of such theories to gravity that maximally retain their defining symmetry. The curved-space remnant of the galileon's quantum properties allows to construct (quasi) de Sitter backgrounds largely insensitive to loop corrections. We exploit this fact to build novel cosmological models with interesting phenomenology, relevant for both inflation and late-time acceleration of the universe.

  4. Corium crust strength measurements.

    SciTech Connect

    Lomperski, S.; Nuclear Engineering Division

    2009-11-01

    Corium strength is of interest in the context of a severe reactor accident in which molten core material melts through the reactor vessel and collects on the containment basemat. Some accident management strategies involve pouring water over the melt to solidify it and halt corium/concrete interactions. The effectiveness of this method could be influenced by the strength of the corium crust at the interface between the melt and coolant. A strong, coherent crust anchored to the containment walls could allow the yet-molten corium to fall away from the crust as it erodes the basemat, thereby thermally decoupling the melt from the coolant and sharply reducing the cooling rate. This paper presents a diverse collection of measurements of the mechanical strength of corium. The data is based on load tests of corium samples in three different contexts: (1) small blocks cut from the debris of the large-scale MACE experiments, (2) 30 cm-diameter, 75 kg ingots produced by SSWICS quench tests, and (3) high temperature crusts loaded during large-scale corium/concrete interaction (CCI) tests. In every case the corium consisted of varying proportions of UO{sub 2}, ZrO{sub 2}, and the constituents of concrete to represent a LWR melt at different stages of a molten core/concrete interaction. The collection of data was used to assess the strength and stability of an anchored, plant-scale crust. The results indicate that such a crust is likely to be too weak to support itself above the melt. It is therefore improbable that an anchored crust configuration could persist and the melt become thermally decoupled from the water layer to restrict cooling and prolong an attack of the reactor cavity concrete.

  5. Threats to Networked RFID Systems

    NASA Astrophysics Data System (ADS)

    Mitrokotsa, Aikaterini; Beye, Michael; Peris-Lopez, Pedro

    RFID technology is an area currently undergoing active development. An issue, which has received a lot of attention, is the security risks that arise due to the inherent vulnerabilities of RFID technology. Most of this attention, however, has focused on related privacy issues. The goal of this chapter is to present a more global overview of RFID threats. This can not only help experts perform risk analyses of RFID systems but also increase awareness and understanding of RFID security issues for non-experts. We use clearly defined and widely accepted concepts from both the RFID area and classical risk analysis to structure this overview.

  6. [Modern threat of Ebola virus].

    PubMed

    Płusa, Tadeusz

    2014-11-01

    Since the detection of Ebola virus in 1976. recorded 13 major epidemics in Africa. The current threat in Guinea, Liberia and Sierra Leone absorbs another victims and threatened pandemic. Picture of the disease is initially very non-characteristic (influenza-like symptoms) and quickly leads to dehydration, shock and disseminated intravascular coagulation syndrome, which is responsible for high mortality. Lack of effective antibiotic therapy and vaccine hampers the existing situation. For this reason, there is an absolute necessity to introduce regimes sanitation, quarantine at the suspects and maintain the highest safety measures for emergency responders. Developed procedures require absolute compliance.

  7. The role of threats in animal cooperation.

    PubMed

    Cant, Michael A

    2011-01-22

    In human societies, social behaviour is strongly influenced by threats of punishment, even though the threats themselves rarely need to be exercised. Recent experimental evidence suggests that similar hidden threats can promote cooperation and limit within-group selfishness in some animal systems. In other animals, however, threats appear to be ineffective. Here I review theoretical and empirical studies that help to understand the evolutionary causes of these contrasting patterns, and identify three factors-impact, accuracy and perception-that together determine the effectiveness of threats to induce cooperation.

  8. Stereotype threat and female communication styles.

    PubMed

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  9. QM02 Strength Measurement

    SciTech Connect

    Welch, J; Wu, J.; /SLAC

    2010-11-24

    In late April, Paul Emma reported that his orbit fitting program could find a reasonably good fit only if the strength of QM02 was changed from design value of -5.83 kG to -6.25 kG - a strength change of 7.3%. In late May, we made a focal length measurement of QM02 by turning off all focusing optics between YC07 and BPMS1 (in the spectrometer line) except for QM02 and adjusted the strength of QM02 so that vertical kicks by YC07 did not produce any displacements at BPMS1 (see Figure 1). The result was quoted in the LCLS elog was that QM02 appeared to 6% too weak, and approximately agreed with Paul's observation. The analysis used for the entry in the log book was based on the thin lens approximation and used the following numbers: Distance YC07 to QM02 - 5.128 m; Distance QM02 to BPMS1 - 1.778 m; and Energy - 135 MeV. These distances were computed from the X,Z coordinates given the on the large plot of the Injector on the wall of the control room. On review of the MAD output file coordinates, it seems that the distance used for QM02 to BPMS1 is not 1.778 m. The correct value is Distance, center of QM02 to BPMS1 - 1.845 m. There may be a typo on the wall chart values for the coordinates of BPMS1, or perhaps there was a misinterpretation of edge versus center of QM02. In any case, the effect of this change is that the thin lens estimate changes from 6% too weak to 9% too weak. At John Galayda's suggestion, we looked into the thin lens versus thick lens approximation. A Mathematica program was written to solve for the K value of the QM02, in the thick lens approximation, that provides point to point focusing from YC07 to BPMS1, and to compare this number with the value obtained using the thin lens approximation. The length of QM02 used in the thick lens calculation is the effective length determined by magnetic measurements of 0.108 m. The result of the Mathematica calculation is that the thin lens approximation predicts less magnet strength is required to produce the

  10. Threat sensitivity in bipolar disorder.

    PubMed

    Muhtadie, Luma; Johnson, Sheri L

    2015-02-01

    Life stress is a major predictor of the course of bipolar disorder. Few studies have used laboratory paradigms to examine stress reactivity in bipolar disorder, and none have assessed autonomic reactivity to laboratory stressors. In the present investigation we sought to address this gap in the literature. Participants, 27 diagnosed with bipolar I disorder and 24 controls with no history of mood disorder, were asked to complete a complex working memory task presented as "a test of general intelligence." Self-reported emotions were assessed at baseline and after participants were given task instructions; autonomic physiology was assessed at baseline and continuously during the stressor task. Compared to controls, individuals with bipolar disorder reported greater increases in pretask anxiety from baseline and showed greater cardiovascular threat reactivity during the task. Group differences in cardiovascular threat reactivity were significantly correlated with comorbid anxiety in the bipolar group. Our results suggest that a multimethod approach to assessing stress reactivity-including the use of physiological parameters that differentiate between maladaptive and adaptive profiles of stress responding-can yield valuable information regarding stress sensitivity and its associations with negative affectivity in bipolar disorder. (PsycINFO Database Record (c) 2015 APA, all rights reserved). PMID:25688436

  11. Threat Sensitivity in Bipolar Disorder

    PubMed Central

    Muhtadie, Luma; Johnson, Sheri L.

    2015-01-01

    Life stress is a major predictor of the course of bipolar disorder. Few studies have used laboratory paradigms to examine stress reactivity in bipolar disorder, and none have assessed autonomic reactivity to laboratory stressors. In the present investigation we sought to address this gap in the literature. Participants, 27 diagnosed with bipolar I disorder and 24 controls with no history of mood disorder, were asked to complete a complex working memory task presented as “a test of general intelligence.” Self-reported emotions were assessed at baseline and after participants were given task instructions; autonomic physiology was assessed at baseline and continuously during the stressor task. Compared to controls, individuals with bipolar disorder reported greater increases in pretask anxiety from baseline and showed greater cardiovascular threat reactivity during the task. Group differences in cardiovascular threat reactivity were significantly correlated with comorbid anxiety in the bipolar group. Our results suggest that a multimethod approach to assessing stress reactivity—including the use of physiological parameters that differentiate between maladaptive and adaptive profiles of stress responding— can yield valuable information regarding stress sensitivity and its associations with negative affectivity in bipolar disorder. PMID:25688436

  12. Weakly relativistic plasma expansion

    SciTech Connect

    Fermous, Rachid Djebli, Mourad

    2015-04-15

    Plasma expansion is an important physical process that takes place in laser interactions with solid targets. Within a self-similar model for the hydrodynamical multi-fluid equations, we investigated the expansion of both dense and under-dense plasmas. The weakly relativistic electrons are produced by ultra-intense laser pulses, while ions are supposed to be in a non-relativistic regime. Numerical investigations have shown that relativistic effects are important for under-dense plasma and are characterized by a finite ion front velocity. Dense plasma expansion is found to be governed mainly by quantum contributions in the fluid equations that originate from the degenerate pressure in addition to the nonlinear contributions from exchange and correlation potentials. The quantum degeneracy parameter profile provides clues to set the limit between under-dense and dense relativistic plasma expansions at a given density and temperature.

  13. Countering the Nuclear Terrorist Threat

    SciTech Connect

    Vantine, H C

    2002-10-04

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  14. Reptation in a Weak Driving Field

    NASA Astrophysics Data System (ADS)

    Aalberts, Daniel; van Leeuwen, J. M. J.

    1997-03-01

    A simplified model of reptation is presented. The Master Equation of the model is systematically solved by expansion in powers of the strength of the driving field. From the explicit form of the probability distribution, exact conclusions can be drawn about the average shape of the polymer, its drift velocity, and the zero field diffusion constant. Correlations between segments of the chain are calculated and turn out to be large, even in the weak driving field limit. The results are compared with simulations of the model.

  15. Strong mobility in weakly disordered systems

    SciTech Connect

    Ben-naim, Eli; Krapivsky, Pavel

    2009-01-01

    We study transport of interacting particles in weakly disordered media. Our one-dimensional system includes (i) disorder, the hopping rate governing the movement of a particle between two neighboring lattice sites is inhomogeneous, and (ii) hard core interaction, the maximum occupancy at each site is one particle. We find that over a substantial regime, the root-mean-square displacement of a particle s grows superdiffusively with time t, {sigma}{approx}({epsilon}t){sup 2/3}, where {epsilon} is the disorder strength. Without disorder the particle displacement is subdiffusive, {sigma} {approx}t{sup 1/4}, and therefore disorder strongly enhances particle mobility. We explain this effect using scaling arguments, and verify the theoretical predictions through numerical simulations. Also, the simulations show that regardless of disorder strength, disorder leads to stronger mobility over an intermediate time regime.

  16. On the costs and benefits of directing attention towards or away from threat-related stimuli: a classical conditioning experiment.

    PubMed

    Van Bockstaele, Bram; Verschuere, Bruno; De Houwer, Jan; Crombez, Geert

    2010-07-01

    In attentional bias modification programs, individuals are trained to attend away from threat in order to reduce emotional reactivity to stressful situations. However, attending towards threat is considered to be a prerequisite for fear reduction in other models of anxiety. We compared both views by manipulating attention towards or away from an acquired signal of threat. The strength of extinction and reacquisition was assessed with threat and US-expectancy ratings. We found more extinction in the attend towards threat group, compared to both the attend away from threat group and a control group in which attention was not manipulated. The results are in line with the Emotional Processing Theory and cognitive accounts of classical conditioning.

  17. On the costs and benefits of directing attention towards or away from threat-related stimuli: a classical conditioning experiment.

    PubMed

    Van Bockstaele, Bram; Verschuere, Bruno; De Houwer, Jan; Crombez, Geert

    2010-07-01

    In attentional bias modification programs, individuals are trained to attend away from threat in order to reduce emotional reactivity to stressful situations. However, attending towards threat is considered to be a prerequisite for fear reduction in other models of anxiety. We compared both views by manipulating attention towards or away from an acquired signal of threat. The strength of extinction and reacquisition was assessed with threat and US-expectancy ratings. We found more extinction in the attend towards threat group, compared to both the attend away from threat group and a control group in which attention was not manipulated. The results are in line with the Emotional Processing Theory and cognitive accounts of classical conditioning. PMID:20451175

  18. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    PubMed

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  19. World's soils are under threat

    NASA Astrophysics Data System (ADS)

    Montanarella, Luca; Pennock, Daniel Jon; McKenzie, Neil; Badraoui, Mohamed; Chude, Victor; Baptista, Isaurinda; Mamo, Tekalign; Yemefack, Martin; Singh Aulakh, Mikha; Yagi, Kazuyuki; Hong, Suk Young; Vijarnsorn, Pisoot; Zhang, Gan-Lin; Arrouays, Dominique; Black, Helaina; Krasilnikov, Pavel; Sobocká, Jaroslava; Alegre, Julio; Henriquez, Carlos Roberto; de Lourdes Mendonça-Santos, Maria; Taboada, Miguel; Espinosa-Victoria, David; AlShankiti, Abdullah; Kazem AlaviPanah, Sayed; El Mustafa Elsheikh, Elsiddig Ahmed; Hempel, Jon; Camps Arbestain, Marta; Nachtergaele, Freddy; Vargas, Ronald

    2016-02-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources Report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecurity among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the State of the World's Soil Resources Report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  20. World's soils are under threat

    NASA Astrophysics Data System (ADS)

    Montanarella, L.; Pennock, D. J.; McKenzie, N. J.; Badraoui, M.; Chude, V.; Baptista, I.; Mamo, T.; Yemefack, M.; Singh Aulakh, M.; Yagi, K.; Hong, S. Young; Vijarnsorn, P.; Zhang, G.-L.; Arrouays, D.; Black, H.; Krasilnikov, P.; Sobocká, J.; Alegre, J.; Henriquez, C. R.; Mendonça-Santos, M. L.; Taboada, M.; Espinosa-Victoria, D.; AlShankiti, A.; AlaviPanah, S. K.; Elsheikh, E. A. E.; Hempel, J.; Camps Arbestain, M.; Nachtergaele, F.; Vargas, R.

    2015-12-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecure among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the SWSR report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  1. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    PubMed Central

    Zhu, Yong; Zhao, Yufang; Ybarra, Oscar; Stephan, Walter G.; Yang, Qing

    2015-01-01

    Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes–Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants’ memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed. PMID:26635669

  2. Enhancing entanglement trapping by weak measurement and quantum measurement reversal

    SciTech Connect

    Zhang, Ying-Jie; Han, Wei; Fan, Heng; Xia, Yun-Jie

    2015-03-15

    In this paper, we propose a scheme to enhance trapping of entanglement of two qubits in the environment of a photonic band gap material. Our entanglement trapping promotion scheme makes use of combined weak measurements and quantum measurement reversals. The optimal promotion of entanglement trapping can be acquired with a reasonable finite success probability by adjusting measurement strengths. - Highlights: • Propose a scheme to enhance entanglement trapping in photonic band gap material. • Weak measurement and its reversal are performed locally on individual qubits. • Obtain an optimal condition for maximizing the concurrence of entanglement trapping. • Entanglement sudden death can be prevented by weak measurement in photonic band gap.

  3. Weak measurements beyond the Aharonov-Albert-Vaidman formalism

    SciTech Connect

    Wu Shengjun; Li Yang

    2011-05-15

    We extend the idea of weak measurements to the general case, provide a complete treatment, and obtain results for both the regime when the preselected and postselected states (PPS) are almost orthogonal and the regime when they are exactly orthogonal. We surprisingly find that for a fixed interaction strength, there may exist a maximum signal amplification and a corresponding optimum overlap of PPS to achieve it. For weak measurements in the orthogonal regime, we find interesting quantities that play the same role that weak values play in the nonorthogonal regime.

  4. Effect of evaluation threat on procrastination behavior.

    PubMed

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  5. Sensor-guided threat countermeasure system

    DOEpatents

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  6. DOE site-specific threat assessment

    SciTech Connect

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-07-12

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs.

  7. Autonomous Realtime Threat-Hunting Robot (ARTHR

    ScienceCinema

    INL

    2016-07-12

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  8. Autonomous Realtime Threat-Hunting Robot (ARTHR

    SciTech Connect

    INL

    2008-05-29

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  9. Dynamic Strength Ceramic Nanocomposites Under Pulse Loading

    NASA Astrophysics Data System (ADS)

    Skripnyak, Evgeniya G.; Skripnyak, Vladimir V.; Vaganova, Irina K.; Skripnyak, Vladimir A.

    2015-06-01

    Multi-scale computer simulation approach has been applied to research of strength of nanocomposites under dynamic loading. The influence of mesoscopic substructures on the dynamic strength of ceramic and hybrid nanocomposites, which can be formed using additive manufacturing were numerically investigated. At weak shock wave loadings the shear strength and the spall strength of ceramic and hybrid nanocomposites depends not only phase concentration and porosity, but size parameters of skeleton substructures. The influence of skeleton parameter on the shear strength and the spall strength of ceramic nanocomposites with the same concentration of phases decreases with increasing amplitude of the shock pulse of microsecond duration above the double amplitude of the Hugoniot elastic limit of nanocomposites. This research carried out in 2014 -2015 was supported by grant from The Tomsk State University Academic D.I. Mendeleev Fund Program and also Ministry of Sciences and Education of Russian Federation (State task 2014/223, project 1943, Agreement 14.132.

  10. Threats: power, family mealtimes, and social influence.

    PubMed

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology.

  11. Ideology, Social Threat, and the Death Sentence: Capital Sentences across Time and Space

    ERIC Educational Resources Information Center

    Jacobs, David; Carmichael, Jason T.

    2004-01-01

    Capital punishment is the most severe criminal penalty, yet we know little about the factors that produce jurisdictional differences in the use of the death sentence. Political explanations emphasize conservative values and the strength of more conservative political parties. Threat accounts suggest that this sentence will be more likely in…

  12. Threat by association: do distant intergroup threats carry-over into local intolerance?

    PubMed

    Bouman, Thijs; van Zomeren, Martijn; Otten, Sabine

    2014-09-01

    Individuals are often confronted with intergroup threats, yet many of these threats emanate from distant groups that most individuals are unlikely to encounter in their local environment. An important yet unanswered question is whether reactions to those threats, such as intolerance towards the threatening group, carry over to other groups that individuals actually do encounter in their local environment (e.g., immigrants). The main goal of our studies was to experimentally identify this carry-over effect of intergroup threat. Specifically, we hypothesized that (by definition relatively abstract) symbolic threats (e.g., threats to the ingroup's worldview) have an especially strong carry-over potential because those threats can be easily attributed to other outgroups. We tested these predictions in one correlational and two experimental studies. The results of all three studies confirmed our hypothesis that particularly distant symbolic threats were predictive of intolerance towards local outgroups.

  13. Nuclear threats from small states

    SciTech Connect

    Kahan, J.H.

    1994-06-13

    What are the policy implications regarding proliferation and counter proliferation of nuclear weapons among Third World states. How does deterrence operate outside the parameters of superpower confrontation as defined by the cold war elaborate system of constraints enforced by concepts like mutual assured destruction, and counter-value and counter-force targeting. How can US policymakers devise contingencies for dealing with nuclear threats posed by countries like North Korea, Libya, Iraq, Iran, and Syria. These are some of the unsettling but nevertheless important questions addressed by the author in this monograph. In his analysis, Mr. Jerome Kahan examines the likelihood that one or more of these countries will use nuclear weapons before the year 2000. He also offers a framework that policymakers and planners might use in assessing US interests in preempting the use of nuclear weapons or in retaliating for their use. Ironically, with the end of the cold war, it is imperative that defense strategists, policymakers, and military professionals think about the `unthinkable`. In the interest of fostering debate on this important subject, the Strategic Studies Institute commends this insightful monograph.

  14. In Brief: Forecasting meningitis threats

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  15. Stereotype threat prevents perceptual learning.

    PubMed

    Rydell, Robert J; Shiffrin, Richard M; Boucher, Kathryn L; Van Loo, Katie; Rydell, Michael T

    2010-08-10

    Stereotype threat (ST) refers to a situation in which a member of a group fears that her or his performance will validate an existing negative performance stereotype, causing a decrease in performance. For example, reminding women of the stereotype "women are bad at math" causes them to perform more poorly on math questions from the SAT and GRE. Performance deficits can be of several types and be produced by several mechanisms. We show that ST prevents perceptual learning, defined in our task as an increasing rate of search for a target Chinese character in a display of such characters. Displays contained two or four characters and half of these contained a target. Search rate increased across a session of training for a control group of women, but not women under ST. Speeding of search is typically explained in terms of learned "popout" (automatic attraction of attention to a target). Did women under ST learn popout but fail to express it? Following training, the women were shown two colored squares and asked to choose the one with the greater color saturation. Superimposed on the squares were task-irrelevant Chinese characters. For women not trained under ST, the presence of a trained target on one square slowed responding, indicating that training had caused the learning of an attention response to targets. Women trained under ST showed no slowing, indicating that they had not learned such an attention response.

  16. Plasma transport theory spanning weak to strong coupling

    SciTech Connect

    Daligault, Jérôme; Baalrud, Scott D.

    2015-06-29

    We describe some of the most striking characteristics of particle transport in strongly coupled plasmas across a wide range of Coulomb coupling strength. We then discuss the effective potential theory, which is an approximation that was recently developed to extend conventional weakly coupled plasma transport theory into the strongly coupled regime in a manner that is practical to evaluate efficiently.

  17. Bomb Threats and Bomb Search Techniques.

    ERIC Educational Resources Information Center

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  18. Bombs and Bomb Threats in the School

    ERIC Educational Resources Information Center

    Starkey, David J.; Starkey, John D.

    1977-01-01

    Bombs and the threat of bombing can leave school personnel faced by an explosive hazard without knowledge of what to do. Therefore, a preplanned response is necessary. Discusses four major stages of dealing with bombs and bomb threats. (Author/RK)

  19. Personality Correlates of Nuclear War Threat Perception.

    ERIC Educational Resources Information Center

    Mayton, Daniel M., II

    This study investigated the relationship between individual personality characteristics and the threat of nuclear war among 192 introductory psychology students at a small college in the Pacific Northwest. One measure of nuclear threat perception was spontaneous concern, which was assessed using five presentations each of the incomplete sentences,…

  20. Keeping Schools Safe through Threat Assessment

    ERIC Educational Resources Information Center

    Barton, Rhonda

    2008-01-01

    This article illustrates how effective a threat assessment program like the Mid-Valley Student Threat Assessment (STAT) program can be in dealing with violent and threatening students. STAT is a a regional system that draws together resources from schools, mental health agencies, law enforcement bureaus, and other youth-serving organizations in…

  1. How species respond to multiple extinction threats.

    PubMed Central

    Isaac, Nick J. B.; Cowlishaw, Guy

    2004-01-01

    It is well established that different species vary in their vulnerability to extinction risk and that species biology can underpin much of this variation. By contrast, very little is known about how the same species responds to different threat processes. The purpose of this paper is therefore twofold: to examine the extent to which a species' vulnerability to different types of threat might covary and to explore the biological traits that are associated with threat-specific responses. We use an objective and quantitative measure of local extinction risk to show that vulnerability to local population decline in primates varies substantially among species and between threat types. Our results show that a species' response to one threat type does not predict its response to others. Multivariate analyses also suggest that different mechanisms of decline are associated with each type of threat, since different biological traits are correlated with each threat-specific response. Primate species at risk from forestry tend to exhibit low ecological flexibility, while those species vulnerable to agriculture tend to live in the canopy and eat low-fruit diets; in further contrast, primates at risk from hunting tend to exhibit large body size. Our analyses therefore indicate that a species' vulnerability to local extinction can be highly variable and is likely to depend on both threat type and biology. PMID:15306363

  2. The Nature of the Bioterrorism Threat

    SciTech Connect

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  3. The Smallpox Threat: The School Nurse's Role

    ERIC Educational Resources Information Center

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  4. How you perceive threat determines your behavior

    PubMed Central

    Fernandes, Orlando; Portugal, Liana C. L.; Alves, Rita C. S.; Campagnoli, Rafaela R.; Mocaiber, Izabela; David, Isabel P. A.; Erthal, Fátima C. S.; Volchan, Eliane; de Oliveira, Leticia; Pereira, Mirtes G.

    2013-01-01

    The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT) paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed toward the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during directed toward threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, directed away threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by threat stimuli directed toward the observer. In sum, our data support the concept that emotions are indeed action tendencies. PMID:24115925

  5. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... individual poses a direct threat to the health or safety of others. (b) In determining whether an individual poses a direct threat to the health or safety of others, a public accommodation must make an individualized assessment, based on reasonable judgment that relies on current medical knowledge or on the...

  6. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... individual poses a direct threat to the health or safety of others. (b) In determining whether an individual poses a direct threat to the health or safety of others, a public accommodation must make an individualized assessment, based on reasonable judgment that relies on current medical knowledge or on the...

  7. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... individual poses a direct threat to the health or safety of others. (b) In determining whether an individual poses a direct threat to the health or safety of others, a public accommodation must make an individualized assessment, based on reasonable judgment that relies on current medical knowledge or on the...

  8. 28 CFR 35.139 - Direct threat.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... activities of that public entity when that individual poses a direct threat to the health or safety of others. (b) In determining whether an individual poses a direct threat to the health or safety of others, a public entity must make an individualized assessment, based on reasonable judgment that relies on...

  9. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... individual poses a direct threat to the health or safety of others. (b) In determining whether an individual poses a direct threat to the health or safety of others, a public accommodation must make an individualized assessment, based on reasonable judgment that relies on current medical knowledge or on the...

  10. 28 CFR 35.139 - Direct threat.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... activities of that public entity when that individual poses a direct threat to the health or safety of others. (b) In determining whether an individual poses a direct threat to the health or safety of others, a public entity must make an individualized assessment, based on reasonable judgment that relies on...

  11. Cosmic Impacts: The DoomsDay Threat

    NASA Astrophysics Data System (ADS)

    McGaha, J.

    1998-07-01

    Recent science fiction movies (Deep Impact and Armageddon) have brought public attention to the threat of possible impacts from space. Just how real is this threat and what would be the consequences of such an impact? Can we do anything to prevent it? The survival of civilization may depend on it.

  12. Development of the Academic Stereotype Threat Inventory

    ERIC Educational Resources Information Center

    Pseekos, A. Chantelle; Dahlen, Eric R.; Levy, Jacob J.

    2008-01-01

    The authors describe the development and preliminary validation of the Academic Stereotype Threat Inventory, a self-report measurement of math-related stereotype threat among women. A preliminary version of the instrument was administered to 308 undergraduate women. Principal component analysis yielded a 3-factor solution. Convergent and…

  13. Shades of Threat: Racial Identity as a Moderator of Stereotype Threat

    ERIC Educational Resources Information Center

    Davis, Claytie, III; Aronson, Joshua; Salinas, Moises

    2006-01-01

    This study investigated Black racial identity attitudes as a moderator of intellectual performance in potentially stereotype threatening situations. Ninety-eight African American students were randomly assigned to one of three stereotype threatening conditions: low threat, medium threat, or high threat. Analyses confirmed a stereotype threat…

  14. Inferring the nature of anthropogenic threats from long-term abundance records.

    PubMed

    Shoemaker, Kevin T; Akçakaya, H Resit

    2015-02-01

    Diagnosing the processes that threaten species persistence is critical for recovery planning and risk forecasting. Dominant threats are typically inferred by experts on the basis of a patchwork of informal methods. Transparent, quantitative diagnostic tools would contribute much-needed consistency, objectivity, and rigor to the process of diagnosing anthropogenic threats. Long-term census records, available for an increasingly large and diverse set of taxa, may exhibit characteristic signatures of specific threatening processes and thereby provide information for threat diagnosis. We developed a flexible Bayesian framework for diagnosing threats on the basis of long-term census records and diverse ancillary sources of information. We tested this framework with simulated data from artificial populations subjected to varying degrees of exploitation and habitat loss and several real-world abundance time series for which threatening processes are relatively well understood: bluefin tuna (Thunnus maccoyii) and Atlantic cod (Gadus morhua) (exploitation) and Red Grouse (Lagopus lagopus scotica) and Eurasian Skylark (Alauda arvensis) (habitat loss). Our method correctly identified the process driving population decline for over 90% of time series simulated under moderate to severe threat scenarios. Successful identification of threats approached 100% for severe exploitation and habitat loss scenarios. Our method identified threats less successfully when threatening processes were weak and when populations were simultaneously affected by multiple threats. Our method selected the presumed true threat model for all real-world case studies, although results were somewhat ambiguous in the case of the Eurasian Skylark. In the latter case, incorporation of an ancillary source of information (records of land-use change) increased the weight assigned to the presumed true model from 70% to 92%, illustrating the value of the proposed framework in bringing diverse sources of

  15. Inferring the nature of anthropogenic threats from long-term abundance records.

    PubMed

    Shoemaker, Kevin T; Akçakaya, H Resit

    2015-02-01

    Diagnosing the processes that threaten species persistence is critical for recovery planning and risk forecasting. Dominant threats are typically inferred by experts on the basis of a patchwork of informal methods. Transparent, quantitative diagnostic tools would contribute much-needed consistency, objectivity, and rigor to the process of diagnosing anthropogenic threats. Long-term census records, available for an increasingly large and diverse set of taxa, may exhibit characteristic signatures of specific threatening processes and thereby provide information for threat diagnosis. We developed a flexible Bayesian framework for diagnosing threats on the basis of long-term census records and diverse ancillary sources of information. We tested this framework with simulated data from artificial populations subjected to varying degrees of exploitation and habitat loss and several real-world abundance time series for which threatening processes are relatively well understood: bluefin tuna (Thunnus maccoyii) and Atlantic cod (Gadus morhua) (exploitation) and Red Grouse (Lagopus lagopus scotica) and Eurasian Skylark (Alauda arvensis) (habitat loss). Our method correctly identified the process driving population decline for over 90% of time series simulated under moderate to severe threat scenarios. Successful identification of threats approached 100% for severe exploitation and habitat loss scenarios. Our method identified threats less successfully when threatening processes were weak and when populations were simultaneously affected by multiple threats. Our method selected the presumed true threat model for all real-world case studies, although results were somewhat ambiguous in the case of the Eurasian Skylark. In the latter case, incorporation of an ancillary source of information (records of land-use change) increased the weight assigned to the presumed true model from 70% to 92%, illustrating the value of the proposed framework in bringing diverse sources of

  16. Forecasting Lightning Threat using Cloud-Resolving Model Simulations

    NASA Technical Reports Server (NTRS)

    McCaul, Eugene W., Jr.; Goodman, Steven J.; LaCasse, Katherine M.; Cecil, Daniel J.

    2008-01-01

    Two new approaches are proposed and developed for making time and space dependent, quantitative short-term forecasts of lightning threat, and a blend of these approaches is devised that capitalizes on the strengths of each. The new methods are distinctive in that they are based entirely on the ice-phase hydrometeor fields generated by regional cloud-resolving numerical simulations, such as those produced by the WRF model. These methods are justified by established observational evidence linking aspects of the precipitating ice hydrometeor fields to total flash rates. The methods are straightforward and easy to implement, and offer an effective near-term alternative to the incorporation of complex and costly cloud electrification schemes into numerical models. One method is based on upward fluxes of precipitating ice hydrometeors in the mixed phase region at the-15 C level, while the second method is based on the vertically integrated amounts of ice hydrometeors in each model grid column. Each method can be calibrated by comparing domain-wide statistics of the peak values of simulated flash rate proxy fields against domain-wide peak total lightning flash rate density data from observations. Tests show that the first method is able to capture much of the temporal variability of the lightning threat, while the second method does a better job of depicting the areal coverage of the threat. Our blended solution is designed to retain most of the temporal sensitivity of the first method, while adding the improved spatial coverage of the second. Exploratory tests for selected North Alabama cases show that, because WRF can distinguish the general character of most convective events, our methods show promise as a means of generating quantitatively realistic fields of lightning threat. However, because the models tend to have more difficulty in predicting the instantaneous placement of storms, forecasts of the detailed location of the lightning threat based on single

  17. Inferences from counterfactual threats and promises.

    PubMed

    Egan, Suzanne M; Byrne, Ruth M J

    2012-01-01

    We examine how people understand and reason from counterfactual threats, for example, "if you had hit your sister, I would have grounded you" and counterfactual promises, for example, "if you had tidied your room, I would have given you ice-cream." The first experiment shows that people consider counterfactual threats, but not counterfactual promises, to have the illocutionary force of an inducement. They also make the immediate inference that the action mentioned in the "if" part of the counterfactual threat and promise did not occur. The second experiment shows that people make more negative inferences (modus tollens and denial of the antecedent) than affirmative inferences (modus ponens and affirmation of the consequent) from counterfactual threats and promises, unlike indicative threats and promises. We discuss the implications of the results for theories of the mental representations and cognitive processes that underlie conditional inducements. PMID:22580411

  18. Negative probabilities and information gain in weak measurements

    NASA Astrophysics Data System (ADS)

    Zhu, Xuanmin; Wei, Qun; Liu, Quanhui; Wu, Shengjun

    2013-11-01

    We study the outcomes in a general measurement with postselection, and derive upper bounds for the pointer readings in weak measurement. The probabilities inferred from weak measurements change along with the coupling strength; and the true probabilities can be obtained when the coupling is strong enough. By calculating the information gain of the measuring device about which path the particles pass through, we show that the “negative probabilities” only emerge for cases when the information gain is little due to very weak coupling between the measuring device and the particles. When the coupling strength increases, we can unambiguously determine whether a particle passes through a given path every time, hence the average shifts always represent true probabilities, and the strange “negatives probabilities” disappear.

  19. Application of Strength Diagnosis.

    ERIC Educational Resources Information Center

    Newton, Robert U.; Dugan, Eric

    2002-01-01

    Discusses the various strength qualities (maximum strength, high- and low-load speed strength, reactive strength, rate of force development, and skill performance), noting why a training program design based on strength diagnosis can lead to greater efficacy and better performance gains for the athlete. Examples of tests used to assess strength…

  20. Promoting dental hygiene to children: comparing traditional and interactive media following threat appeals.

    PubMed

    Panic, Katarina; Cauberghe, Veroline; De Pelsmacker, Patrick

    2014-01-01

    Until now, social marketing campaigns mainly targeted children using traditional media. However, little is known about the effectiveness of computer games to communicate health-related information to children. This study compares the impact of an interactive game as a medium to provide health information and improve children's dietary habits to the impact of more traditional media. Using a 2 × 3 between-subject factorial design with 190 children (7-9 years old), this study investigates the effect of threat messages (weak vs. strong) concerning dental hygiene on behavioral outcome (snack choice), and how this effect is moderated by the type of medium used to communicate subsequent health information after the threat appeal (computer game, information brochure, narrative story). Results show a positive significant effect of perceived threat on children's adaptive behavior. However, this effect only remains significant when afterwards children are exposed to a narrative health-related story. When children play a game or read a brochure, they need to devote more attention to process this content, distracting them from the original threat message. In sum, when a threat message is followed by additional health information, the medium through which this information is presented influences the effectiveness of the preceding threat message.

  1. Promoting dental hygiene to children: comparing traditional and interactive media following threat appeals.

    PubMed

    Panic, Katarina; Cauberghe, Veroline; De Pelsmacker, Patrick

    2014-01-01

    Until now, social marketing campaigns mainly targeted children using traditional media. However, little is known about the effectiveness of computer games to communicate health-related information to children. This study compares the impact of an interactive game as a medium to provide health information and improve children's dietary habits to the impact of more traditional media. Using a 2 × 3 between-subject factorial design with 190 children (7-9 years old), this study investigates the effect of threat messages (weak vs. strong) concerning dental hygiene on behavioral outcome (snack choice), and how this effect is moderated by the type of medium used to communicate subsequent health information after the threat appeal (computer game, information brochure, narrative story). Results show a positive significant effect of perceived threat on children's adaptive behavior. However, this effect only remains significant when afterwards children are exposed to a narrative health-related story. When children play a game or read a brochure, they need to devote more attention to process this content, distracting them from the original threat message. In sum, when a threat message is followed by additional health information, the medium through which this information is presented influences the effectiveness of the preceding threat message. PMID:24393019

  2. Forecasting Lightning Threat Using WRF Proxy Fields

    NASA Technical Reports Server (NTRS)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  3. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    PubMed

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat.

  4. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  5. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  6. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  7. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  8. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  9. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    SciTech Connect

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  10. Insider threat to secure facilities: data analysis

    SciTech Connect

    Not Available

    1980-05-09

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs.

  11. Experimental investigations of weak definite and weak indefinite noun phrases

    PubMed Central

    Klein, Natalie M.; Gegg-Harrison, Whitney M.; Carlson, Greg N.; Tanenhaus, Michael K.

    2013-01-01

    Definite noun phrases typically refer to entities that are uniquely identifiable in the speaker and addressee’s common ground. Some definite noun phrases (e.g. the hospital in Mary had to go the hospital and John did too) seem to violate this uniqueness constraint. We report six experiments that were motivated by the hypothesis that these “weak definite” interpretations arise in “incorporated” constructions. Experiments 1-3 compared nouns that seem to allow for a weak definite interpretation (e.g. hospital, bank, bus, radio) with those that do not (e.g. farm, concert, car, book). Experiments 1 and 2 used an instruction-following task and picture-judgment task, respectively, to demonstrate that a weak definite need not uniquely refer. In Experiment 3 participants imagined scenarios described by sentences such as The Federal Express driver had to go to the hospital/farm. The imagined scenarios following weak definite noun phrases were more likely to include conventional activities associated with the object, whereas following regular nouns, participants were more likely to imagine scenarios that included typical activities associated with the subject; similar effects were observed with weak indefinites. Experiment 4 found that object-related activities were reduced when the same subject and object were used with a verb that does not license weak definite interpretations. In Experiment 5, a science fiction story introduced an artificial lexicon for novel concepts. Novel nouns that shared conceptual properties with English weak definite nouns were more likely to allow weak reference in a judgment task. Experiment 6 demonstrated that familiarity for definite articles and anti- familiarity for indefinite articles applies to the activity associated with the noun, consistent with predictions made by the incorporation analysis. PMID:23685208

  12. Resisting Weakness of the Will

    PubMed Central

    Levy, Neil

    2012-01-01

    I develop an account of weakness of the will that is driven by experimental evidence from cognitive and social psychology. I will argue that this account demonstrates that there is no such thing as weakness of the will: no psychological kind corresponds to it. Instead, weakness of the will ought to be understood as depletion of System II resources. Neither the explanatory purposes of psychology nor our practical purposes as agents are well-served by retaining the concept. I therefore suggest that we ought to jettison it, in favour of the vocabulary and concepts of cognitive psychology. PMID:22984298

  13. Weak-shock reflection factors

    SciTech Connect

    Reichenbach, H.; Kuhl, A.L.

    1993-09-07

    The purpose of this paper is to compare reflection factors for weak shocks from various surfaces, and to focus attention on some unsolved questions. Three different cases are considered: square-wave planar shock reflection from wedges; square-wave planar shock reflection from cylinders; and spherical blast wave reflection from a planar surface. We restrict ourselves to weak shocks. Shocks with a Mach number of M{sub O} < 1.56 in air or with an overpressure of {Delta}{sub PI} < 25 psi (1.66 bar) under normal ambient conditions are called weak.

  14. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    PubMed Central

    Carels, Robert A.; Domoff, Sarah E.; Burmeister, Jacob M.; Koball, Afton M.; Hinman, Nova G.; Davis, Alan K.; Oehlhof, Marissa Wagner; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A.

    2013-01-01

    Objective The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method 216 adults completed an online survey. Participants’ mean age was 23.6 (SD 10.1; range 18–64) years and mean BMI was 31.6 (SD 7.5) kg/m2. Results Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Conclusion Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals’ susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes’ impact on cognitive and behavioral outcomes. PMID:23736227

  15. Advanced Insider Threat Mitigation Workshop Instructional Materials

    SciTech Connect

    Gibbs, Philip; Larsen, Robert; O'Brien, Mike; Edmunds, Tom

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  16. Children's Threats: When Are They Serious?

    MedlinePlus

    ... TV shows, movies, music, magazines, comics, books, video games, and Internet sites mental illness, such as depression, ... others are concerned? When a child makes a serious threat it should not be dismissed as just ...

  17. Acid Rain: The Silent Environmental Threat.

    ERIC Educational Resources Information Center

    Zmud, Mia

    1992-01-01

    Describes the silent environmental threat posed by acid rain. Caused mainly by manmade pollutants, acid rain damages water and trees, decreases visibility, corrodes monuments, and threatens public health. The article includes guidelines for action. (SM)

  18. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    ScienceCinema

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2016-07-12

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  19. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    SciTech Connect

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2008-05-29

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  20. Encoding and reinstatement of threat: recognition potentials.

    PubMed

    Weymar, Mathias; Bradley, Margaret M; Hamm, Alfons O; Lang, Peter J

    2014-01-01

    On a recognition test, stimuli originally encoded in the context of shock threat show an enhanced late parietal positivity during later recognition compared to stimuli encoded during safety, particularly for emotionally arousing stimuli. The present study investigated whether this ERP old/new effect is further influenced when a threat context is reinstated during the recognition test. ERPs were measured in a yes-no recognition test for words rated high or low in emotional arousal that were encoded and recognized in the context of cues that signaled threat of shock or safety. Correct recognition of words encoded under threat, irrespective of reinstatement, was associated with an enhanced old-new ERP difference (500-700ms; centro-parietal), and this difference was only reliable for emotionally arousing words. Taken together, the data suggest that information processed in a stressful context are associated with better recollection on later recognition, an effect that was not modulated by reinstating the stressful context at retrieval.

  1. Childhood maltreatment and threats with weapons.

    PubMed

    Casiano, Hygiea; Mota, Natalie; Afifi, Tracie O; Enns, Murray W; Sareen, Jitender

    2009-11-01

    The relationship between childhood maltreatment and future threats with weapons is unknown. We examined data from the nationally representative National Comorbidity Survey Replication (n = 5692) and conducted multiple logistic regression analyses to determine the association between childhood maltreatment and lifetime behavior of threatening others with a gun or other weapon. After adjusting for sociodemographic variables, physical abuse, sexual abuse, and witnessing domestic violence were significantly associated with threats made with a gun (adjusted odds ratios [AOR] ranging between 3.38 and 4.07) and other weapons (AOR ranging between 2.16 and 2.83). The greater the number of types of maltreatment experienced, the stronger the association with lifetime threats made to others with guns and any weapons. Over 94% of respondents who experienced maltreatment and made threats reported that the maltreatment occurred prior to threatening others with weapons. Prevention efforts that reduce exposure to maltreatment may reduce violent behavior in later life.

  2. Hydrology: Indo-Gangetic groundwater threat

    NASA Astrophysics Data System (ADS)

    Fendorf, Scott; Benner, Shawn G.

    2016-10-01

    Increasing groundwater extraction supports hundreds of millions of people across the Indo-Gangetic Basin. Data suggests that despite the increase in withdrawals, groundwater depletion is localized and the most widespread threat is contamination.

  3. Intergroup threat gates social attention in humans.

    PubMed

    Chen, Yujie; Zhao, Yufang

    2015-02-01

    Humans shift their attention to follow another person's gaze direction, a phenomenon called gaze cueing. This study examined whether a particular social factor, intergroup threat, modulates gaze cueing. As expected, stronger responses of a particular in-group to a threatening out-group were observed when the in-group, conditioned to perceive threat from one of two out-groups, was presented with facial stimuli from the threatening and non-threatening out-groups. These results suggest that intergroup threat plays an important role in shaping social attention. Furthermore, larger gaze-cueing effects were found for threatening out-group faces than for in-group faces only at the 200 ms but not the 800 ms stimulus onset asynchrony (SOA); the specificity of the gaze-cueing effects at the short SOA suggests that threat cues modulate the involuntary component of gaze cueing. PMID:25716090

  4. Weak interactions and presupernova evolution

    SciTech Connect

    Aufderheide, M.B. State Univ. of New York . Dept. of Physics)

    1991-02-19

    The role of weak interactions, particularly electron capture and {beta}{sup {minus}} decay, in presupernova evolution is discussed. The present uncertainty in these rates is examined and the possibility of improving the situation is addressed. 12 refs., 4 figs.

  5. Counter-terrorism threat prediction architecture

    NASA Astrophysics Data System (ADS)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  6. Social identity threat motivates science-discrediting online comments.

    PubMed

    Nauroth, Peter; Gollwitzer, Mario; Bender, Jens; Rothmund, Tobias

    2015-01-01

    Experiencing social identity threat from scientific findings can lead people to cognitively devalue the respective findings. Three studies examined whether potentially threatening scientific findings motivate group members to take action against the respective findings by publicly discrediting them on the Web. Results show that strongly (vs. weakly) identified group members (i.e., people who identified as "gamers") were particularly likely to discredit social identity threatening findings publicly (i.e., studies that found an effect of playing violent video games on aggression). A content analytical evaluation of online comments revealed that social identification specifically predicted critiques of the methodology employed in potentially threatening, but not in non-threatening research (Study 2). Furthermore, when participants were collectively (vs. self-) affirmed, identification did no longer predict discrediting posting behavior (Study 3). These findings contribute to the understanding of the formation of online collective action and add to the burgeoning literature on the question why certain scientific findings sometimes face a broad public opposition.

  7. Bio-Terrorism Threat and Casualty Prevention

    SciTech Connect

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  8. Advanced insider threat mitigation workshop instructional materials

    SciTech Connect

    Gibbs, Philip; Larsen, Robert; O Brien, Mike; Edmunds, Tom

    2008-11-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.

  9. Space Station Program threat and vulnerability analysis

    NASA Technical Reports Server (NTRS)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  10. Precision Metrology Using Weak Measurements

    NASA Astrophysics Data System (ADS)

    Zhang, Lijian; Datta, Animesh; Walmsley, Ian A.

    2015-05-01

    Weak values and measurements have been proposed as a means to achieve dramatic enhancements in metrology based on the greatly increased range of possible measurement outcomes. Unfortunately, the very large values of measurement outcomes occur with highly suppressed probabilities. This raises three vital questions in weak-measurement-based metrology. Namely, (Q1) Does postselection enhance the measurement precision? (Q2) Does weak measurement offer better precision than strong measurement? (Q3) Is it possible to beat the standard quantum limit or to achieve the Heisenberg limit with weak measurement using only classical resources? We analyze these questions for two prototypical, and generic, measurement protocols and show that while the answers to the first two questions are negative for both protocols, the answer to the last is affirmative for measurements with phase-space interactions, and negative for configuration space interactions. Our results, particularly the ability of weak measurements to perform at par with strong measurements in some cases, are instructive for the design of weak-measurement-based protocols for quantum metrology.

  11. Comparison of quadriceps strength and handgrip strength in their association with health outcomes in older adults in primary care.

    PubMed

    Chan, On Ying A; van Houwelingen, Anne H; Gussekloo, Jacobijn; Blom, Jeanet W; den Elzen, Wendy P J

    2014-01-01

    Sarcopenia is thought to play a major role in the functional impairment that occurs with old age. In clinical practice, sarcopenia is often determined by measuring handgrip strength. Here, we compared the lower limb quadriceps strength to the handgrip strength in their association with health outcomes in older adults in primary care. Our study population consisted of older adults (n = 764, 68.2% women, median age 83) that participated in the Integrated Systemic Care for Older People (ISCOPE) study. Participants were visited at baseline to measure quadriceps strength and handgrip strength. Data on health outcomes were obtained at baseline and after 12 months (including life satisfaction, disability in daily living, GP contact-time and hospitalization). Quadriceps strength and handgrip strength showed a weak association (β = 0.42 [95% CI 0.33-0.50]; R (2) = 0.17). Quadriceps strength and handgrip strength were independently associated with health outcomes at baseline, including quality of life, disability in daily living, GP contact-time, hospitalization, and gait speed. Combined weakness of the quadriceps and handgrip distinguished a most vulnerable subpopulation that presented with the poorest health outcomes. At follow-up, handgrip strength showed an association with quality of life (β = 0.05; P = 0.002) and disability in daily living (β = -0.5; P = 0.004). Quadriceps weakness did not further contribute to the prediction of the measured health outcomes. We conclude that quadriceps strength is only moderately associated with handgrip strength in an older population and that the combination of quadriceps strength and handgrip strength measurements may aid in the identification of older adults in primary care with the poorest health outcomes. In the prediction of poor health outcomes, quadriceps strength measurements do not show an added value to the handgrip strength.

  12. An Information Fusion Framework for Threat Assessment

    SciTech Connect

    Beaver, Justin M; Kerekes, Ryan A; Treadwell, Jim N

    2009-01-01

    Modern enterprises are becoming increasingly sensitive to the potential destructive power of small groups or individuals with malicious intent. In response, significant investments are being made in developing a means to assess the likelihood of certain threats to their enterprises. Threat assessment needs are typically focused in very specific application areas where current processes rely heavily on human analysis to both combine any available data and draw conclusions about the probability of a threat. A generic approach to threat assessment is proposed, including a threat taxonomy and decision-level information fusion framework, that provides a computational means for merging multi-modal data for the purpose of assessing the presence of a threat. The framework is designed for flexibility, and intentionally accounts for the accuracy of each data source, given the environmental conditions, in order to manage the uncertainty associated with any acquired data. The taxonomy and information fusion framework is described, and discussed in the context of real-world applications such as shipping container security and cyber security.

  13. Nuclear Threat Intelligence, Surveillance, and Reconnaissance

    NASA Astrophysics Data System (ADS)

    Kuliasha, Michael

    2012-03-01

    The National Security Strategy states that the greatest threat to the American people is ``the pursuit of nuclear weapons by violent extremists and their proliferation to additional states.'' The Global Nuclear Detection Architecture (GNDA) addresses a key portion of that threat by focusing on detecting nuclear and radiological materials that are out of regulatory control within permissive operating environments. However, the force protection requirements of the Department of Defense (DoD) range across a wider mission space from permissive environments, where nuclear and radiological materials can be monitored while under regulatory control, to hostile environments where nuclear and radiological materials exist in defiance of international regulations and agreements. This wider range of operating environments and the inherent physics limitations on the range of radiation detection pose great challenges to radiation detection-focused approaches to nuclear threat detection. Consequently, DoD is in the process of defining an intelligence, surveillance, and reconnaissance approach to countering nuclear threats that considers the observable signatures of all elements that comprise a potential threat; information, funds, people, material, equipment, and infrastructure. This strategy represents a shift from radiation detection as the primary sensing modality to radiation detection as one of many sensing modalities, including the human dimension, with a heavy emphasis on data fusion. This presentation will describe the attributes of a layered sensing approach to nuclear threat detection, illustrate the approach with examples, define potential building blocks, and discuss technical challenges.

  14. In silico study of potential autoimmune threats from rotavirus infection.

    PubMed

    Sarkar, Tapati; Das, Sukhen; Nandy, Papiya; Bhowmick, Rahul; Nandy, Ashesh

    2014-08-01

    Rotavirus, the major cause of infantile nonbacterial diarrhea, was found to be associated with development of diabetes-associated auto-antibodies. In our study we tried to find out further potential autoimmune threats of this virus using bioinformatics approach. We took rotaviral proteins to study similarity with Homo sapiens proteome and found most conserved structural protein VP6 matches at two regions with ryanodine receptor, an autoimmune target associated with myasthenia gravis. Myasthenia gravis, a chronic neurodegenerative autoimmune disorder with no typical known reason, is characterized by fluctuating muscle weakness which is typically enhanced during muscular effort. Affected patients generate auto antibodies against mainly acetyl choline receptor and sarcoplasmic reticulum calcium-release channel protein ryanodine receptor. Further, we observed that two regions which matched with ryanodine receptor remain conserved in all circulating rotaviral strains and showed significant antigenecity with respect to myasthenia gravis associated HLA haplotypes. Overall, our study detected rotaviral VP6 as a potential threat for myasthenia gravis and enlighten an area of virus associated autoimmune research.

  15. Stereotype threat in the classroom: dejection mediates the disrupting threat effect on women's math performance.

    PubMed

    Keller, Johannes; Dauenheimer, Dirk

    2003-03-01

    Research on stereotype threat, which is defined as the risk of confirming a negative stereotypic expectation about one's group, has demonstrated that the applicability of negative stereotypes disrupts the performance of stigmatized social groups. While it has been shown that a reduction of stereotype threat leads to improved performance by members of stigmatized groups, there is a lack of clear-cut findings about the mediating processes. The aim of the present study is to provide a better understanding of the mechanisms that stereotype threat causes in women working on mathematical problems. In addition, the study set out to test stereotype threat theory in a natural environment: high school classrooms. The experiment involved the manipulation of the gender fairness of a math test. The results indicate that the stereotype threat effect exists in this everyday setting. Moreover, it appears that dejection emotions mediate the effect of threat manipulation. PMID:15273014

  16. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    PubMed Central

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2013-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on one’s own abilities. The present experiments explored Black college students’ performance on diagnostic intelligence tests (Experiments 1 and 3) and women’s interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. PMID:23088232

  17. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... check conducted by TSA. (2) A security threat assessment conducted under 49 CFR part 1572 for the... Assistant Program Manager, Attn: Federal Agency Comparability Check, Hazmat Threat Assessment...

  18. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... check conducted by TSA. (2) A security threat assessment conducted under 49 CFR part 1572 for the... Assistant Program Manager, Attn: Federal Agency Comparability Check, Hazmat Threat Assessment...

  19. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... check conducted by TSA. (2) A security threat assessment conducted under 49 CFR part 1572 for the... Assistant Program Manager, Attn: Federal Agency Comparability Check, Hazmat Threat Assessment...

  20. Early exercise rehabilitation of muscle weakness in acute respiratory failure patients.

    PubMed

    Berry, Michael J; Morris, Peter E

    2013-10-01

    Acute respiratory failure patients experience significant muscle weakness, which contributes to prolonged hospitalization and functional impairments after hospital discharge. Based on our previous work, we hypothesize that an exercise intervention initiated early in the intensive care unit aimed at improving skeletal muscle strength could decrease hospital stay and attenuate the deconditioning and skeletal muscle weakness experienced by these patients.

  1. Emergent soft monopole modes in weakly bound deformed nuclei

    NASA Astrophysics Data System (ADS)

    Pei, J. C.; Kortelainen, M.; Zhang, Y. N.; Xu, F. R.

    2014-11-01

    Based on the Hartree-Fock-Bogoliubov solutions in large deformed coordinate spaces, the finite amplitude method for the quasiparticle random-phase approximation (FAM-QRPA) has been implemented, providing a suitable approach to probing collective excitations of weakly bound nuclei embedded in the continuum. The monopole excitation modes in magnesium isotopes up to the neutron drip line have been studied with the FAM-QRPA framework on both the coordinate-space and harmonic oscillator basis methods. Enhanced soft monopole strengths and collectivity as a result of weak-binding effects have been unambiguously demonstrated.

  2. Influence of environmental noise on the weak value amplification

    NASA Astrophysics Data System (ADS)

    Zhu, Xuannmin; Zhang, Yu-Xiang

    2016-08-01

    Quantum systems are always disturbed by environmental noise. We have investigated the influence of the environmental noise on the amplification in weak measurements. Three typical quantum noise processes are discussed in this article. The maximum expectation values of the observables of the measuring device decrease sharply with the strength of the depolarizing and phase damping channels, while the amplification effect of weak measurement is immune to the amplitude damping noise. To obtain significantly amplified signals, we must ensure that the preselection quantum systems are kept away from the depolarizing and phase damping processes.

  3. Threat inoculation: experienced and imagined intergenerational contact prevents stereotype threat effects on older people's math performance.

    PubMed

    Abrams, Dominic; Crisp, Richard J; Marques, Sibila; Fagg, Emily; Bedford, Lauren; Provias, Dimitri

    2008-12-01

    The authors hypothesized that experienced and imagined intergenerational contact should improve older people's math test performance under stereotype threat. In Experiment 1 (N=51, mean age=69 years), positive prior contact with grandchildren eliminated stereotype threat, which was mediated partially by reduced test-related anxiety. In Experiment 2 (N=84, mean age=72 years), the effect of threat on performance was significantly improved when participants merely imagined intergenerational contact, a situation again mediated by reduced anxiety. Previous research established that intergroup contact improves intergroup attitudes. The findings show that intergroup (intergenerational) contact also provides a defense against stereotype threat.

  4. Celebrate Strengths, Nurture Affinities: A Conversation with Mel Levine

    ERIC Educational Resources Information Center

    Scherer, Marge

    2006-01-01

    In this interview with "Educational Leadership," pediatrician Dr. Mel Levine, cofounder of "All Kinds of Minds," explains why students and educators should learn about eight neurodevelopmental functions that undergird our strengths and weaknesses. For the most part, he notes, adults who lead successful lives mobilize their strengths and compensate…

  5. Conformational transitions of a weak polyampholyte

    NASA Astrophysics Data System (ADS)

    Narayanan Nair, Arun Kumar; Uyaver, Sahin; Sun, Shuyu

    2014-10-01

    Using grand canonical Monte Carlo simulations of a flexible polyelectrolyte where the charges are in contact with a reservoir of constant chemical potential given by the solution pH, we study the behavior of weak polyelectrolytes in poor and good solvent conditions for polymer backbone. We address the titration behavior and conformational properties of a flexible diblock polyampholyte chain formed of two oppositely charged weak polyelectrolyte blocks, each containing equal number of identical monomers. The change of solution pH induces charge asymmetry in a diblock polyampholyte. For diblock polyampholyte chains in poor solvents, we demonstrate that a discontinuous transition between extended (tadpole) and collapsed (globular) conformational states is attainable by varying the solution pH. The double-minima structure in the probability distribution of the free energy provides direct evidence for the first-order like nature of this transition. At the isoelectric point electrostatically driven coil-globule transition of diblock polyampholytes in good solvents is found to consist of different regimes identified with increasing electrostatic interaction strength. At pH values above or below the isoelectric point diblock chains are found to have polyelectrolyte-like behavior due to repulsion between uncompensated charges along the chain.

  6. Weak Energy: Form and Function

    NASA Astrophysics Data System (ADS)

    Parks, Allen D.

    The equation of motion for a time-dependent weak value of a quantum mechanical observable contains a complex valued energy factor—the weak energy of evolution. This quantity is defined by the dynamics of the pre-selected and post-selected states which specify the observable's weak value. It is shown that this energy: (i) is manifested as dynamical and geometric phases that govern the evolution of the weak value during the measurement process; (ii) satisfies the Euler-Lagrange equations when expressed in terms of Pancharatnam (P) phase and Fubini-Study (FS) metric distance; (iii) provides for a PFS stationary action principle for quantum state evolution; (iv) time translates correlation amplitudes; (v) generalizes the temporal persistence of state normalization; and (vi) obeys a time-energy uncertainty relation. A similar complex valued quantity—the pointed weak energy of an evolving quantum state—is also defined and several of its properties in PFS coordinates are discussed. It is shown that the imaginary part of the pointed weak energy governs the state's survival probability and its real part is—to within a sign—the Mukunda-Simon geometric phase for arbitrary evolutions or the Aharonov-Anandan (AA) geometric phase for cyclic evolutions. Pointed weak energy gauge transformations and the PFS 1-form are defined and discussed and the relationship between the PFS 1-form and the AA connection 1-form is established. [Editors note: for a video of the talk given by Prof. Parks at the Aharonov-80 conference in 2012 at Chapman University, see http://quantum.chapman.edu/talk-25.

  7. Asteroid airburst altitude vs. strength

    NASA Astrophysics Data System (ADS)

    Robertson, Darrel; Wheeler, Lorien; Mathias, Donovan

    2016-10-01

    Small NEO asteroids (<Ø140m) may not be a threat on a national or global level but can still cause a significant amount of local damage as demonstrated by the Chelyabinsk event where there was over $33 million worth of damage (1 billion roubles) and 1500 were injured, mostly due to broken glass. The ground damage from a small asteroid depends strongly on the altitude at which they "burst" where most of the energy is deposited in the atmosphere. The ability to accurately predict ground damage is useful in determining appropriate evacuation or shelter plans and emergency management.Strong asteroids, such as a monolithic boulder, fail and create peak energy deposition close to the altitude at which ram dynamic pressure exceeds the material cohesive strength. Weaker asteroids, such as a rubble pile, structurally fail at higher altitude, but it requires the increased aerodynamic pressure at lower altitude to disrupt and disperse the rubble. Consequently the resulting airbursts have a peak energy deposition at similar altitudes.In this study hydrocode simulations of the entry and break-up of small asteroids were performed to examine the effect of strength, size, composition, entry angle, and speed on the resulting airburst. This presentation will show movies of the simulations, the results of peak burst height, and the comparison to semi-analytical models.

  8. Weak Selection and Protein Evolution

    PubMed Central

    Akashi, Hiroshi; Osada, Naoki; Ohta, Tomoko

    2012-01-01

    The “nearly neutral” theory of molecular evolution proposes that many features of genomes arise from the interaction of three weak evolutionary forces: mutation, genetic drift, and natural selection acting at its limit of efficacy. Such forces generally have little impact on allele frequencies within populations from generation to generation but can have substantial effects on long-term evolution. The evolutionary dynamics of weakly selected mutations are highly sensitive to population size, and near neutrality was initially proposed as an adjustment to the neutral theory to account for general patterns in available protein and DNA variation data. Here, we review the motivation for the nearly neutral theory, discuss the structure of the model and its predictions, and evaluate current empirical support for interactions among weak evolutionary forces in protein evolution. Near neutrality may be a prevalent mode of evolution across a range of functional categories of mutations and taxa. However, multiple evolutionary mechanisms (including adaptive evolution, linked selection, changes in fitness-effect distributions, and weak selection) can often explain the same patterns of genome variation. Strong parameter sensitivity remains a limitation of the nearly neutral model, and we discuss concave fitness functions as a plausible underlying basis for weak selection. PMID:22964835

  9. Spin freezing in geometrically frustrated antiferromagnets with weak disorder.

    PubMed

    Saunders, T E; Chalker, J T

    2007-04-13

    We investigate the consequences for geometrically frustrated antiferromagnets of weak disorder in the strength of exchange interactions. Taking as a model the classical Heisenberg antiferromagnet with nearest neighbor exchange on the pyrochlore lattice, we examine low-temperature behavior. We show that spatial modulation of exchange generates long-range effective interactions within the extensively degenerate ground states of the clean system. Using Monte Carlo simulations, we find a spin glass transition at a temperature set by the disorder strength. Disorder of this type, which is generated by random strains in the presence of magnetoelastic coupling, may account for the spin freezing observed in many geometrically frustrated magnets.

  10. The influence of stereotype threat on immigrants: review and meta-analysis

    PubMed Central

    Appel, Markus; Weber, Silvana; Kronberger, Nicole

    2015-01-01

    In many regions around the world students with certain immigrant backgrounds underachieve in educational settings. This paper provides a review and meta-analysis on one potential source of the immigrant achievement gap: stereotype threat, a situational predicament that may prevent students to perform up to their full abilities. A meta-analysis of 19 experiments suggests an overall mean effect size of 0.63 (random effects model) in support of stereotype threat theory. The results are complemented by moderator analyses with regard to circulation (published or unpublished research), cultural context (US versus Europe), age of immigrants, type of stereotype threat manipulation, dependent measures, and means for identification of immigrant status; evidence on the role of ethnic identity strength is reviewed. Theoretical and practical implications of the findings are discussed. PMID:26217256

  11. The influence of stereotype threat on immigrants: review and meta-analysis.

    PubMed

    Appel, Markus; Weber, Silvana; Kronberger, Nicole

    2015-01-01

    In many regions around the world students with certain immigrant backgrounds underachieve in educational settings. This paper provides a review and meta-analysis on one potential source of the immigrant achievement gap: stereotype threat, a situational predicament that may prevent students to perform up to their full abilities. A meta-analysis of 19 experiments suggests an overall mean effect size of 0.63 (random effects model) in support of stereotype threat theory. The results are complemented by moderator analyses with regard to circulation (published or unpublished research), cultural context (US versus Europe), age of immigrants, type of stereotype threat manipulation, dependent measures, and means for identification of immigrant status; evidence on the role of ethnic identity strength is reviewed. Theoretical and practical implications of the findings are discussed.

  12. Warping the Weak Gravity Conjecture

    NASA Astrophysics Data System (ADS)

    Kooner, Karta; Parameswaran, Susha; Zavala, Ivonne

    2016-08-01

    The Weak Gravity Conjecture, if valid, rules out simple models of Natural Inflation by restricting their axion decay constant to be sub-Planckian. We revisit stringy attempts to realise Natural Inflation, with a single open string axionic inflaton from a probe D-brane in a warped throat. We show that warped geometries can allow the requisite super-Planckian axion decay constant to be achieved, within the supergravity approximation and consistently with the Weak Gravity Conjecture. Preliminary estimates of the brane backreaction suggest that the probe approximation may be under control. However, there is a tension between large axion decay constant and high string scale, where the requisite high string scale is difficult to achieve in all attempts to realise large field inflation using perturbative string theory. We comment on the Generalized Weak Gravity Conjecture in the light of our results.

  13. State tomography via weak measurements

    PubMed Central

    Wu, Shengjun

    2013-01-01

    Recent work has revealed that the wave function of a pure state can be measured directly and that complementary knowledge of a quantum system can be obtained simultaneously by weak measurements. However, the original scheme applies only to pure states, and it is not efficient because most of the data are discarded by post-selection. Here, we propose tomography schemes for pure states and for mixed states via weak measurements, and our schemes are more efficient because we do not discard any data. Furthermore, we demonstrate that any matrix element of a general state can be directly read from an appropriate weak measurement. The density matrix (with all of its elements) represents all that is directly accessible from a general measurement. PMID:23378924

  14. Stereotype threat affects financial decision making.

    PubMed

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns. PMID:20855899

  15. Stereotype threat affects financial decision making.

    PubMed

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  16. On the front lines: Stakeholder threat cues determine how identified employees cope with scandal.

    PubMed

    Grandey, Alicia A; Krannitz, Morgan A; Slezak, Tyler

    2015-07-01

    When organizational identity is threatened as a result of scandal, highly identified members who represent the threatened organization to stakeholders have a particularly challenging and overlooked experience. Addressing a theoretical paradox, we propose that organizational identification interacts with the threat cues from stakeholders to determine employee responses. We conducted a multimethod, in vivo test of these ideas with university fundraising employees after events threatened the university's moral identity. Interview and archival data demonstrated that stakeholders expressed identity threat to fundraisers, who experienced their own identity-related distress and engaged in both group-dissociative and group-affirming responses. Surveys of professional and student university fundraisers demonstrated that more identified employees were more distressed (e,g., felt anxious, grief, betrayed) regardless of stakeholder threat cues. Yet, when employees perceived weak threat cues from stakeholders, more identified members were less likely to dissociate from the group and more likely to affirm the group's positive identity with stakeholders. These benefits of identification were not present when the stakeholder threat cues were strong. We discuss future research and practical implications of front-line employee identification and stakeholder cues during scandal. PMID:25602276

  17. Inhibitory control as a moderator of threat-related interference biases in social anxiety.

    PubMed

    Gorlin, Eugenia I; Teachman, Bethany A

    2015-01-01

    Prior findings are mixed regarding the presence and direction of threat-related interference biases in social anxiety. The current study examined general inhibitory control (IC), measured by the classic colour-word Stroop, as a moderator of the relationship between both threat interference biases [indexed by the emotional Stroop (e-Stroop)] and several social anxiety indicators. High socially anxious undergraduate students (N = 159) completed the emotional and colour-word Stroop tasks, followed by an anxiety-inducing speech task. Participants completed measures of trait social anxiety, state anxiety before and during the speech, negative task-interfering cognitions during the speech and overall self-evaluation of speech performance. Speech duration was used to measure behavioural avoidance. In line with hypotheses, IC moderated the relationship between e-Stroop bias and every anxiety indicator (with the exception of behavioural avoidance), such that greater social-threat interference was associated with higher anxiety among those with weak IC, whereas lesser social-threat interference was associated with higher anxiety among those with strong IC. Implications for the theory and treatment of threat interference biases in socially anxious individuals are discussed.

  18. On the front lines: Stakeholder threat cues determine how identified employees cope with scandal.

    PubMed

    Grandey, Alicia A; Krannitz, Morgan A; Slezak, Tyler

    2015-07-01

    When organizational identity is threatened as a result of scandal, highly identified members who represent the threatened organization to stakeholders have a particularly challenging and overlooked experience. Addressing a theoretical paradox, we propose that organizational identification interacts with the threat cues from stakeholders to determine employee responses. We conducted a multimethod, in vivo test of these ideas with university fundraising employees after events threatened the university's moral identity. Interview and archival data demonstrated that stakeholders expressed identity threat to fundraisers, who experienced their own identity-related distress and engaged in both group-dissociative and group-affirming responses. Surveys of professional and student university fundraisers demonstrated that more identified employees were more distressed (e,g., felt anxious, grief, betrayed) regardless of stakeholder threat cues. Yet, when employees perceived weak threat cues from stakeholders, more identified members were less likely to dissociate from the group and more likely to affirm the group's positive identity with stakeholders. These benefits of identification were not present when the stakeholder threat cues were strong. We discuss future research and practical implications of front-line employee identification and stakeholder cues during scandal.

  19. Cosmology and the weak interaction

    NASA Technical Reports Server (NTRS)

    Schramm, David N.

    1989-01-01

    The weak interaction plays a critical role in modern Big Bang cosmology. Two of its most publicized comological connections are emphasized: big bang nucleosynthesis and dark matter. The first of these is connected to the cosmological prediction of neutrine flavors, N(sub nu) is approximately 3 which in now being confirmed. The second is interrelated to the whole problem of galacty and structure formation in the universe. The role of the weak interaction both for dark matter candidates and for the problem of generating seeds to form structure is demonstrated.

  20. Weak value amplification considered harmful

    NASA Astrophysics Data System (ADS)

    Ferrie, Christopher; Combes, Joshua

    2014-03-01

    We show using statistically rigorous arguments that the technique of weak value amplification does not perform better than standard statistical techniques for the tasks of parameter estimation and signal detection. We show that using all data and considering the joint distribution of all measurement outcomes yields the optimal estimator. Moreover, we show estimation using the maximum likelihood technique with weak values as small as possible produces better performance for quantum metrology. In doing so, we identify the optimal experimental arrangement to be the one which reveals the maximal eigenvalue of the square of system observables. We also show these conclusions do not change in the presence of technical noise.

  1. Cosmology and the weak interaction

    SciTech Connect

    Schramm, D.N. ):)

    1989-12-01

    The weak interaction plays a critical role in modern Big Bang cosmology. This review will emphasize two of its most publicized cosmological connections: Big Bang nucleosynthesis and Dark Matter. The first of these is connected to the cosmological prediction of Neutrino Flavours, N{sub {nu}} {approximately} 3 which is now being confirmed at SLC and LEP. The second is interrelated to the whole problem of galaxy and structure formation in the universe. This review will demonstrate the role of the weak interaction both for dark matter candidates and for the problem of generating seeds to form structure. 87 refs., 3 figs., 5 tabs.

  2. Growth and decay of weak shock waves in magnetogasdynamics

    NASA Astrophysics Data System (ADS)

    Singh, L. P.; Singh, D. B.; Ram, S. D.

    2015-12-01

    The purpose of the present study is to investigate the problem of the propagation of weak shock waves in an inviscid, electrically conducting fluid under the influence of a magnetic field. The analysis assumes the following two cases: (1) a planar flow with a uniform transverse magnetic field and (2) cylindrically symmetric flow with a uniform axial or varying azimuthal magnetic field. A system of two coupled nonlinear transport equations, governing the strength of a shock wave and the first-order discontinuity induced behind it, are derived that admit a solution that agrees with the classical decay laws for a weak shock. An analytic expression for the determination of the shock formation distance is obtained. How the magnetic field strength, whether axial or azimuthal, influences the shock formation is also assessed.

  3. Observationally determined Fe II oscillator strengths

    NASA Astrophysics Data System (ADS)

    Shull, J. M.; van Steenberg, M.; Seab, C. G.

    1983-08-01

    Absorption oscillator strengths for 21 Fe II resonance lines, have been determined using a curve-of-growth analysis of interstellar data from the Copernicus and International Ultraviolet Explorer (IUE) satellites. In addition to slight changes in strengths of the far-UV lines, new f-values are reported for wavelength 1608.45, a prominent line in interstellar and quasar absorption spectra, and for wavelength 2260.08, a weak, newly identified linen in IUE interstellar spectra. An upper limit on the strength of the undetected line at 2366.867 A (UV multiplet 2) is set. Using revised oscillator strengths, Fe II column densities toward 13 OB stars are derived. The interstellar depletions, (Fe/H), relative to solar values range between factors of 10 and 120.

  4. Monopole Strength Function of Deformed Superfluid Nuclei

    SciTech Connect

    Stoitsov, M. V.; Kortelainen, E. M.; Nakatsukasa, T.; Losa, C.; Nazarewicz, Witold

    2011-01-01

    We present an efficient method for calculating strength functions using the finite amplitude method (FAM) for deformed superfluid heavy nuclei within the framework of the nuclear density functional theory. We demonstrate that FAM reproduces strength functions obtained with the fully self-consistent quasi-particle random-phase approximation (QRPA) at a fraction of computational cost. As a demonstration, we compute the isoscalar and isovector monopole strength for strongly deformed configurations in ^{240}Pu by considering huge quasi-particle QRPA spaces. Our approach to FAM, based on Broyden's iterative procedure, opens the possibility for large-scale calculations of strength distributions in well-bound and weakly bound nuclei across the nuclear landscape.

  5. Left-Wing Extremism: The Current Threat

    SciTech Connect

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  6. Epidemiology today: Mitigating threats to an ecosystem.

    PubMed

    Kreiger, Nancy

    2016-01-01

    Ecosystems comprise all the living and non-living things in a particular area (e.g., rain forest, desert), which interact and maintain equilibrium. Loss of equilibrium (e.g., clear-cutting trees in a rain forest) can mean the decline of the ecosystem, unless it is able to adapt to the new circumstances. The term "knowledge ecosystem" describes an approach to managing knowledge in a particular field; the components of this system include the people, the technological skills and resources, and information or data. Epidemiology can be thought of as a knowledge ecosystem and, like ecological systems, its existence can be threatened, from both internal and external forces that may alter its equilibrium. This paper describes some threats to the epidemiology knowledge ecosystem, how these threats came about, and what responses we can make that may serve to mitigate those threats. PMID:27348106

  7. On the special status of "ego threats".

    PubMed

    Schotte, D E

    1992-05-01

    This article comments on a recent article by Heatherton, Herman, and Polivy (1991) in which they suggest that ego threats are a prerequisite to affectively induced disinhibition of food intake in restrained eaters and current dieters. In contrast, the present review suggests that mood induction procedures that involve no apparent threat (e.g., viewing a frightening film) can also prompt disinhibition in restrained eaters. Thus, any mood induction procedure that does not directly physically threaten the S may disinhibit restrained eaters. It is concluded that recommendations to focus future research on ego threats are premature and may serve to obscure the mechanisms by which changes in affective state influence food intake in dieters. PMID:1507070

  8. Satellite Threat Warning and Attack Reporting

    SciTech Connect

    Hilland, D.; Phipps, G.; Jingle, C.; Newton, G.

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  9. Threat detection, precautionary responses, and anxiety disorders.

    PubMed

    Stein, Dan J; Nesse, Randolph M

    2011-03-01

    Study of the anxiety disorders may be a particularly useful vehicle for demonstrating how foundational sciences (e.g. cognitive-affective neuroscience, evolutionary psychology) can advance psychiatric theory and research. Here we consider important potential advances and remaining future challenges when basic research on threat detection and precautionary responses is used to address the anxiety disorders. We emphasize the potential value of a model of threat detection and precautionary responses that integrates cognitive-affective neuroscience and evolutionary approaches for understanding the anxiety disorders. However, we also suggest that substantial additional work is needed in order to link systematically the psychobiological mechanisms posited by basic work on threat detection and precautionary responses to the complex phenomena seen in the clinic. PMID:21147162

  10. Insider Threat Assessment: Model, Analysis and Tool

    NASA Astrophysics Data System (ADS)

    Chinchani, Ramkumar; Ha, Duc; Iyer, Anusha; Ngo, Hung Q.; Upadhyaya, Shambhu

    Insider threat is typically attributed to legitimate users who maliciously leverage their system privileges, and familiarity and proximity to their computational environment to compromise valuable information or inflict damage. According to the annual CSI/FBI surveys conducted since 1996, internal attacks and insider abuse form a significant portion of reported incidents. The strongest indication yet that insider threat is very real is given by the recent study [2] jointly conducted by CERT and the US Secret Service; the first of its kind, which provides an in-depth insight into the problem in a real-world setting. However, there is no known body of work which addresses this problem effectively. There are several challenges, beginning with understanding the threat.

  11. [The threat of snake and scorpion venoms].

    PubMed

    Płusa, Tadeusz; Smędzik, Katarzyna

    2015-09-01

    Venoms of snakes and scorpions pose a significant threat to the health and life of humans. The speed and range of their actions causes damage of the organ responsible for the maintenance of vital signs. Venomous snake venoms cause blood clotting disorders, tissue necrosis and hemolysis, and the release of a number of proinflammatory cytokines and impair antibody synthesis. Availability of antitoxins is limited and in the most cases supportive treatment is recommended. In turn, the venom of scorpions beside intestinal symptoms cause significant impairment of neuromuscular conduction, causing severe respiratory disorders. Action venom poses a particular threat to sensitive patients. The degree of threat to life caused by the venom of snakes and scorpions authorizes the treatment of these substances as a potential biological weapon. PMID:26449581

  12. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  13. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  14. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  15. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  16. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  17. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Fees for security threat assessment. 1540.209...: GENERAL RULES Security Threat Assessments § 1540.209 Fees for security threat assessment. This section describes the payment process for completion of the security threat assessments required under this...

  18. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Fees for security threat assessment. 1540.209...: GENERAL RULES Security Threat Assessments § 1540.209 Fees for security threat assessment. This section describes the payment process for completion of the security threat assessments required under this...

  19. Flexibility and Muscular Strength.

    ERIC Educational Resources Information Center

    Liemohn, Wendell

    1988-01-01

    This definition of flexibility and muscular strength also explores their roles in overall physical fitness and focuses on how increased flexibility and muscular strength can help decrease or eliminate lower back pain. (CB)

  20. Muscle Weakness Thresholds for Prediction of Diabetes in Adults

    PubMed Central

    Peterson, Mark D.; Zhang, Peng; Choksi, Palak; Markides, Kyriakos S.; Al Snih, Soham

    2016-01-01

    Background Despite the known links between weakness and early mortality, what remains to be fully understood is the extent to which strength preservation is associated with protection from cardiometabolic diseases such as diabetes. Purpose The purposes of this study were to determine the association between muscle strength and diabetes among adults, and to identify age- and sex-specific thresholds of low strength for detection of risk. Methods A population-representative sample of 4,066 individuals, aged 20–85 years, was included from the combined 2011–2012 National Health and Nutrition Examination Survey datasets. Strength was assessed using a hand-held dynamometer, and the single largest reading from either hand was normalized to body mass. A logistic regression model was used to assess the association between normalized grip strength and risk of diabetes, as determined by hemoglobin A1c (HbA1c) levels (≥6.5% [≥48 mmol/mol]), while controlling for sociodemographic characteristics, anthropometric measures, and television viewing time. Results For every 0.05 decrement in normalized strength, there was a 1.26 times increased adjusted odds for diabetes in men and women. Women were at lower odds of having diabetes (OR: 0.49; 95% CI: 0.29–0.82), whereas age, waist circumference and lower income were inversely associated. Optimal sex- and age-specific weakness thresholds to detect diabetes were 0.56, 0.50, and 0.45 for men, and 0.42, 0.38, and 0.33 for women, for ages 20–39 years, 40–59 years, and 60–80 years. Conclusions and Clinical Relevance We present thresholds of strength that can be incorporated into a clinical setting for identifying adults that are at risk for developing diabetes, and that might benefit from lifestyle interventions to reduce risk. PMID:26744337

  1. Cosmology with weak lensing surveys.

    PubMed

    Munshi, Dipak; Valageas, Patrick

    2005-12-15

    Weak gravitational lensing is responsible for the shearing and magnification of the images of high-redshift sources due to the presence of intervening mass. Since the lensing effects arise from deflections of the light rays due to fluctuations of the gravitational potential, they can be directly related to the underlying density field of the large-scale structures. Weak gravitational surveys are complementary to both galaxy surveys and cosmic microwave background observations as they probe unbiased nonlinear matter power spectra at medium redshift. Ongoing CMBR experiments such as WMAP and a future Planck satellite mission will measure the standard cosmological parameters with unprecedented accuracy. The focus of attention will then shift to understanding the nature of dark matter and vacuum energy: several recent studies suggest that lensing is the best method for constraining the dark energy equation of state. During the next 5 year period, ongoing and future weak lensing surveys such as the Joint Dark Energy Mission (JDEM; e.g. SNAP) or the Large-aperture Synoptic Survey Telescope will play a major role in advancing our understanding of the universe in this direction. In this review article, we describe various aspects of probing the matter power spectrum and the bi-spectrum and other related statistics with weak lensing surveys. This can be used to probe the background dynamics of the universe as well as the nature of dark matter and dark energy.

  2. Weak localization of seismic waves.

    PubMed

    Larose, E; Margerin, L; Van Tiggelen, B A; Campillo, M

    2004-07-23

    We report the observation of weak localization of seismic waves in a natural environment. It emerges as a doubling of the seismic energy around the source within a spot of the width of a wavelength, which is several tens of meters in our case. The characteristic time for its onset is the scattering mean-free time that quantifies the internal heterogeneity.

  3. Cosmology with weak lensing surveys.

    PubMed

    Munshi, Dipak; Valageas, Patrick

    2005-12-15

    Weak gravitational lensing is responsible for the shearing and magnification of the images of high-redshift sources due to the presence of intervening mass. Since the lensing effects arise from deflections of the light rays due to fluctuations of the gravitational potential, they can be directly related to the underlying density field of the large-scale structures. Weak gravitational surveys are complementary to both galaxy surveys and cosmic microwave background observations as they probe unbiased nonlinear matter power spectra at medium redshift. Ongoing CMBR experiments such as WMAP and a future Planck satellite mission will measure the standard cosmological parameters with unprecedented accuracy. The focus of attention will then shift to understanding the nature of dark matter and vacuum energy: several recent studies suggest that lensing is the best method for constraining the dark energy equation of state. During the next 5 year period, ongoing and future weak lensing surveys such as the Joint Dark Energy Mission (JDEM; e.g. SNAP) or the Large-aperture Synoptic Survey Telescope will play a major role in advancing our understanding of the universe in this direction. In this review article, we describe various aspects of probing the matter power spectrum and the bi-spectrum and other related statistics with weak lensing surveys. This can be used to probe the background dynamics of the universe as well as the nature of dark matter and dark energy. PMID:16286284

  4. N-{Delta} weak transition

    SciTech Connect

    Graczyk, Krzysztof M.

    2011-11-23

    A short review of the Rein-Sehgal and isobar models is presented. The attention is focused on the nucleon-{Delta}(1232) weak transition form-factors. The results of the recent re-analyses of the ANL and BNL bubble chamber neutrino-deuteron scattering data are discussed.

  5. Polymer-solid interfaces: Structure and strength

    NASA Astrophysics Data System (ADS)

    Gong, Liezhong

    1999-12-01

    This thesis explored the influence of sticker group concentration (φ), interaction parameter between sticker groups and the solid substrate (chi), and bonding time on the structure and strength of polymer-solid interfaces. Carboxylated polybutadienes (cPBD's) with different COOH concentrations (φ) were synthesized through hydrocarboxylation of high molecular weight polybutadienes. The COOH groups were randomly distributed along the polymer chains and selectively introduced to the pendant double bonds. The influence of φ and chi on the peel strength (GIC) of two interfaces, cPBD-Al and cPBD-AlS (amine terminated silane modified Al), was investigated using the T-peel test. Counter-intuitively, with increasing φ, GIC of both interfaces increased first and then decreased after passing through a maximum strength. At a constant φ, GIC increased with chi. Additionally, the bonding dynamics was strongly dependent on φ and chi and the time scale was several orders of Magnitude longer than the characteristic relaxation time of polybutadiene. The adhesion dynamics was controlled by the slow frustrated surface reorganization process. Most of the experimental observations could be attributed to the variation in chain physical connectivity within the interfaces, which was explored by a self-consistent field lattice model (SCFLM). Sticker groups were found to segregate to the solid surface and chain physical connectivity was modified at the polymer-solid interface. We demonstrated that the segregation of sticker groups and the variation in chain physical connectivity led to the formation of a weak boundary interphase. It is this weak interphase that controls the strength and bonding dynamics of the interface. The presence of this weak interphase was experimentally verified through angle resolved XPS analysis. Finally, an entanglement percolation model was developed to correlate the interface strength with the chain connectivity. The results obtained in this study contribute

  6. Bioterrorism: is it a real threat?

    PubMed

    Gottschalk, René; Preiser, Wolfgang

    2005-05-01

    The Geneva Protocol of 1925 commits the signatory nations to refraining from the use of biological weapons. However, the terrorist assaults of September 2001 and, subsequently, the anthrax-containing letters are cause for great concerns: new threats to the security of nations are expected, as terrorist organizations seem to increasingly explore novel ways of spreading terror. In this context, naturally emerging diseases such as SARS, monkeypox or West Nile fever assume new importance because it is difficult to distinguish between natural epidemics and possible bioweapon assaults. Great efforts on the part of governments and public health authorities are necessary to counteract these threats. PMID:15349775

  7. [Assessing adolescents with school massacre threats].

    PubMed

    Lindberg, Nina; Sailas, Eila; Kaltiala-Heino, Riittakerttu

    2013-01-01

    School massacres have increased pressure on health-care authorities for assessing risk for severe violence. In acute situations, threat analysis focuses at thought processes and actions of adolescents presenting threat of violence, in order to assess to which extent the adolescent has progressed from thoughts to actions. Because of great variability in aggressive behavior, separate interventions for individual, family and other developmental surroundings are often needed. Structured risk-assessment in special health care is aimed for conducting decision making towards risk reduction and adequate help for adolescents at risk. PMID:24069639

  8. Critical Transport in Weakly Disordered Semiconductors and Semimetals

    NASA Astrophysics Data System (ADS)

    Syzranov, S. V.; Radzihovsky, L.; Gurarie, V.

    2015-04-01

    Motivated by Weyl semimetals and weakly doped semiconductors, we study transport in a weakly disordered semiconductor with a power-law quasiparticle dispersion ξk∝kα . We show, that in 2 α dimensions short-correlated disorder experiences logarithmic renormalization from all energies in the band. We study the case of a general dimension d using a renormalization group, controlled by an ɛ =2 α -d expansion. Above the critical dimensions, conduction exhibits a localization-delocalization phase transition or a sharp crossover (depending on the symmetries of the Hamiltonian) as a function of disorder strength. We utilize this analysis to compute the low-temperature conductivity in Weyl semimetals and weakly doped semiconductors near and below the critical disorder point.

  9. Critical transport in weakly disordered semiconductors and semimetals.

    PubMed

    Syzranov, S V; Radzihovsky, L; Gurarie, V

    2015-04-24

    Motivated by Weyl semimetals and weakly doped semiconductors, we study transport in a weakly disordered semiconductor with a power-law quasiparticle dispersion ξ_{k}∝k^{α}. We show, that in 2α dimensions short-correlated disorder experiences logarithmic renormalization from all energies in the band. We study the case of a general dimension d using a renormalization group, controlled by an ϵ=2α-d expansion. Above the critical dimensions, conduction exhibits a localization-delocalization phase transition or a sharp crossover (depending on the symmetries of the Hamiltonian) as a function of disorder strength. We utilize this analysis to compute the low-temperature conductivity in Weyl semimetals and weakly doped semiconductors near and below the critical disorder point. PMID:25955065

  10. Advantages of nonclassical pointer states in postselected weak measurements

    NASA Astrophysics Data System (ADS)

    Turek, Yusuf; Maimaiti, W.; Shikano, Yutaka; Sun, Chang-Pu; Al-Amri, M.

    2015-08-01

    We investigate, within the weak measurement theory, the advantages of nonclassical pointer states over semiclassical ones for coherent, squeezed vacuum, and Schrödinger cat states. These states are utilized as pointer states for the system operator A ̂ with property Â2=I ̂ , where I ̂ represents the identity operator. We calculate the ratio between the signal-to-noise ratio of nonpostselected and postselected weak measurements. The latter is used to find the quantum Fisher information for the above pointer states. The average shifts for those pointer states with arbitrary interaction strength are investigated in detail. One key result is that we find the postselected weak measurement scheme for nonclassical pointer states to be superior to semiclassical ones. This can improve the precision of the measurement process.

  11. What Is a Strength?

    ERIC Educational Resources Information Center

    Wolin, Sybil

    2003-01-01

    As the strength-based perspective gains recognition, it is important to describe what constitutes strengths and to develop a specific vocabulary to name them. This article draws on resilience research to help identify specific competencies and areas of strengths in youth. (Contains 1 table.)

  12. Strength Training for Girls.

    ERIC Educational Resources Information Center

    Connaughton, Daniel; Connaughton, Angela; Poor, Linda

    2001-01-01

    Strength training can be fun, safe, and appropriate for young girls and women and is an important component of any fitness program when combined with appropriate cardiovascular and flexibility activities. Concerns and misconceptions regarding girls' strength training are discussed, presenting general principles of strength training for children…

  13. Competing weak localization and weak antilocalization in ultrathin topological insulators.

    PubMed

    Lang, Murong; He, Liang; Kou, Xufeng; Upadhyaya, Pramey; Fan, Yabin; Chu, Hao; Jiang, Ying; Bardarson, Jens H; Jiang, Wanjun; Choi, Eun Sang; Wang, Yong; Yeh, Nai-Chang; Moore, Joel; Wang, Kang L

    2013-01-01

    We demonstrate evidence of a surface gap opening in topological insulator (TI) thin films of (Bi(0.57)Sb(0.43))(2)Te(3) below six quintuple layers through transport and scanning tunneling spectroscopy measurements. By effective tuning the Fermi level via gate-voltage control, we unveil a striking competition between weak localization and weak antilocalization at low magnetic fields in nonmagnetic ultrathin films, possibly owing to the change of the net Berry phase. Furthermore, when the Fermi level is swept into the surface gap of ultrathin samples, the overall unitary behaviors are revealed at higher magnetic fields, which are in contrast to the pure WAL signals obtained in thicker films. Our findings show an exotic phenomenon characterizing the gapped TI surface states and point to the future realization of quantum spin Hall effect and dissipationless TI-based applications.

  14. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 3 2013-10-01 2013-10-01 false How does an operator identify potential threats to....917 How does an operator identify potential threats to pipeline integrity and use the threat identification in its integrity program? (a) Threat identification. An operator must identify and evaluate...

  15. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false How does an operator identify potential threats to....917 How does an operator identify potential threats to pipeline integrity and use the threat identification in its integrity program? (a) Threat identification. An operator must identify and evaluate...

  16. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 3 2012-10-01 2012-10-01 false How does an operator identify potential threats to....917 How does an operator identify potential threats to pipeline integrity and use the threat identification in its integrity program? (a) Threat identification. An operator must identify and evaluate...

  17. Defensive activation to (un)predictable interoceptive threat: The NPU respiratory threat test (NPUr).

    PubMed

    Schroijen, Mathias; Fantoni, Simona; Rivera, Carmen; Vervliet, Bram; Schruers, Koen; van den Bergh, Omer; van Diest, Ilse

    2016-06-01

    Potentially life-threatening interoceptive sensations easily engage the behavioral defensive system. Resulting fear and anxiety toward interoceptive threat are functionally distinct states that are hypothesized to play a prominent role in the etiology of panic disorder. The present study aimed to investigate whether fear- and anxiety-potentiated startle responses occur to predictable and unpredictable interoceptive threat, respectively. Therefore, we modified the NPU threat test (Schmitz & Grillon, ) and replaced the aversive electrocutaneous stimulus with an aversive interoceptive stimulus (a breathing occlusion, making it briefly impossible to breathe). Healthy participants (N = 48) underwent three instructed conditions. A visual cue signaled the occlusion in the predictable condition (P), whereas another cue was unrelated to the occurrence of the occlusion in the unpredictable condition (U). The safe condition (N) also had a visual cue, but no occlusion. Both fear- and anxiety-potentiated startle blink responses were observed in response to predictable and unpredictable respiratory threat, respectively. The current study presents and validates the NPU respiratory threat test (NPUr) as an ecologically valid paradigm to study both anxiety and fear in response to a panic-relevant interoceptive threat. The paradigm allows future testing of contextual generalization, investigation of different clinical groups, and more explicit comparisons of defensive responding to interoceptive versus exteroceptive threats.

  18. Defensive activation to (un)predictable interoceptive threat: The NPU respiratory threat test (NPUr).

    PubMed

    Schroijen, Mathias; Fantoni, Simona; Rivera, Carmen; Vervliet, Bram; Schruers, Koen; van den Bergh, Omer; van Diest, Ilse

    2016-06-01

    Potentially life-threatening interoceptive sensations easily engage the behavioral defensive system. Resulting fear and anxiety toward interoceptive threat are functionally distinct states that are hypothesized to play a prominent role in the etiology of panic disorder. The present study aimed to investigate whether fear- and anxiety-potentiated startle responses occur to predictable and unpredictable interoceptive threat, respectively. Therefore, we modified the NPU threat test (Schmitz & Grillon, ) and replaced the aversive electrocutaneous stimulus with an aversive interoceptive stimulus (a breathing occlusion, making it briefly impossible to breathe). Healthy participants (N = 48) underwent three instructed conditions. A visual cue signaled the occlusion in the predictable condition (P), whereas another cue was unrelated to the occurrence of the occlusion in the unpredictable condition (U). The safe condition (N) also had a visual cue, but no occlusion. Both fear- and anxiety-potentiated startle blink responses were observed in response to predictable and unpredictable respiratory threat, respectively. The current study presents and validates the NPU respiratory threat test (NPUr) as an ecologically valid paradigm to study both anxiety and fear in response to a panic-relevant interoceptive threat. The paradigm allows future testing of contextual generalization, investigation of different clinical groups, and more explicit comparisons of defensive responding to interoceptive versus exteroceptive threats. PMID:26879710

  19. Threat captures attention, but not automatically: Top-down goals modulate attentional orienting to threat distractors.

    PubMed

    Vromen, Joyce M G; Lipp, Ottmar V; Remington, Roger W; Becker, Stefanie I

    2016-10-01

    The rapid orienting of attention to potential threats has been proposed to proceed outside of top-down control. However, paradigms that have been used to investigate this have struggled to separate the rapid orienting of attention (i.e. capture) from the later disengagement of focal attention that may be subject to top-down control. Consequently, it remains unclear whether and to what extent orienting to threat is contingent on top-down goals. The current study manipulated the goal-relevance of threat distractors (spiders), whilst a strict top-down attentional set was encouraged by presenting the saliently colored target and the threat distracter simultaneously for a limited time. The goal-relevance of threatening distractors was manipulated by including a spider amongst the possible target stimuli (Experiment 1: spider/cat targets) or excluding it (Experiment 2: bird/fish targets). Orienting and disengagement were disentangled by cueing attention away from or towards the threat prior to its onset. The results indicated that the threatening spider distractors elicited rapid orienting of attention when spiders were potentially goal-relevant (Experiment 1) but did so much less when they were irrelevant to the task goal (Experiment 2). Delayed disengagement from the threat distractors was even more strongly contingent on the task goal and occurred only when a spider was a possible target. These results highlight the role of top-down goals in attentional orienting to and disengagement from threat. PMID:27234013

  20. Global threat to agriculture from invasive species.

    PubMed

    Paini, Dean R; Sheppard, Andy W; Cook, David C; De Barro, Paul J; Worner, Susan P; Thomas, Matthew B

    2016-07-01

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread.

  1. The Threat Index: A Research Report.

    ERIC Educational Resources Information Center

    Rigdon, Michael A.; And Others

    1979-01-01

    The Threat Index (TI), theoretically based on George Kelly's personal construct theory, was developed as a measure of death orientation. Outlines the emerging reliability and validity picture. The aim is to give direction to future TI research by summarizing and critically evaluating the currently available data. (Author)

  2. Global threat to agriculture from invasive species.

    PubMed

    Paini, Dean R; Sheppard, Andy W; Cook, David C; De Barro, Paul J; Worner, Susan P; Thomas, Matthew B

    2016-07-01

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread. PMID:27325781

  3. Preempting Threats with a Sound School Policy.

    ERIC Educational Resources Information Center

    Stader, David L.

    2000-01-01

    Administrators should regard each student threat as legitimate, but need flexibility in how they respond. Getting the facts and following due process are essential. School policy should require that students be referred to law-enforcement officials and specify communication, crisis-management, identification, and preventive/proactive procedures.…

  4. The silent threat of low genetic diversity

    USGS Publications Warehouse

    Hunter, Margaret E.

    2013-01-01

    Across the Caribbean, protected coastal waters have served as primary feeding and breeding grounds for the endangered Antillean manatee. Unfortunately, these same coastal waters are also a popular “habitat” for humans. In the past, the overlap between human and manatee habitat allowed for manatee hunting and threatened the survival of these gentle marine mammals. Today, however, threats are much more inadvertent and are often related to coastal development, degraded habitats and boat strikes. In the state of Florida, decades of research on the species’ biological needs have helped conservationists address threats to its survival. For example, low wake zones and boater education have protected manatees from boat strikes, and many of their critical winter refuges are now protected. The Florida population has grown steadily, thus increasing from approximately 1,200 in 1991 to more than 5,000 in 2010. It is conceivable that in Florida manatees may one day be reclassified as “threatened” rather than “endangered.” Yet, in other parts of the Caribbean, threats still loom. This includes small, isolated manatee populations found on islands that can be more susceptible to extinction and lack of genetic diversity. To ensure the species’ long-term viability, scientists have turned their sights to the overall population dynamics of manatees throughout the Caribbean. Molecular genetics has provided new insights into long-term threats the species faces. Fortunately, the emerging field of conservation genetics provides managers with tools and strategies for protecting the species’ long-term viability.

  5. Global threat to agriculture from invasive species

    PubMed Central

    Paini, Dean R.; Sheppard, Andy W.; Cook, David C.; De Barro, Paul J.; Worner, Susan P.; Thomas, Matthew B.

    2016-01-01

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread. PMID:27325781

  6. The Asteroid Impact Threat: Decisions Upcoming

    NASA Astrophysics Data System (ADS)

    Schweickart, Russell L.

    The asteroid impact threat has likely been constant for the past three billion years. What has accelerated is our knowledge of the impact hazard, and in particular the population of near- Earth objects (NEOs), those asteroids and near-Earth comets whose orbits approach or cross that of the Earth. In the next 10-15 years we will know the orbits of over 300,000 NEOs of a size capable of destroying a major city on impact. Based on current data 97 Given that a NEO deflection campaign can be initiated using existing space technology the international community will shortly be confronted with the decision of whether action should be taken, when it should be taken and who should take such action. The Association of Space Explorers (ASE)* and its Panel on Asteroid Threat Mitigation is currently concluding a two year process leading to a recommended decision program on asteroid threat mitigation that will be submitted to the United Nations in 2009. UN member states will soon be looking to the scientific community for their inputs on this matter. This presentation is intended to provide basic information on the NEO threat and our ability to take preventive action, anticipating an increasing demand for scientific opinion on this issue from international political institutions. (*) The Association of Space Explorers is the profession international organization of astronauts and cosmonauts. See www.space-explorers.org.

  7. Shape threat detection via adaptive computed tomography

    NASA Astrophysics Data System (ADS)

    Masoudi, Ahmad; Thamvichai, Ratchaneekorn; Neifeld, Mark A.

    2016-05-01

    X-ray Computed Tomography (CT) is used widely for screening purposes. Conventional x-ray threat detection systems employ image reconstruction and segmentation algorithms prior to making threat/no-threat decisions. We find that in many cases these pre-processing steps can degrade detection performance. Therefore in this work we will investigate methods that operate directly on the CT measurements. We analyze a fixed-gantry system containing 25 x-ray sources and 2200 photon counting detectors. We present a new method for improving threat detection performance. This new method is a so-called greedy adaptive algorithm which at each time step uses information from previous measurements to design the next measurement. We utilize sequential hypothesis testing (SHT) in order to derive both the optimal "next measurement" and the stopping criterion to insure a target probability of error Pe. We find that selecting the next x-ray source according to such a greedy adaptive algorithm, we can reduce Pe by a factor of 42.4× relative to the conventional measurement sequence employing all 25 sources in sequence.

  8. Computer Security-Risks, Threats, and Safeguards.

    ERIC Educational Resources Information Center

    Ekhaml, Leticia

    2001-01-01

    Describes a variety of Internet threats to computers and networks used in schools. Discusses electronic trashing; clearing hard drives; cyber spying on Web sites visited; protection against cyber spying, including disposable email accounts; password sniffers; privacy policies; email snooping; email attachments that carry viruses; and hoaxes. (LRW)

  9. Diversity, Racial Threat and Metropolitan Housing Segregation

    ERIC Educational Resources Information Center

    DeFina, Robert; Hannon, Lance

    2009-01-01

    Previous studies have shown that as the percent black or percent Hispanic grows, that group's residential segregation from whites tends to increase as well. Typically, these findings are explained in terms of white discriminatory reaction to the perceived threat associated with minority population growth. The present analysis examines whether…

  10. Threats and countermeasures for network security

    NASA Technical Reports Server (NTRS)

    Denning, Peter J.

    1991-01-01

    In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented.

  11. The Threat Index: An Additive Approach.

    ERIC Educational Resources Information Center

    Robinson, Paul J.; Wood, Keith

    1985-01-01

    Examined the effects of actualization and integration on death anxiety in 120 students who completed the Threat Index, Collett-Lester Fear of Death Scale, and Templer Death Anxiety Scale. Results provided clear evidence that actualization and integration have an additive effect on death fear and anxiety. (JAC)

  12. The Nature of the Terrorism Threat

    ERIC Educational Resources Information Center

    Goldstein, Evan R., Comp.

    2008-01-01

    This article describes how Bruce Hoffman and Marc Sageman, two prominent scholars of terrorism, square off over whether Al Qaeda remains the primary global terrorist threat. The dispute began in the pages of "Foreign Affairs," where Hoffman, a professor in the security-studies program at Georgetown University, wrote a withering review of Sageman's…

  13. Strength Modeling Report

    NASA Technical Reports Server (NTRS)

    Badler, N. I.; Lee, P.; Wong, S.

    1985-01-01

    Strength modeling is a complex and multi-dimensional issue. There are numerous parameters to the problem of characterizing human strength, most notably: (1) position and orientation of body joints; (2) isometric versus dynamic strength; (3) effector force versus joint torque; (4) instantaneous versus steady force; (5) active force versus reactive force; (6) presence or absence of gravity; (7) body somatotype and composition; (8) body (segment) masses; (9) muscle group envolvement; (10) muscle size; (11) fatigue; and (12) practice (training) or familiarity. In surveying the available literature on strength measurement and modeling an attempt was made to examine as many of these parameters as possible. The conclusions reached at this point toward the feasibility of implementing computationally reasonable human strength models. The assessment of accuracy of any model against a specific individual, however, will probably not be possible on any realistic scale. Taken statistically, strength modeling may be an effective tool for general questions of task feasibility and strength requirements.

  14. Using the Threat Probability Task to Assess Anxiety and Fear During Uncertain and Certain Threat

    PubMed Central

    Korhumel, Rachel A.; Curtin, John J.

    2014-01-01

    Fear of certain threat and anxiety about uncertain threat are distinct emotions with unique behavioral, cognitive-attentional, and neuroanatomical components. Both anxiety and fear can be studied in the laboratory by measuring the potentiation of the startle reflex. The startle reflex is a defensive reflex that is potentiated when an organism is threatened and the need for defense is high. The startle reflex is assessed via electromyography (EMG) in the orbicularis oculi muscle elicited by brief, intense, bursts of acoustic white noise (i.e., “startle probes”). Startle potentiation is calculated as the increase in startle response magnitude during presentation of sets of visual threat cues that signal delivery of mild electric shock relative to sets of matched cues that signal the absence of shock (no-threat cues). In the Threat Probability Task, fear is measured via startle potentiation to high probability (100% cue-contingent shock; certain) threat cues whereas anxiety is measured via startle potentiation to low probability (20% cue-contingent shock; uncertain) threat cues. Measurement of startle potentiation during the Threat Probability Task provides an objective and easily implemented alternative to assessment of negative affect via self-report or other methods (e.g., neuroimaging) that may be inappropriate or impractical for some researchers. Startle potentiation has been studied rigorously in both animals (e.g., rodents, non-human primates) and humans which facilitates animal-to-human translational research. Startle potentiation during certain and uncertain threat provides an objective measure of negative affective and distinct emotional states (fear, anxiety) to use in research on psychopathology, substance use/abuse and broadly in affective science. As such, it has been used extensively by clinical scientists interested in psychopathology etiology and by affective scientists interested in individual differences in emotion. PMID:25285398

  15. Weak values and weak coupling maximizing the output of weak measurements

    SciTech Connect

    Di Lorenzo, Antonio

    2014-06-15

    In a weak measurement, the average output 〈o〉 of a probe that measures an observable A{sup -hat} of a quantum system undergoing both a preparation in a state ρ{sub i} and a postselection in a state E{sub f} is, to a good approximation, a function of the weak value A{sub w}=Tr[E{sub f}A{sup -hat} ρ{sub i}]/Tr[E{sub f}ρ{sub i}], a complex number. For a fixed coupling λ, when the overlap Tr[E{sub f}ρ{sub i}] is very small, A{sub w} diverges, but 〈o〉 stays finite, often tending to zero for symmetry reasons. This paper answers the questions: what is the weak value that maximizes the output for a fixed coupling? What is the coupling that maximizes the output for a fixed weak value? We derive equations for the optimal values of A{sub w} and λ, and provide the solutions. The results are independent of the dimensionality of the system, and they apply to a probe having a Hilbert space of arbitrary dimension. Using the Schrödinger–Robertson uncertainty relation, we demonstrate that, in an important case, the amplification 〈o〉 cannot exceed the initial uncertainty σ{sub o} in the observable o{sup -hat}, we provide an upper limit for the more general case, and a strategy to obtain 〈o〉≫σ{sub o}. - Highlights: •We have provided a general framework to find the extremal values of a weak measurement. •We have derived the location of the extremal values in terms of preparation and postselection. •We have devised a maximization strategy going beyond the limit of the Schrödinger–Robertson relation.

  16. Peroneal muscle weakness in female basketballers following chronic ankle sprain.

    PubMed

    Rottigni, S A; Hopper, D

    1991-01-01

    Female A-grade basketballers were examined for invertor and evertor muscle strength. Two test groups participated. The injured group were players who had persisting disability following ankle sprains. The control group were players who had never sustained an ankle sprain. Test apparatus was the Orthotron isokinetic dynamometer at contraction speed of 180° per second. Trends towards higher invertor and evertor strength in uninjured group when compared with the injured group found in the present study have been supported by one other report. Invertors were found to be significantly stronger than evertors in both injured and uninjured groups, with the exception of the dominant leg of the uninjured group. A significant weakness in non-dominant evertors of the uninjured group was detected. Dominance did not significantly alter strength differences in the invertor or evertor muscle groups within the uninjured population. The clinical importance of strengthening the peroneal muscles in ankle sprain rehabilitation is discussed, and further research considerations provided.

  17. Insider Threat - Material Control and Accountability Mitigation

    SciTech Connect

    Powell, Danny H; Elwood Jr, Robert H; Roche, Charles T

    2011-01-01

    The technical objectives of nuclear safeguards are (1) the timely detection of diversion of significant quantities of nuclear material from peaceful uses to the manufacture of nuclear weapons or other nuclear explosive devices or for purposes unknown and (2) the deterrence of such diversion by the risk of early detection. The safeguards and security program must address both outsider threats and insider threats. Outsider threats are primarily addressed by the physical protection system. Insider threats can be any level of personnel at the site including passive or active insiders that could attempt protracted or abrupt diversion. This could occur by an individual acting alone or by collusion between an individual with material control and accountability (MC&A) responsibilities and another individual who has responsibility or control within both the physical protection and the MC&A systems. The insider threat is one that must be understood and incorporated into the safeguards posture. There have been more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. The insider has access, authority, and knowledge, as well as a set of attributes, that make him/her difficult to detect. An integrated safeguards program is designed as a defense-in-depth system that seeks to prevent the unauthorized removal of nuclear material, to provide early detection of any unauthorized attempt to remove nuclear material, and to rapidly respond to any attempted removal of nuclear material. The program is also designed to support protection against sabotage, espionage, unauthorized access, compromise, and other hostile acts that may cause unacceptable adverse impacts on national security, program continuity, the health and safety of employees, the public, or the environment. Nuclear MC&A play an essential role in the capabilities of an integrated safeguards system to deter and detect theft or diversion of nuclear material. An integrated safeguards system with

  18. Weak Coupling in 143Nd

    NASA Astrophysics Data System (ADS)

    Zhou, Xiao-Hong; E, Ideguchi; T, Kishida; M, Ishihara; H, Tsuchida; Y, Gono; T, Morikawa; M, Shibata; H, Watanabe; M, Miyake; T, Tsutsumi; S, Motomura; S, Mitarai

    2000-04-01

    The high-spin states of 143Nd have been studied in the 130Te(18O, 5n)143Nd reaction at a beam energy of 80 MeV using techniques of in-beam γ-ray spectroscopy. Measurements of γ - γ - t coincidences, γ-ray angular distributions, and γ-ray linear polarizations were performed. A level scheme of 143Nd with spin and parity assignments up to 53/2+ is proposed. While a weak coupling model can explain the level structure up to the Jπ=39/2- state, this model can not reproduce the higher-lying states. Additionally, a new low-lying non-yrast level sequence in 143Nd was observed in the present work, which can be well described by the weak coupling of an i13/2 neutron to the 142Nd core nucleus.

  19. Overdamping by weakly coupled environments

    SciTech Connect

    Esposito, Massimiliano; Haake, Fritz

    2005-12-15

    A quantum system weakly interacting with a fast environment usually undergoes a relaxation with complex frequencies whose imaginary parts are damping rates quadratic in the coupling to the environment in accord with Fermi's 'golden rule'. We show for various models (spin damped by harmonic-oscillator or random-matrix baths, quantum diffusion, and quantum Brownian motion) that upon increasing the coupling up to a critical value still small enough to allow for weak-coupling Markovian master equations, a different relaxation regime can occur. In that regime, complex frequencies lose their real parts such that the process becomes overdamped. Our results call into question the standard belief that overdamping is exclusively a strong coupling feature.

  20. Optimizing SNAP for Weak Lensing

    NASA Astrophysics Data System (ADS)

    High, F. W.; Ellis, R. S.; Massey, R. J.; Rhodes, J. D.; Lamoureux, J. I.; SNAP Collaboration

    2004-12-01

    The Supernova/Acceleration Probe (SNAP) satellite proposes to measure weak gravitational lensing in addition to type Ia supernovae. Its pixel scale has been set to 0.10 arcsec per pixel as established by the needs of supernova observations. To find the optimal pixel scale for accurate weak lensing measurements we conduct a tradeoff study in which, via simulations, we fix the suvey size in total pixels and vary the pixel scale. Our preliminary results show that with a smaller scale of about 0.08 arcsec per pixel we can minimize the contribution of intrinsic shear variance to the error on the power spectrum of mass density distortion. Currently we are testing the robustness of this figure as well as determining whether dithering yields analogous results.

  1. Experimental Evidence of Threat-Sensitive Collective Avoidance Responses in a Large Wild-Caught Herring School

    PubMed Central

    Rieucau, Guillaume; Boswell, Kevin M.; De Robertis, Alex; Macaulay, Gavin J.; Handegard, Nils Olav

    2014-01-01

    Aggregation is commonly thought to improve animals' security. Within aquatic ecosystems, group-living prey can learn about immediate threats using cues perceived directly from predators, or from collective behaviours, for example, by reacting to the escape behaviours of companions. Combining cues from different modalities may improve the accuracy of prey antipredatory decisions. In this study, we explored the sensory modalities that mediate collective antipredatory responses of herring (Clupea harengus) when in a large school (approximately 60 000 individuals). By conducting a simulated predator encounter experiment in a semi-controlled environment (a sea cage), we tested the hypothesis that the collective responses of herring are threat-sensitive. We investigated whether cues from potential threats obtained visually or from the perception of water displacement, used independently or in an additive way, affected the strength of the collective avoidance reactions. We modified the sensory nature of the simulated threat by exposing the herring to 4 predator models differing in shape and transparency. The collective vertical avoidance response was observed and quantified using active acoustics. The combination of sensory cues elicited the strongest avoidance reactions, suggesting that collective antipredator responses in herring are mediated by the sensory modalities involved during threat detection in an additive fashion. Thus, this study provides evidence for magnitude-graded threat responses in a large school of wild-caught herring which is consistent with the “threat-sensitive hypothesis”. PMID:24489778

  2. Experimental evidence of threat-sensitive collective avoidance responses in a large wild-caught herring school.

    PubMed

    Rieucau, Guillaume; Boswell, Kevin M; De Robertis, Alex; Macaulay, Gavin J; Handegard, Nils Olav

    2014-01-01

    Aggregation is commonly thought to improve animals' security. Within aquatic ecosystems, group-living prey can learn about immediate threats using cues perceived directly from predators, or from collective behaviours, for example, by reacting to the escape behaviours of companions. Combining cues from different modalities may improve the accuracy of prey antipredatory decisions. In this study, we explored the sensory modalities that mediate collective antipredatory responses of herring (Clupea harengus) when in a large school (approximately 60,000 individuals). By conducting a simulated predator encounter experiment in a semi-controlled environment (a sea cage), we tested the hypothesis that the collective responses of herring are threat-sensitive. We investigated whether cues from potential threats obtained visually or from the perception of water displacement, used independently or in an additive way, affected the strength of the collective avoidance reactions. We modified the sensory nature of the simulated threat by exposing the herring to 4 predator models differing in shape and transparency. The collective vertical avoidance response was observed and quantified using active acoustics. The combination of sensory cues elicited the strongest avoidance reactions, suggesting that collective antipredator responses in herring are mediated by the sensory modalities involved during threat detection in an additive fashion. Thus, this study provides evidence for magnitude-graded threat responses in a large school of wild-caught herring which is consistent with the "threat-sensitive hypothesis".

  3. Importance and challenges of measuring intrinsic foot muscle strength

    PubMed Central

    2012-01-01

    Background Intrinsic foot muscle weakness has been implicated in a range of foot deformities and disorders. However, to establish a relationship between intrinsic muscle weakness and foot pathology, an objective measure of intrinsic muscle strength is needed. The aim of this review was to provide an overview of the anatomy and role of intrinsic foot muscles, implications of intrinsic weakness and evaluate the different methods used to measure intrinsic foot muscle strength. Method Literature was sourced from database searches of MEDLINE, PubMed, SCOPUS, Cochrane Library, PEDro and CINAHL up to June 2012. Results There is no widely accepted method of measuring intrinsic foot muscle strength. Methods to estimate toe flexor muscle strength include the paper grip test, plantar pressure, toe dynamometry, and the intrinsic positive test. Hand-held dynamometry has excellent interrater and intrarater reliability and limits toe curling, which is an action hypothesised to activate extrinsic toe flexor muscles. However, it is unclear whether any method can actually isolate intrinsic muscle strength. Also most methods measure only toe flexor strength and other actions such as toe extension and abduction have not been adequately assessed. Indirect methods to investigate intrinsic muscle structure and performance include CT, ultrasonography, MRI, EMG, and muscle biopsy. Indirect methods often discriminate between intrinsic and extrinsic muscles, but lack the ability to measure muscle force. Conclusions There are many challenges to accurately measure intrinsic muscle strength in isolation. Most studies have measured toe flexor strength as a surrogate measure of intrinsic muscle strength. Hand-held dynamometry appears to be a promising method of estimating intrinsic muscle strength. However, the contribution of extrinsic muscles cannot be excluded from toe flexor strength measurement. Future research should clarify the relative contribution of intrinsic and extrinsic muscles

  4. Sexual harassment under social identity threat: the computer harassment paradigm.

    PubMed

    Maass, Anne; Cadinu, Mara; Guarnieri, Gaia; Grasselli, Annalisa

    2003-11-01

    Two laboratory experiments investigated the hypothesis that threat to male identity would increase the likelihood of gender harassment. In both experiments, using the computer harassment paradigm, male university students (N=80 in Experiment 1, N=90 in Experiment 2) were exposed to different types of identity threat (legitimacy threat and threat to group value in Experiment 1 and distinctiveness threat and prototypicality threat in Experiment 2) or to no threat and were then given the opportunity to send pornographic material to a virtual female interaction partner. Results show that (a) participants harassed the female interaction partner more when they were exposed to a legitimacy, distinctiveness, or prototypicality threat than to no threat; (b) this was mainly true for highly identified males; and (c) harassment enhanced postexperimental gender identification. Results are interpreted as supporting a social identity account of gender harassment.

  5. A threat in the computer: the race implicit association test as a stereotype threat experience.

    PubMed

    Frantz, Cynthia M; Cuddy, Amy J C; Burnett, Molly; Ray, Heidi; Hart, Allen

    2004-12-01

    Three experiments test whether the threat of appearing racist leads White participants to perform worse on the race Implicit Association Test (IAT) and whether self-affirmation can protect from this threat. Experiments 1 and 2 suggest that White participants show a stereotype threat effect when completing the race IAT, leading to stronger pro-White scores when the test is believed to be diagnostic of racism. This effect increases for domain-identified (highly motivated to control prejudice) participants (Experiment 2). In Experiment 3, self-affirmation inoculates participants against stereotype threat while taking the race IAT. These findings have methodological implications for use of the race IAT and theoretical implications concerning the malleability of automatic prejudice and the potential interpersonal effects of the fear of appearing racist.

  6. Prevalence of reduced muscle strength in older U.S. adults: United States, 2011-2012.

    PubMed

    Looker, Anne C; Wang, Chia-Yih

    2015-01-01

    Five percent of adults aged 60 and over had weak muscle strength and 13% had intermediate muscle strength, as defined by the new FNIH criteria. Weak muscle strength is clinically relevant because it is associated with slow gait speed, an important mobility impairment. It is also linked to an increased risk of death. The prevalence of reduced muscle strength increased with age and was higher in non-Hispanic Asian and Hispanic persons than in non-Hispanic white or non-Hispanic black persons. Decreasing muscle strength was linked with increased difficulty in rising from an armless chair, which is another important type of mobility impairment. PMID:25633238

  7. The Strength of the Metal. Aluminum Oxide Interface

    NASA Technical Reports Server (NTRS)

    Pepper, S. V.

    1984-01-01

    The strength of the interface between metals and aluminum oxide is an important factor in the successful operation of devices found throughout modern technology. One finds the interface in machine tools, jet engines, and microelectronic integrated circuits. The strength of the interface, however, should be strong or weak depending on the application. The diverse technological demands have led to some general ideas concerning the origin of the interfacial strength, and have stimulated fundamental research on the problem. Present status of our understanding of the source of the strength of the metal - aluminum oxide interface in terms of interatomic bonds are reviewed. Some future directions for research are suggested.

  8. Studies of fiber-matrix adhesion on compression strength

    NASA Technical Reports Server (NTRS)

    Bascom, Willard D.; Nairn, John A.; Boll, D. J.

    1991-01-01

    A study was initiated on the effect of the matrix polymer and the fiber matrix bond strength of carbon fiber polymer matrix composites. The work includes tests with micro-composites, single ply composites, laminates, and multi-axial loaded cylinders. The results obtained thus far indicate that weak fiber-matrix adhesion dramatically reduces 0 degree compression strength. Evidence is also presented that the flaws in the carbon fiber that govern compression strength differ from those that determine fiber tensile strength. Examination of post-failure damage in the single ply tests indicates kink banding at the crack tip.

  9. Alumina fiber strength improvement

    NASA Technical Reports Server (NTRS)

    Pepper, R. T.; Nelson, D. C.

    1982-01-01

    The effective fiber strength of alumina fibers in an aluminum composite was increased to 173,000 psi. A high temperature heat treatment, combined with a glassy carbon surface coating, was used to prevent degradation and improve fiber tensile strength. Attempts to achieve chemical strengthening of the alumina fiber by chromium oxide and boron oxide coatings proved unsuccessful. A major problem encountered on the program was the low and inconsistent strength of the Dupont Fiber FP used for the investigation.

  10. Insider Threat and Information Security Management

    NASA Astrophysics Data System (ADS)

    Coles-Kemp, Lizzie; Theoharidou, Marianthi

    The notion of insider has multiple facets. An organization needs to identify which ones to respond to. The selection, implementetion and maintenance of information security countermeasures requires a complex combination of organisational policies, functions and processes, which form Information Security Management. This chapter examines the role of current information security management practices in addressing the insider threat. Most approaches focus on frameworks for regulating insider behaviour and do not allow for the various cultural responses to the regulatory and compliance framework. Such responses are not only determined by enforcement of policies and awareness programs, but also by various psychological and organisational factors at an individual or group level. Crime theories offer techniques that focus on such cultural responses and can be used to enhance the information security management design. The chapter examines the applicability of several crime theories and concludes that they can contribute in providing additional controls and redesign of information security management processes better suited to responding to the insider threat.

  11. The Concept of Identification in Threat Assessment.

    PubMed

    Meloy, J Reid; Mohandie, Kris; Knoll, James L; Hoffmann, Jens

    2015-06-01

    Identification is one of eight warning behaviors--superordinate patterns of accelerating risk--that are theorized to correlate with targeted violence, and have some empirical validation. It is characterized by one or more of five characteristics: pseudo-commando behavior, evidence of a warrior mentality, a close association with weapons or other military or law enforcement paraphernalia, wanting to imitate and often surmount previous attackers or assassins, or believing oneself to be an agent to advance a particular cause or belief system. The authors briefly explore the history of the psychology of identification, its current usage, and its application to threat assessment. Four cases are used to illustrate identification as both a process and a product, and a likely motive for targeted violence in some subjects. Its operational relevance for threat assessment is suggested. PMID:25728417

  12. Nursing science: more promise than threat.

    PubMed

    Jennings, B M

    1986-09-01

    This paper considers the issue of nursing science. Nursing, as an art, has long been accepted as integral to nursing. Nursing, as a science, however, is a more recent concept. Nursing science is viewed as a threat to the profession by its opponents, while the proponents of nursing science see it as a promise for advancement of the discipline. This paper examines the issue of nursing science by looking at its history and development, the definition of science, and five factors critical to the nursing science issue. The author concludes that nursing science is, in varying respects, both a threat and a promise. It is clear that the preponderance of evidence favours the promise nursing science holds for the profession of nursing. It is not a matter of choosing either art or science, but rather skillfully blending both for the betterment of nursing. Both art and science are necessary in nursing--neither, however, is sufficient.

  13. Securing Infrastructure from High Explosive Threats

    SciTech Connect

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  14. Future Infectious Disease Threats to Europe

    PubMed Central

    Suk, Jonathan E.

    2011-01-01

    We examined how different drivers of infectious disease could interact to threaten control efforts in Europe. We considered projected trends through 2020 for 3 broad groups of drivers: globalization and environmental change, social and demographic change, and health system capacity. Eight plausible infectious disease threats with the potential to be significantly more problematic than they are today were identified through an expert consultation: extensively drug-resistant bacteria, vector-borne diseases, sexually transmitted infections, food-borne infections, a resurgence of vaccine-preventable diseases, health care–associated infections, multidrug-resistant tuberculosis, and pandemic influenza. Preemptive measures to be taken by the public health community to counteract these threats were identified. PMID:21940915

  15. Detecting underwater improvised explosive threats (DUIET)

    NASA Astrophysics Data System (ADS)

    Feeley, Terry

    2010-04-01

    Improvised Explosive Devices (IEDs) have presented a major threat in the wars in Afghanistan and Iraq. These devices are powerful homemade land mines that can be small and easily hidden near roadsides. They are then remotely detonated when Coalition Forces pass by either singly or in convoys. Their rapid detection, classification and destruction is key to the safety of troops in the area. These land based bombs will have an analogue in the underwater theater especially in ports, lakes, rivers and streams. These devices may be used against Americans on American soil as an element of the global war on terrorism (GWOT) Rapid detection and classification of underwater improvised explosive devices (UIED) is critical to protecting innocent lives and maintaining the day to day flow of commerce. This paper will discuss a strategy and tool set to deal with this potential threat.

  16. EPR Severe Accident Threats and Mitigation

    SciTech Connect

    Azarian, G.; Kursawe, H.M.; Nie, M.; Fischer, M.; Eyink, J.; Stoudt, R.H.

    2004-07-01

    Despite the extremely low EPR core melt frequency, an improved defence-in-depth approach is applied in order to comply with the EPR safety target: no stringent countermeasures should be necessary outside the immediate plant vicinity like evacuation, relocation or food control other than the first harvest in case of a severe accident. Design provisions eliminate energetic events and maintain the containment integrity and leak-tightness during the entire course of the accident. Based on scenarios that cover a broad range of physical phenomena and which provide a sound envelope of boundary conditions associated with each containment challenge, a selection of representative loads has been done, for which mitigation measures have to cope with. This paper presents the main critical threats and the approach used to mitigate those threats. (authors)

  17. Detecting weakly interacting massive particles.

    NASA Astrophysics Data System (ADS)

    Drukier, A. K.; Gelmini, G. B.

    The growing synergy between astrophysics, particle physics, and low background experiments strengthens the possibility of detecting astrophysical non-baryonic matter. The idea of direct detection is that an incident, massive weakly interacting particle could collide with a nucleus and transfer an energy that could be measured. The present low levels of background achieved by the PNL/USC Ge detector represent a new technology which yields interesting bounds on Galactic cold dark matter and on light bosons emitted from the Sun. Further improvements require the development of cryogenic detectors. The authors analyse the practicality of such detectors, their optimalization and background suppression using the "annual modulation effect".

  18. Weak lensing by galaxy troughs

    NASA Astrophysics Data System (ADS)

    Gruen, Daniel

    2016-06-01

    Galaxy troughs, i.e. underdensities in the projected galaxy field, are a weak lensing probe of the low density Universe with high signal-to-noise ratio. I present measurements of the radial distortion of background galaxy images and the de-magnification of the CMB by troughs constructed from Dark Energy Survey and Sloan Digital Sky Survey galaxy catalogs. With high statistical significance and a relatively robust modeling, these probe gravity in regimes of density and scale difficult to access for conventional statistics.

  19. Weak quasielastic production of hyperons

    SciTech Connect

    Singh, S. K.; Vacas, M. J. Vicente

    2006-09-01

    The quasielastic weak production of {lambda} and {sigma} hyperons from nucleons and nuclei induced by antineutrinos is studied in the energy region of some ongoing neutrino oscillation experiments in the intermediate energy region. The hyperon-nucleon transition form factors determined from neutrino-nucleon scattering and an analysis of high precision data on semileptonic decays of neutron and hyperons using SU(3) symmetry have been used. The nuclear effects due to Fermi motion and final state interaction effects due to hyperon-nucleon scattering have also been studied. The numerical results for differential and total cross sections have been presented.

  20. Tagged-weak {pi} method

    SciTech Connect

    Margaryan, A.; Hashimoto, O.; Kakoyan, V.; Knyazyan, S.; Tang, L.

    2011-02-15

    A new 'tagged-weak {pi} method' is proposed for determination of electromagnetic transition probabilities B(E2) and B(M1) of the hypernuclear states with lifetimes of {approx}10{sup -10} s. With this method, we are planning to measure B(E2) and B(M1) for light hypernuclei at JLab. The results of Monte Carlo simulations for the case of E2(5/2{sup +}, 3/2{sup +} {yields} 1/2{sup +}) transitions in {sub {Lambda}}{sup 7}He hypernuclei are presented.

  1. Climate change and global infectious disease threats.

    PubMed

    Jackson, E K

    The world's climate is warming up and, while debate continues about how much change we can expect, it is becoming clear that even small changes in climate can have major effects on the spread of disease. Erwin K Jackson, a member of Greenpeace International's Climate Impacts Unit and a delegate to the 11th session of the United Nations Intergovernmental Panel on Climate Change (Rome, 11-15 December), reviews the scientific evidence of this new global threat to health.

  2. Matrix Characterization in Threat Material Detection Processes

    SciTech Connect

    Obhodas, J.; Sudac, D.; Valkovic, V.

    2009-03-10

    Matrix characterization in the threat material detection is of utmost importance, it generates the background against which the threat material signal has to be identified. Threat materials (explosive, chemical warfare, ...) are usually contained within small volume inside large volumes of variable matrices. We have studied the influence of matrix materials on the capability of neutron systems to identify hidden threat material. Three specific scenarios are considered in some details: case 1--contraband material in the sea containers, case 2 - explosives in soil (landmines), case 3 - explosives and chemical warfare on the sea bottom. Effects of container cargo material on tagged neutron system are seen in the increase of gamma background and the decrease of neutron beam intensity. Detection of landmines is more complex because of variable soil properties. We have studied in detail space and time variations of soil elemental compositions and in particular hydrogen content (humidity). Of special interest are ammunitions and chemical warfare on the sea bottom, damping sites and leftovers from previous conflicts (WW-I, WW-II and local). In this case sea sediment is background source and its role is similar to the role of the soil in the landmine detection. In addition to geochemical cycling of chemical elements in semi-enclosed sea, like the Adriatic Sea, one has to consider also anthropogenic influence, especially when studying small scale variations in concentration levels. Some preliminary experimental results obtained with tagged neutron sensor inside an underwater vehicle are presented as well as data on sediment characterization by X-Ray Fluorescence.

  3. Avian influenza: an emerging pandemic threat.

    PubMed

    Jin, Xian Wen; Mossad, Sherif B

    2005-12-01

    While we are facing the threat of an emerging pandemic from the current avian flu outbreak in Asia, we have learned important traits of the virus responsible for the 1918 Spanish influenza pandemic that made it so deadly. By using stockpiled antiviral drugs effectively and developing an effective vaccine, we can be in a better position than ever to mitigate the global impact of an avian influenza pandemic. PMID:16392727

  4. Nonproliferation, Nuclear Security, and the Insider Threat

    SciTech Connect

    Balatsky, Galya I.; Duggan, Ruth

    2012-07-12

    Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

  5. Mere effort and stereotype threat performance effects.

    PubMed

    Jamieson, Jeremy P; Harkins, Stephen G

    2007-10-01

    Although the fact that stereotype threat impacts performance is well established, the underlying process(es) is(are) not clear. Recently, T. Schmader and M. Johns (2003) argued for a working memory interference account, which proposes that performance suffers because cognitive resources are expended on processing information associated with negative stereotypes. The antisaccade task provides a vehicle to test this account because optimal performance requires working memory resources to inhibit the tendency to look at an irrelevant, peripheral cue (the prepotent response) and to generate volitional saccades to the target. If stereotype threat occupies working memory resources, then the ability to inhibit the prepotent response and to launch volitional saccades will be impaired, and performance will suffer. In contrast, S. Harkins's (2006) mere effort account argues that stereotype threat participants are motivated to perform well, which potentiates the prepotent response, but also leads to efforts to counter this tendency if participants recognize that the response is incorrect, know the correct response, and have the opportunity to make it. Results from 4 experiments support the mere effort but not the working memory interference account.

  6. Toddlers’ Duration of Attention towards Putative Threat

    PubMed Central

    Kiel, Elizabeth J.; Buss, Kristin A.

    2010-01-01

    Although individual differences in reactions to novelty in the toddler years have been consistently linked to risk for developing anxious behavior, toddlers’ attention towards a novel, putatively threatening stimulus while in the presence of other enjoyable activities has rarely been examined as a precursor to such risk. The current study examined how attention towards an angry-looking gorilla mask in a room with alternative opportunities for play in 24-month-old toddlers predicted social inhibition when children entered kindergarten. Analyses examined attention to threat above and beyond and in interaction with both proximity to the mask and fear of novelty observed in other situations. Attention to threat interacted with proximity to the mask to predict social inhibition, such that attention to threat most strongly predicted social inhibition when toddlers stayed furthest from the mask. This relation occurred above and beyond the predictive relation between fear of novelty and social inhibition. Results are discussed within the broader literature of anxiety development and attentional processes in young children. PMID:21373365

  7. Asymmetric threat data mining and knowledge discovery

    NASA Astrophysics Data System (ADS)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  8. Posterror speeding after threat-detection failure.

    PubMed

    Caudek, Corrado; Ceccarini, Francesco; Sica, Claudio

    2015-04-01

    Cognitive control enables individuals to rapidly adapt to changing task demands. To investigate error-driven adjustments in cognitive control, we considered performance changes in posterror trials, when participants performed a visual search task requiring detection of angry, happy, or neutral facial expressions in crowds of faces. We hypothesized that the failure to detect a potential threat (angry face) would prompt a different posterror adjustment than the failure to detect a nonthreatening target (happy or neutral face). Indeed, in 3 sets of experiments, we found evidence of posterror speeding, in the first case, and of posterror slowing, in the second case. Previous results indicate that a threatening stimulus can improve the efficiency of visual search. The results of the present study show that a similar effect can also be observed when participants fail to detect a threat. The impact of threat-detection failure on cognitive control, as revealed by the present study, suggests that posterror adjustments should be understood as the product of domain-specific mechanisms that are strongly influenced by affective information, rather than as the effect of a general-purpose error-monitoring system.

  9. Cyber threat model for tactical radio networks

    NASA Astrophysics Data System (ADS)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  10. Stereotype threat reinterpreted as a regulatory mismatch.

    PubMed

    Grimm, Lisa R; Markman, Arthur B; Maddox, W Todd; Baldwin, Grant C

    2009-02-01

    This research documents performance decrements resulting from the activation of a negative task-relevant stereotype. The authors combine a number of strands of work to identify causes of stereotype threat in a way that allows them to reverse the effects and improve the performance of individuals with negative task-relevant stereotypes. The authors draw on prior work suggesting that negative stereotypes induce a prevention focus and on other research suggesting that people exhibit greater flexibility when their regulatory focus matches the reward structure of the task. This work suggests that stereotype threat effects emerge from a prevention focus combined with tasks that have an explicit or implicit gains reward structure. The authors find flexible performance can be induced in individuals who have a negative task-relevant stereotype by use of a losses reward structure. The authors demonstrate the interaction of stereotypes and the reward structure of the task with chronic stereotypes and Graduate Record Examination math problems (Experiment 1), and with primed stereotypes and a category learning task (Experiments 2A and 2B). The authors discuss implications of this research for other work on stereotype threat.

  11. Bot armies as threats to network security

    NASA Astrophysics Data System (ADS)

    Banks, Sheila B.; Stytz, Martin R.

    2007-04-01

    "Botnets", or "bot armies", are large groups of remotely controlled malicious software. Bot armies pose one of the most serious security threats to all networks. Botnets, remotely controlled and operated by botmasters or botherders, can launch massive denial of service attacks, multiple penetration attacks, or any other malicious network activity on a massive scale. While bot army activity has, in the past, been limited to fraud, blackmail, and other forms of criminal activity, their potential for causing large-scale damage to the entire internet; for launching large-scale, coordinated attacks on government computers and networks; and for large-scale, coordinated data gathering from thousands of users and computers on any network has been underestimated. This paper will not discuss how to build bots but the threats they pose. In a "botnet" or "bot army", computers can be used to spread spam, launch denial-of-service attacks against Web sites, conduct fraudulent activities, and prevent authorized network traffic from traversing the network. In this paper we discuss botnets and the technologies that underlie this threat to network and computer security. The first section motivates the need for improved protection against botnets, their technologies, and for further research about botnets. The second contains background information about bot armies and their key underlying technologies. The third section presents a discussion of the types of attacks that botnets can conduct and potential defenses against them. The fourth section contains a summary and suggestions for future research and development.

  12. Strength Training and Your Child

    MedlinePlus

    ... Story" 5 Things to Know About Zika & Pregnancy Strength Training and Your Child KidsHealth > For Parents > Strength Training ... help prevent injuries and speed up recovery. About Strength Training Strength training is the practice of using free ...

  13. The weak scale from BBN

    NASA Astrophysics Data System (ADS)

    Hall, Lawrence J.; Pinner, David; Ruderman, Joshua T.

    2014-12-01

    The measured values of the weak scale, v, and the first generation masses, m u, d, e , are simultaneously explained in the multiverse, with all these parameters scanning independently. At the same time, several remarkable coincidences are understood. Small variations in these parameters away from their measured values lead to the instability of hydrogen, the instability of heavy nuclei, and either a hydrogen or a helium dominated universe from Big Bang Nucleosynthesis. In the 4d parameter space of ( m u , m d , m e , v), catastrophic boundaries are reached by separately increasing each parameter above its measured value by a factor of (1.4, 1.3, 2.5, ˜ 5), respectively. The fine-tuning problem of the weak scale in the Standard Model is solved: as v is increased beyond the observed value, it is impossible to maintain a significant cosmological hydrogen abundance for any values of m u, d, e that yield both hydrogen and heavy nuclei stability.

  14. Weak antilocalisation in topological insulators

    NASA Astrophysics Data System (ADS)

    Bi, Xintao; Hankiewicz, Ewelina; Culcer, Dimitrie

    2014-03-01

    Topological insulators (TI) have changed our understanding of insulating behaviour. They are insulators in the bulk but conducting along their surfaces due to spin-orbit interaction. Much of the recent research focuses on overcoming the transport bottleneck, the fact that surface state transport is overwhelmed by bulk transport stemming from unintentional doping. The key to overcoming this bottleneck is identifying unambiguous signatures of surface state transport. This talk will discuss one such signature, which is manifest in the coherent backscattering of electrons. Due to strong spin-orbit coupling in TI one expects to observe weak antilocalisation rather than weak localisation, meaning that coherent backscattering increases the electrical conductivity. The features of this effect, however, are rather subtle, because in TI the impurities have strong spin-orbit coupling as well. I will show that spin-orbit coupled impurities introduce an additional time scale, which is expected to be shorter than the dephasing time, and the resulting conductivity has a logarithmic dependence on the carrier density, a behaviour hitherto unknown in 2D electron systems. The result we predict is observable experimentally and would provide a smoking gun test of surface transport.

  15. Weak lensing and cosmological investigation

    NASA Astrophysics Data System (ADS)

    Acquaviva, Viviana

    2005-03-01

    In the last few years the scientific community has been dealing with the challenging issue of identifying the dark energy component. We regard weak gravitational lensing as a brand new, and extremely important, tool for cosmological investigation in this field. In fact, the features imprinted on the Cosmic Microwave Background radiation by the lensing from the intervening distribution of matter represent a pretty unbiased estimator, and can thus be used for putting constraints on different dark energy models. This is true in particular for the magnetic-type B-modes of CMB polarization, whose unlensed spectrum at large multipoles (l ~= 1000) is very small even in presence of an amount of gravitational waves as large as currently allowed by the experiments: therefore, on these scales the lensing phenomenon is the only responsible for the observed power, and this signal turns out to be a faithful tracer of the dark energy dynamics. We first recall the formal apparatus of the weak lensing in extended theories of gravity, introducing the physical observables suitable to cast the bridge between lensing and cosmology, and then evaluate the amplitude of the expected effect in the particular case of a Non-Minimally-Coupled model, featuring a quadratic coupling between quintessence and Ricci scalar.

  16. Culture, Threat, and Mental Illness Stigma: Identifying Culture-Specific Threat among Chinese-American Groups

    PubMed Central

    Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G.; Saw, Anne; Wong, Gloria; Phelan, Jo C.

    2014-01-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one’s family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002–2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. PMID:23702210

  17. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    PubMed

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures.

  18. Building on Our Strengths.

    ERIC Educational Resources Information Center

    Hill, Robert

    1978-01-01

    Comments on the feeling that the American family is disintegrating, and that many criticisms traditionally made about Black families are now made about White families. Suggests that people need to stress family strengths. As an example, five major strengths of Black families are described: flexibility, work and achievement ethics, religiosity, and…

  19. Strengths of Remarried Families.

    ERIC Educational Resources Information Center

    Knaub, Patricia Kain; And Others

    1984-01-01

    Focuses on remarried families' (N=80) perceptions of family strengths, marital satisfaction, and adjustment to the remarried situation. Results indicated that although most would like to make some changes, scores on the measurements used were high. A supportive environment was the most important predictor of family strength and success. (JAC)

  20. 75 FR 60430 - Federal Advisory Committee; Threat Reduction Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-30

    ... technology security, combating weapons of mass destruction (WMD), chemical and biological defense, the future... level briefings on WMD threats, the Defense Threat Reduction Agency, and the status of the...

  1. Introduction to Administrative Programs that Mitigate the Insider Threat

    SciTech Connect

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  2. Stereotype Threat and Feedback Seeking in the Workplace.

    ERIC Educational Resources Information Center

    Roberson, Loriann; Deitch, Elizabeth A.; Brief, Arthur P.; Block, Caryn J.

    2003-01-01

    Among 166 African American managers, those who were the only minority-group member in their workgroup perceived more stereotype threat. Stereotype threat was related to indirect feedback seeking and discounting of supervisors' performance feedback. (Contains 41 references.) (SK)

  3. Making Mountains of Morality From Molehills of Virtue: Threat Causes People to Overestimate Their Moral Credentials.

    PubMed

    Effron, Daniel A

    2014-05-01

    Seven studies demonstrate that threats to moral identity can increase how definitively people think they have previously proven their morality. When White participants were made to worry that their future behavior could seem racist, they overestimated how much a prior decision of theirs would convince an observer of their non-prejudiced character (Studies 1a-3). Ironically, such overestimation made participants appear more prejudiced to observers (Study 4). Studies 5 to 6 demonstrated a similar effect of threat in the domain of charitable giving-an effect driven by individuals for whom maintaining a moral identity is particularly important. Threatened participants only enhanced their beliefs that they had proven their morality when there was at least some supporting evidence, but these beliefs were insensitive to whether the evidence was weak or strong (Study 2). Discussion considers the role of motivated reasoning, and implications for ethical decision making and moral licensing.

  4. Motivation for aggressive religious radicalization: goal regulation theory and a personality × threat × affordance hypothesis.

    PubMed

    McGregor, Ian; Hayes, Joseph; Prentice, Mike

    2015-01-01

    A new set of hypotheses is presented regarding the cause of aggressive religious radicalization (ARR). It is grounded in classic and contemporary theory of human motivation and goal regulation, together with recent empirical advances in personality, social, and neurophysiological psychology. We specify personality traits, threats, and group affordances that combine to divert normal motivational processes toward ARR. Conducive personality traits are oppositional, anxiety-prone, and identity-weak (i.e., morally bewildered). Conducive threats are those that arise from seemingly insurmountable external forces and frustrate effective goal regulation. Conducive affordances include opportunity for immediate and concrete engagement in active groups that are powered by conspiracy narratives, infused with cosmic significance, encouraging of moral violence, and sealed with religious unfalsifiability. We propose that ARR is rewarding because it can spur approach motivated states that mask vulnerability for people whose dispositions and circumstances would otherwise leave them mired in anxious distress. PMID:26441709

  5. Motivation for aggressive religious radicalization: goal regulation theory and a personality × threat × affordance hypothesis

    PubMed Central

    McGregor, Ian; Hayes, Joseph; Prentice, Mike

    2015-01-01

    A new set of hypotheses is presented regarding the cause of aggressive religious radicalization (ARR). It is grounded in classic and contemporary theory of human motivation and goal regulation, together with recent empirical advances in personality, social, and neurophysiological psychology. We specify personality traits, threats, and group affordances that combine to divert normal motivational processes toward ARR. Conducive personality traits are oppositional, anxiety-prone, and identity-weak (i.e., morally bewildered). Conducive threats are those that arise from seemingly insurmountable external forces and frustrate effective goal regulation. Conducive affordances include opportunity for immediate and concrete engagement in active groups that are powered by conspiracy narratives, infused with cosmic significance, encouraging of moral violence, and sealed with religious unfalsifiability. We propose that ARR is rewarding because it can spur approach motivated states that mask vulnerability for people whose dispositions and circumstances would otherwise leave them mired in anxious distress. PMID:26441709

  6. Linking terrestrial and marine conservation planning and threats analysis.

    PubMed

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  7. Space Station crew safety alternatives study. Volume 2: Threat development

    NASA Technical Reports Server (NTRS)

    Raasch, R. F.; Peercy, R. L., Jr.; Rockoff, L. A.

    1985-01-01

    The first 15 years of accumulated space station concepts for initial operational capability (IOC) during the early 1990's were considered. Twenty-five threats to the space station are identified and selected threats addressed as impacting safety criteria, escape and rescue, and human factors safety concerns. Of the 25 threats identified, eight are discussed including strategy options for threat control: fire, biological or toxic contamination, injury/illness, explosion, loss of pressurization, radiation, meteoroid penetration, and debris.

  8. The eyes are sufficient to produce a threat superiority effect.

    PubMed

    Fox, Elaine; Damjanovic, Ljubica

    2006-08-01

    The research described in this article used a visual search task and demonstrated that the eye region alone can produce a threat superiority effect. Indeed, the magnitude of the threat superiority effect did not increase with whole-face, relative to eye-region-only, stimuli. The authors conclude that the configuration of the eyes provides a key signal of threat, which can mediate the search advantage for threat-related facial expressions.

  9. Social identity threat motivates science-discrediting online comments.

    PubMed

    Nauroth, Peter; Gollwitzer, Mario; Bender, Jens; Rothmund, Tobias

    2015-01-01

    Experiencing social identity threat from scientific findings can lead people to cognitively devalue the respective findings. Three studies examined whether potentially threatening scientific findings motivate group members to take action against the respective findings by publicly discrediting them on the Web. Results show that strongly (vs. weakly) identified group members (i.e., people who identified as "gamers") were particularly likely to discredit social identity threatening findings publicly (i.e., studies that found an effect of playing violent video games on aggression). A content analytical evaluation of online comments revealed that social identification specifically predicted critiques of the methodology employed in potentially threatening, but not in non-threatening research (Study 2). Furthermore, when participants were collectively (vs. self-) affirmed, identification did no longer predict discrediting posting behavior (Study 3). These findings contribute to the understanding of the formation of online collective action and add to the burgeoning literature on the question why certain scientific findings sometimes face a broad public opposition. PMID:25646725

  10. Social Identity Threat Motivates Science-Discrediting Online Comments

    PubMed Central

    Nauroth, Peter; Gollwitzer, Mario; Bender, Jens; Rothmund, Tobias

    2015-01-01

    Experiencing social identity threat from scientific findings can lead people to cognitively devalue the respective findings. Three studies examined whether potentially threatening scientific findings motivate group members to take action against the respective findings by publicly discrediting them on the Web. Results show that strongly (vs. weakly) identified group members (i.e., people who identified as “gamers”) were particularly likely to discredit social identity threatening findings publicly (i.e., studies that found an effect of playing violent video games on aggression). A content analytical evaluation of online comments revealed that social identification specifically predicted critiques of the methodology employed in potentially threatening, but not in non-threatening research (Study 2). Furthermore, when participants were collectively (vs. self-) affirmed, identification did no longer predict discrediting posting behavior (Study 3). These findings contribute to the understanding of the formation of online collective action and add to the burgeoning literature on the question why certain scientific findings sometimes face a broad public opposition. PMID:25646725

  11. Strengths of serpentinite gouges at elevated temperatures

    USGS Publications Warehouse

    Moore, Diane E.; Lockner, D.A.; Ma, S.; Summers, R.; Byerlee, J.D.

    1997-01-01

    Serpentinite has been proposed as a cause of both low strength and aseismic creep of fault zones. To test these hypotheses, we have measured the strength of chrysotile-, lizardite-, and antigorite-rich serpentinite gouges under hydrothermal conditions, with emphasis on chrysotile, which has thus far received little attention. At 25??C, the coefficient of friction, ??, of chrysotile gouge is roughly 0.2, whereas the lizardite- and antigorite-rich gouges are at least twice as strong. The very low room temperature strength of chrysotile is a consequence of its unusually high adsorbed water content. When the adsorbed water is removed, chrysotile is as strong as pure antigorite gouge at room temperature. Heating to ???200??C causes the frictional strengths of all three gouges to increase. Limited data suggest that different polytypes of a given serpentine mineral have similar strengths; thus deformation-induced changes in polytype should not affect fault strength. At 25??C, the chrysotile gouge has a transition from velocity strengthening at low velocities to velocity weakening at high velocities, consistent with previous studies. At temperatures up to ???200??C, however, chrysotile strength is essentially independent of velocity at low velocities. Overall, chrysotile has a restricted range of velocity-strengthening behavior that migrates to higher velocities with increasing temperature. Less information on velocity dependence is available for the lizardite and antigorite gouges, but their behavior is consistent with that outlined for chrysotile. The marked changes in velocity dependence and strength of chrysotile with heating underscore the hazards of using room temperature data to predict fault behavior at depth. The velocity behavior at elevated temperatures does not rule out serpentinite as a cause of aseismic slip, but in the presence of a hydrostatic fluid pressure gradient, all varieties of serpentine are too strong to explain the apparent weakness of faults such

  12. Isolating Neural Components of Threat Bias in Pediatric Anxiety

    ERIC Educational Resources Information Center

    Britton, Jennifer C.; Bar-Haim, Yair; Carver, Frederick W.; Holroyd, Tom; Norcross, Maxine A.; Detloff, Allison; Leibenluft, Ellen; Ernst, Monique; Pine, Daniel S.

    2012-01-01

    Background: Attention biases toward threat are often detected in individuals with anxiety disorders. Threat biases can be measured experimentally through dot-probe paradigms, in which individuals detect a probe following a stimulus pair including a threat. On these tasks, individuals with anxiety tend to detect probes that occur in a location…

  13. Death Threat and Death Concerns in the College Student.

    ERIC Educational Resources Information Center

    Tobacyk, Jerome; Eckstein, Daniel

    1980-01-01

    Thanatology students reported significantly lesser death threat and significantly greater death concerns. Trait anxiety was found to be a significant predictor of change in death threat in the Thanatology Group, with lesser anxiety associated with greater decline in death threat. (Author)

  14. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES Security Threat Assessments § 1540.209 Fees for security threat assessment. This section... 49 Transportation 9 2013-10-01 2013-10-01 false Fees for security threat assessment....

  15. Student Reports of Peer Threats of Violence: Prevalence and Outcomes

    ERIC Educational Resources Information Center

    Nekvasil, Erin K.; Cornell, Dewey G.

    2012-01-01

    Authorities in education and law enforcement have recommended that schools use a threat-assessment approach to prevent violence, but there is relatively little research on characteristics and outcomes of threats among students. The current study examined student reports of threat experiences in a sample of 3,756 high school students. Approximately…

  16. Attention Training and the Threat Bias: An ERP Study

    ERIC Educational Resources Information Center

    O'Toole, Laura; Dennis, Tracy A.

    2012-01-01

    Anxiety is characterized by exaggerated attention to threat. Several studies suggest that this threat bias plays a causal role in the development and maintenance of anxiety disorders. Furthermore, although the threat bias can be reduced in anxious individuals and induced in non-anxious individual, the attentional mechanisms underlying these…

  17. Gender, Stereotype Threat, and Anxiety: Psychophysiological and Cognitive Evidence

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2006-01-01

    Introduction: Claude Steele's stereotype threat hypothesis proposed that negative group stereotypes increase individual anxiety levels, hurting performance. However, the role of anxiety in stereotype threat has not been fully explored. This study examined the hypothesis that experimental manipulation of stereotype threat would influence real-time…

  18. Unleashing Latent Ability: Implications of Stereotype Threat for College Admissions

    ERIC Educational Resources Information Center

    Logel, Christine R.; Walton, Gregory M.; Spencer, Steven J.; Peach, Jennifer; Mark, Zanna P.

    2012-01-01

    Social-psychological research conducted over the past 15 years provides compelling evidence that pervasive psychological threats are present in common academic environments--especially threats that originate in negative intellectual stereotypes--and that these threats undermine the real-world academic performance of non-Asian ethnic minority…

  19. Assessing the threat of firearms: new threat formula, resources, and ontological linking algorithms

    NASA Astrophysics Data System (ADS)

    Hempelmann, Christian F.; Arslan, Abdullah N.; Attardo, Salvatore; Blount, Grady P.; Sirakov, Nikolay Metodiev

    2014-06-01

    The present work is part of an ongoing larger project.2, 3, 11, 12 The goal of this project is to develop a system capable of automatic threat assessment for instances of firearms use in public places. The main components of the system are: an ontology of firearms;1, 14 algorithms to create the visual footprint of the firearms,1, 14 to compare visual information,2, 3, 11, 12 to facilitate search in the ontology, and to generate the links between the conceptual and visual ontologies; as well as a formula to calculate the threat of individual firearms, firearms classes, and ammunition types in different environments. One part of the dual-level ontology for the properties of the firearms captures key visual features used to identify their type or class in images, while the other part captures their threat-relevant conceptual properties. The visual ontology is the result of image segmentation and matching methods, while the conceptual ontology is designed using knowledge-engineering principles and populated semi-automatically from Web resources. The focus of the present paper is two-fold. On the one hand, we will report on an update of the initial threat formula, based on the substantially increased population of the firearm ontology, including ammunition types and comparisons to actual incidents, and allowing for an overall more accurate assessment. On the other hand, the linking algorithms between the visual and conceptual ontologies are elaborated for faster transfer of information leading to an improvement in accuracy of the threat assessment.

  20. Revealing geometric phases in modular and weak values with a quantum eraser

    NASA Astrophysics Data System (ADS)

    Cormann, Mirko; Remy, Mathilde; Kolaric, Branko; Caudano, Yves

    2016-04-01

    We present a procedure to completely determine the complex modular values of arbitrary observables of pre- and postselected ensembles, which works experimentally for all measurement strengths and all postselected states. This procedure allows us to discuss the physics of modular and weak values in interferometric experiments involving a qubit meter. We determine both the modulus and the argument of the modular value for any measurement strength in a single step, by simultaneously controlling the visibility and the phase in a quantum eraser interference experiment. Modular and weak values are closely related. Using entangled qubits for the probed and meter systems, we show that the phase of the modular and weak values has a topological origin. This phase is completely defined by the intrinsic physical properties of the probed system and its time evolution. The physical significance of this phase can thus be used to evaluate the quantumness of weak values.

  1. Dynamic strength of molecular adhesion bonds.

    PubMed Central

    Evans, E; Ritchie, K

    1997-01-01

    In biology, molecular linkages at, within, and beneath cell interfaces arise mainly from weak noncovalent interactions. These bonds will fail under any level of pulling force if held for sufficient time. Thus, when tested with ultrasensitive force probes, we expect cohesive material strength and strength of adhesion at interfaces to be time- and loading rate-dependent properties. To examine what can be learned from measurements of bond strength, we have extended Kramers' theory for reaction kinetics in liquids to bond dissociation under force and tested the predictions by smart Monte Carlo (Brownian dynamics) simulations of bond rupture. By definition, bond strength is the force that produces the most frequent failure in repeated tests of breakage, i.e., the peak in the distribution of rupture forces. As verified by the simulations, theory shows that bond strength progresses through three dynamic regimes of loading rate. First, bond strength emerges at a critical rate of loading (> or = 0) at which spontaneous dissociation is just frequent enough to keep the distribution peak at zero force. In the slow-loading regime immediately above the critical rate, strength grows as a weak power of loading rate and reflects initial coupling of force to the bonding potential. At higher rates, there is crossover to a fast regime in which strength continues to increase as the logarithm of the loading rate over many decades independent of the type of attraction. Finally, at ultrafast loading rates approaching the domain of molecular dynamics simulations, the bonding potential is quickly overwhelmed by the rapidly increasing force, so that only naked frictional drag on the structure remains to retard separation. Hence, to expose the energy landscape that governs bond strength, molecular adhesion forces must be examined over an enormous span of time scales. However, a significant gap exists between the time domain of force measurements in the laboratory and the extremely fast scale

  2. Lizard locomotion on weak sand

    NASA Astrophysics Data System (ADS)

    Goldman, Daniel

    2005-03-01

    Terrestrial animal locomotion in the natural world can involve complex foot-ground interaction; for example, running on sand probes the solid and fluid behaviors of the medium. We study locomotion of desert-dwelling lizard Callisaurus draconoides (length 16 cm, mass=20 g) during rapid running on sand. To explore the role of foot-ground interaction on locomotion, we study the impact of flat disks ( 2 cm diameter, 10 grams) into a deep (800 particle diameters) bed of 250 μm glass spheres of fixed volume fraction φ 0.59, and use a vertical flow of air (a fluidized bed) to change the material properties of the medium. A constant flow Q below the onset of bed fluidization weakens the solid: at fixed φ the penetration depth and time of a disk increases with increasing Q. We measure the average speed, foot impact depth, and foot contact time as a function of material strength. The animal maintains constant penetration time (30 msec) and high speed (1.4 m/sec) even when foot penetration depth varies as we manipulate material strength. The animals compensate for decreasing propulsion by increasing stride frequency.

  3. 7 CFR 51.894 - Weak.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... Standards for Grades of Table Grapes (European or Vinifera Type) 1 Definitions § 51.894 Weak. Weak means... content, inferior flavor, or are of poor keeping quality....

  4. 7 CFR 51.894 - Weak.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Standards for Grades of Table Grapes (European or Vinifera Type) 1 Definitions § 51.894 Weak. Weak means that individual berries are somewhat translucent, watery and soft, may have relatively low...

  5. 7 CFR 51.894 - Weak.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Standards for Grades of Table Grapes (European or Vinifera Type) 1 Definitions § 51.894 Weak. Weak means that individual berries are somewhat translucent, watery and soft, may have relatively low...

  6. Migrant networks and international migration: testing weak ties.

    PubMed

    Liu, Mao-Mei

    2013-08-01

    This article examines the role of migrant social networks in international migration and extends prior research by testing the strength of tie theory, decomposing networks by sources and resources, and disentangling network effects from complementary explanations. Nearly all previous empirical research has ignored friendship ties and has largely neglected extended-family ties. Using longitudinal data from the Migration between Africa and Europe project collected in Africa (Senegal) and Europe (France, Italy, and Spain), this article tests the robustness of network theory-and in particular, the role of weak ties-on first-time migration between Senegal and Europe. Discrete-time hazard model results confirm that weak ties are important and that network influences appear to be gendered, but they do not uphold the contention in previous literature that strong ties are more important than weak ties for male and female migration. Indeed, weak ties play an especially important role in male migration. In terms of network resources, having more resources as a result of strong ties appears to dampen overall migration, while having more resources as a result of weaker ties appears to stimulate male migration. Finally, the diversity of resources has varied effects for male and female migration.

  7. Breaking through barriers: using technology to address executive function weaknesses and improve student achievement.

    PubMed

    Schwartz, David M

    2014-01-01

    Assistive technologies provide significant capabilities for improving student achievement. Improved accessibility, cost, and diversity of applications make integration of technology a powerful tool to compensate for executive function weaknesses and deficits and their impact on student performance, learning, and achievement. These tools can be used to compensate for decreased working memory, poor time management, poor planning and organization, poor initiation, and decreased memory. Assistive technology provides mechanisms to assist students with diverse strengths and weaknesses in mastering core curricular concepts. PMID:25010083

  8. Using SWOT Analysis for Promoting the Accounting Program.

    ERIC Educational Resources Information Center

    Sawyer, Joe E.

    2001-01-01

    Describes how SWOT (strengths, weaknesses, opportunities, threats) analysis can be used by business educators to find the best match between environmental trends (opportunities and threats) and internal departmental capabilities (strengths and weaknesses). An example from accounting education is provided. (JOW)

  9. Cooperative Threat Reduction: Cooperation Threat Reduction Program Liquid Propellant Disposition Project

    NASA Astrophysics Data System (ADS)

    2002-09-01

    This audit is one in a series of audits the Deputy Secretary of Defense requested. As part of the Cooperative Threat Reduction (CTR) Program, DoD agreed to assist the Russian Federation in disposing of its liquid rocket propellant. Public Law 102-228 (section 2551 NOTE, title 22, United States Code), the Soviet Nuclear Threat Reduction Act of 1991 designates DoD as the executive agent for the CTR Program. Specific objectives of the act are to destroy chemical, nuclear, and other weapons; transport, store, disable, and safeguard weapons in connection with their destruction; and establish verifiable safeguards against proliferation of weapons of mass destruction. The Office of the Assistant Secretary of Defense (International Security Policy), under the Office of the Under Secretary of Defense for Policy, develops, coordinates, and oversees implementation of policy for the CTR Program. The CTR Directorate, Defense Threat Reduction Agency operates the program.

  10. Weak, Quiet Magnetic Fields Seen in the Venus Atmosphere

    PubMed Central

    Zhang, T. L.; Baumjohann, W.; Russell, C. T.; Luhmann, J. G.; Xiao, S. D.

    2016-01-01

    The existence of a strong internal magnetic field allows probing of the interior through both long term changes of and short period fluctuations in that magnetic field. Venus, while Earth’s twin in many ways, lacks such a strong intrinsic magnetic field, but perhaps short period fluctuations can still be used to probe the electrical conductivity of the interior. Toward the end of the Venus Express mission, an aerobraking campaign took the spacecraft below the ionosphere into the very weakly electrically conducting atmosphere. As the spacecraft descended from 150 to 140 km altitude, the magnetic field became weaker on average and less noisy. Below 140 km, the median field strength became steady but the short period fluctuations continued to weaken. The weakness of the fluctuations indicates they might not be useful for electromagnetic sounding of the atmosphere from a high altitude platform such as a plane or balloon, but possibly could be attempted on a lander. PMID:27009234

  11. Weak, Quiet Magnetic Fields Seen in the Venus Atmosphere

    NASA Astrophysics Data System (ADS)

    Zhang, Tielong; Baumjohann, Wolfgang; Russell, Christopher; Luhmann, Janet

    2016-04-01

    The existence of a strong internal magnetic field allows probing of the interior through both long term changes of and short period fluctuations in that magnetic field. Venus, while Earth's twin in many ways, lacks such a strong intrinsic magnetic field, but perhaps short period fluctuations can still be used to probe the electrical conductivity of the interior. Toward the end of the Venus Express mission, an aerobraking campaign took the spacecraft below the ionosphere into the very weakly electrically conducting atmosphere. As the spacecraft descended from 150 to 140 km altitude, the magnetic field became weaker on average and less noisy. Below 140 km, the median field strength became steady but the short period fluctuations continued to weaken. The weakness of the fluctuations indicates they might not be useful for electromagnetic sounding of the atmosphere from a high altitude platform such as a plane or balloon, but possibly could be attempted on a lander.

  12. Weak, Quiet Magnetic Fields Seen in the Venus Atmosphere

    NASA Astrophysics Data System (ADS)

    Zhang, T. L.; Baumjohann, W.; Russell, C. T.; Luhmann, J. G.; Xiao, S. D.

    2016-03-01

    The existence of a strong internal magnetic field allows probing of the interior through both long term changes of and short period fluctuations in that magnetic field. Venus, while Earth’s twin in many ways, lacks such a strong intrinsic magnetic field, but perhaps short period fluctuations can still be used to probe the electrical conductivity of the interior. Toward the end of the Venus Express mission, an aerobraking campaign took the spacecraft below the ionosphere into the very weakly electrically conducting atmosphere. As the spacecraft descended from 150 to 140 km altitude, the magnetic field became weaker on average and less noisy. Below 140 km, the median field strength became steady but the short period fluctuations continued to weaken. The weakness of the fluctuations indicates they might not be useful for electromagnetic sounding of the atmosphere from a high altitude platform such as a plane or balloon, but possibly could be attempted on a lander.

  13. Weak, Quiet Magnetic Fields Seen in the Venus Atmosphere.

    PubMed

    Zhang, T L; Baumjohann, W; Russell, C T; Luhmann, J G; Xiao, S D

    2016-01-01

    The existence of a strong internal magnetic field allows probing of the interior through both long term changes of and short period fluctuations in that magnetic field. Venus, while Earth's twin in many ways, lacks such a strong intrinsic magnetic field, but perhaps short period fluctuations can still be used to probe the electrical conductivity of the interior. Toward the end of the Venus Express mission, an aerobraking campaign took the spacecraft below the ionosphere into the very weakly electrically conducting atmosphere. As the spacecraft descended from 150 to 140 km altitude, the magnetic field became weaker on average and less noisy. Below 140 km, the median field strength became steady but the short period fluctuations continued to weaken. The weakness of the fluctuations indicates they might not be useful for electromagnetic sounding of the atmosphere from a high altitude platform such as a plane or balloon, but possibly could be attempted on a lander. PMID:27009234

  14. Weak, Quiet Magnetic Fields Seen in the Venus Atmosphere.

    PubMed

    Zhang, T L; Baumjohann, W; Russell, C T; Luhmann, J G; Xiao, S D

    2016-03-24

    The existence of a strong internal magnetic field allows probing of the interior through both long term changes of and short period fluctuations in that magnetic field. Venus, while Earth's twin in many ways, lacks such a strong intrinsic magnetic field, but perhaps short period fluctuations can still be used to probe the electrical conductivity of the interior. Toward the end of the Venus Express mission, an aerobraking campaign took the spacecraft below the ionosphere into the very weakly electrically conducting atmosphere. As the spacecraft descended from 150 to 140 km altitude, the magnetic field became weaker on average and less noisy. Below 140 km, the median field strength became steady but the short period fluctuations continued to weaken. The weakness of the fluctuations indicates they might not be useful for electromagnetic sounding of the atmosphere from a high altitude platform such as a plane or balloon, but possibly could be attempted on a lander.

  15. Deterministic weak localization in periodic structures.

    PubMed

    Tian, C; Larkin, A

    2005-12-01

    In some perfect periodic structures classical motion exhibits deterministic diffusion. For such systems we present the weak localization theory. As a manifestation for the velocity autocorrelation function a universal power law decay is predicted to appear at four Ehrenfest times. This deterministic weak localization is robust against weak quenched disorders, which may be confirmed by coherent backscattering measurements of periodic photonic crystals.

  16. Protection without detection: a threat mitigation technique

    NASA Astrophysics Data System (ADS)

    White, Joshua; McCoy, Joseph R.; Ratazzi, Paul

    2012-05-01

    Networking systems and individual applications have traditionally been defended using signature-based tools that protect the perimeter, many times to the detriment of service, performance, and information flow. These tools require knowledge of both the system on which they run and the attack they are preventing. As such, by their very definition, they only account for what is known to be malicious and ignore the unknown. The unknown, or zero day threat, can occur when defenses have yet to be immunized via a signature or other identifier of the threat. In environments where execution of the mission is paramount, the networks and applications must perform their function of information delivery without endangering the enterprise or losing the salient information, even when facing zero day threats. In this paper we, describe a new defensive strategy that provides a means to more deliberately balance the oft mutually exclusive aspects of protection and availability. We call this new strategy Protection without Detection, since it focuses on network protection without sacrificing information availability. The current instantiation analyzes the data stream in real time as it passes through an in-line device. Critical files are recognized, and mission-specific trusted templates are applied as they are forwarded to their destination. The end result is a system which eliminates the opportunity for propagation of malicious or unnecessary payloads via the various containers that are inherent in the definition of standard file types. In some cases, this method sacrifices features or functionality that is typically inherent in these files. However, with the flexibility of the template approach, inclusion or exclusion of these features becomes a deliberate choice of the mission owners, based on their needs and amount of acceptable risk. The paper concludes with a discussion of future extensions and applications.

  17. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...) MAOP increases; or (iii) The stresses leading to cyclic fatigue increase. (4) ERW pipe. If a covered... internal corrosion, external corrosion, and stress corrosion cracking; (2) Static or resident threats, such... consider any threats unique to the integrity of plastic pipe. (e) Actions to address particular threats....

  18. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...) MAOP increases; or (iii) The stresses leading to cyclic fatigue increase. (4) ERW pipe. If a covered... internal corrosion, external corrosion, and stress corrosion cracking; (2) Static or resident threats, such... consider any threats unique to the integrity of plastic pipe. (e) Actions to address particular threats....

  19. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    ERIC Educational Resources Information Center

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  20. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    ERIC Educational Resources Information Center

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  1. Assessing the global threat from Zika virus.

    PubMed

    Lessler, Justin; Chaisson, Lelia H; Kucirka, Lauren M; Bi, Qifang; Grantz, Kyra; Salje, Henrik; Carcelen, Andrea C; Ott, Cassandra T; Sheffield, Jeanne S; Ferguson, Neil M; Cummings, Derek A T; Metcalf, C Jessica E; Rodriguez-Barraquer, Isabel

    2016-08-12

    First discovered in 1947, Zika virus (ZIKV) infection remained a little-known tropical disease until 2015, when its apparent association with a considerable increase in the incidence of microcephaly in Brazil raised alarms worldwide. There is limited information on the key factors that determine the extent of the global threat from ZIKV infection and resulting complications. Here, we review what is known about the epidemiology, natural history, and public health effects of ZIKV infection, the empirical basis for this knowledge, and the critical knowledge gaps that need to be filled.

  2. Rabies: the emergence of a microbial threat.

    PubMed

    Borus, P

    1996-01-01

    Since 1912 when rabies was first confirmed in Kenya, the disease has largely existed in varying degrees of occurrence. Spatial and temporal distribution of cases of animal rabies are well documented. Records of human cases have not been as detailed as the veterinary cases. The principal animal reservoir for rabies has been the dog. Save for the 1960s, rabies outbreaks occurred in the country for most part of this century. The 1980's witnessed a dramatic upward swing in the number of cases reported annually. Over the years an enzootic pattern covering most parts of the country emerged. This article reviews available data showing rabies as an emerging microbial threat in Kenya.

  3. Assessing the global threat from Zika virus.

    PubMed

    Lessler, Justin; Chaisson, Lelia H; Kucirka, Lauren M; Bi, Qifang; Grantz, Kyra; Salje, Henrik; Carcelen, Andrea C; Ott, Cassandra T; Sheffield, Jeanne S; Ferguson, Neil M; Cummings, Derek A T; Metcalf, C Jessica E; Rodriguez-Barraquer, Isabel

    2016-08-12

    First discovered in 1947, Zika virus (ZIKV) infection remained a little-known tropical disease until 2015, when its apparent association with a considerable increase in the incidence of microcephaly in Brazil raised alarms worldwide. There is limited information on the key factors that determine the extent of the global threat from ZIKV infection and resulting complications. Here, we review what is known about the epidemiology, natural history, and public health effects of ZIKV infection, the empirical basis for this knowledge, and the critical knowledge gaps that need to be filled. PMID:27417495

  4. Lyssaviruses and Bats: Emergence and Zoonotic Threat

    PubMed Central

    Banyard, Ashley C.; Evans, Jennifer S.; Luo, Ting Rong; Fooks, Anthony R.

    2014-01-01

    The continued detection of zoonotic viral infections in bats has led to the microbial fauna of these mammals being studied at a greater level than ever before. Whilst numerous pathogens have been discovered in bat species, infection with lyssaviruses is of particular significance from a zoonotic perspective as, where human infection has been reported, it is invariably fatal. Here we review the detection of lyssaviruses within different bat species and overview what is understood regarding their maintenance and transmission following both experimental and natural infection. We discuss the relevance of these pathogens as zoonotic agents and the threat of newly discovered viruses to human populations. PMID:25093425

  5. Crew Strength Training

    NASA Video Gallery

    Train to develop your upper and lower body strength in your muscles and bones by performing body-weight squats and push-ups.The Train Like an Astronaut project uses the excitement of exploration to...

  6. Developing Strengths in Families

    ERIC Educational Resources Information Center

    Bowman, Ted

    1976-01-01

    There are few descriptions of growth experiences for total families. This paper describes one such model. It expresses the conviction that families need opportunities to come together with other families to identify strengths, sharpen communication skills, and establish goals. (Author)

  7. Ignoring real faces: effects of valence, threat, and salience.

    PubMed

    Blagrove, Elisabeth; Watson, Derrick G

    2014-04-01

    Facial stimuli have been shown to accrue a special status within visual processing, particularly when attention is prioritized to one face over another on the basis of affective content. This has been examined in relation to the ability of faces to guide or hold attention, or to resist attentional suppression. Previous work has shown that schematic faces can only be partially ignored and that the emotional valence of to-be-ignored faces has little effect. Given recent debates concerning the use of schematic faces, here we examined the ease with which photorealistic faces could be ignored. Although we found evidence of a partial preview benefit for these stimuli, the findings were complex, with stimulus salience, valence, and threat content interacting to affect both the strength of the benefit and target detection efficiency (Exps. 1-3). Experiment 4 then clarified the effects of physical salience and perceived stimulus similarity in the previous experiments, demonstrating that a combination of these factors is likely to account for the search patterns observed.

  8. Stereotype threat can reduce older adults' memory errors.

    PubMed

    Barber, Sarah J; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research, we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment. Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 and 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well.

  9. In Brief: Threats to species continue

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2009-11-01

    Of 47,677 assessed species, 17,291 are threatened with extinction, according to the latest update of the Red List of Threatened Species issued by the International Union for Conservation of Nature (IUCN) on 3 November. The list indicates that amphibians are the most threatened group of species known to date, with 1895 (nearly 30%) of 6285 amphibians in danger of extinction. Thirty-nine are already extinct or extinct in the wild, 484 are critically endangered, 754 are endangered, and 657 are vulnerable, according to IUCN. Under threat are 21% of mammals, 30% of amphibians, 12% of birds, 28% of reptiles, 37% of freshwater fishes, 70% of plants, and 35% of invertebrates assessed to date. “We have only managed to assess 47,663 species so far; there are many more millions out there which could be under serious threat,” according to IUCN Red List Unit Manager Craig Hilton-Taylor. For more information, visit http://www.iucnredlist.org.

  10. Passive acoustic threat detection in estuarine environments

    NASA Astrophysics Data System (ADS)

    Borowski, Brian; Sutin, Alexander; Roh, Heui-Seol; Bunin, Barry

    2008-04-01

    The Maritime Security Laboratory (MSL) at Stevens Institute of Technology supports research in a range of areas relevant to harbor security, including passive acoustic detection of underwater threats. The difficulties in using passive detection in an urban estuarine environment include intensive and highly irregular ambient noise and the complexity of sound propagation in shallow water. MSL conducted a set of tests in the Hudson River near Manhattan in order to measure the main parameters defining the detection distance of a threat: source level of a scuba diver, transmission loss of acoustic signals, and ambient noise. The source level of the diver was measured by comparing the diver's sound with a reference signal from a calibrated emitter placed on his path. Transmission loss was measured by comparing noise levels of passing ships at various points along their routes, where their distance from the hydrophone was calculated with the help of cameras and custom software. The ambient noise in the Hudson River was recorded under varying environmental conditions and amounts of water traffic. The passive sonar equation was then applied to estimate the range of detection. Estimations were done for a subset of the recorded noise levels, and we demonstrated how variations in the noise level, attenuation, and the diver's source level influence the effective range of detection. Finally, we provided analytic estimates of how an array improves upon the detection distance calculated by a single hydrophone.

  11. Identifying chemicals that are planetary boundary threats.

    PubMed

    MacLeod, Matthew; Breitholtz, Magnus; Cousins, Ian T; de Wit, Cynthia A; Persson, Linn M; Rudén, Christina; McLachlan, Michael S

    2014-10-01

    Rockström et al. proposed a set of planetary boundaries that delimit a "safe operating space for humanity". Many of the planetary boundaries that have so far been identified are determined by chemical agents. Other chemical pollution-related planetary boundaries likely exist, but are currently unknown. A chemical poses an unknown planetary boundary threat if it simultaneously fulfills three conditions: (1) it has an unknown disruptive effect on a vital Earth system process; (2) the disruptive effect is not discovered until it is a problem at the global scale, and (3) the effect is not readily reversible. In this paper, we outline scenarios in which chemicals could fulfill each of the three conditions, then use the scenarios as the basis to define chemical profiles that fit each scenario. The chemical profiles are defined in terms of the nature of the effect of the chemical and the nature of exposure of the environment to the chemical. Prioritization of chemicals in commerce against some of the profiles appears feasible, but there are considerable uncertainties and scientific challenges that must be addressed. Most challenging is prioritizing chemicals for their potential to have a currently unknown effect on a vital Earth system process. We conclude that the most effective strategy currently available to identify chemicals that are planetary boundary threats is prioritization against profiles defined in terms of environmental exposure combined with monitoring and study of the biogeochemical processes that underlie vital Earth system processes to identify currently unknown disruptive effects.

  12. Unattended sensors for nuclear threat detection

    SciTech Connect

    Runkle, Robert C.; Myjak, Mitchell J.; Batdorf, Michael T.; Bowler, Ryan S.; Kiff, Scott D.; Morris, Scott J.; Mullen, Crystal A.; Rohrer, John S.; Todd, Lindsay C.

    2008-06-30

    This paper discusses the ongoing development of a compact, unattended, and low-power radiation detection system designed for deployment to the front lines of nuclear proliferation. Current countermeasure deployments aim to detect nuclear threats by screening cargo containers abroad or at ports of entry, but the defensive nature of these systems means that they face the immense challenge of detecting intentionally-concealed materials. A complementary strategy places countermeasures closer to the source of nuclear proliferation, but deployments to these regions often must operate autonomously and in the absence of infrastructure. This application motivates our development of a low-power system capable of detecting gamma-ray and neutron emissions while operating autonomously for extended periods of time. Many challenges are present when developing radiation-detection systems for this application, and this paper describes work focused on two of them: the development of compact, low-power electronics for gamma-ray-spectrometer and 3He- tube signal processing, and analysis algorithms capable of distinguishing threats from benign sources in mid-resolution gamma-ray spectrometers. We discuss our development efforts on these fronts and present results based on implementation in a proof-of-principle system comprised of two 5 cm x 10 cm x 41 cm NaI(Tl) crystals and eight 40-cm 3He tubes.

  13. Protecting weak measurements against systematic errors

    NASA Astrophysics Data System (ADS)

    Pang, Shengshi; Alonso, Jose Raul Gonzalez; Brun, Todd A.; Jordan, Andrew N.

    2016-07-01

    In this work, we consider the systematic error of quantum metrology by weak measurements under decoherence. We derive the systematic error of maximum likelihood estimation in general to the first-order approximation of a small deviation in the probability distribution and study the robustness of standard weak measurement and postselected weak measurements against systematic errors. We show that, with a large weak value, the systematic error of a postselected weak measurement when the probe undergoes decoherence can be significantly lower than that of a standard weak measurement. This indicates another advantage of weak-value amplification in improving the performance of parameter estimation. We illustrate the results by an exact numerical simulation of decoherence arising from a bosonic mode and compare it to the first-order analytical result we obtain.

  14. Fast Learning with Weak Synaptic Plasticity.

    PubMed

    Yger, Pierre; Stimberg, Marcel; Brette, Romain

    2015-09-30

    New sensory stimuli can be learned with a single or a few presentations. Similarly, the responses of cortical neurons to a stimulus have been shown to increase reliably after just a few repetitions. Long-term memory is thought to be mediated by synaptic plasticity, but in vitro experiments in cortical cells typically show very small changes in synaptic strength after a pair of presynaptic and postsynaptic spikes. Thus, it is traditionally thought that fast learning requires stronger synaptic changes, possibly because of neuromodulation. Here we show theoretically that weak synaptic plasticity can, in fact, support fast learning, because of the large number of synapses N onto a cortical neuron. In the fluctuation-driven regime characteristic of cortical neurons in vivo, the size of membrane potential fluctuations grows only as √N, whereas a single output spike leads to potentiation of a number of synapses proportional to N. Therefore, the relative effect of a single spike on synaptic potentiation grows as √N. This leverage effect requires precise spike timing. Thus, the large number of synapses onto cortical neurons allows fast learning with very small synaptic changes. Significance statement: Long-term memory is thought to rely on the strengthening of coactive synapses. This physiological mechanism is generally considered to be very gradual, and yet new sensory stimuli can be learned with just a few presentations. Here we show theoretically that this apparent paradox can be solved when there is a tight balance between excitatory and inhibitory input. In this case, small synaptic modifications applied to the many synapses onto a given neuron disrupt that balance and produce a large effect even for modifications induced by a single stimulus. This effect makes fast learning possible with small synaptic changes and reconciles physiological and behavioral observations.

  15. A Universe without Weak Interactions

    SciTech Connect

    Harnik, Roni; Kribs, Graham D.; Perez, Gilad

    2006-04-07

    A universe without weak interactions is constructed that undergoes big-bang nucleosynthesis, matter domination, structure formation, and star formation. The stars in this universe are able to burn for billions of years, synthesize elements up to iron, and undergo supernova explosions, dispersing heavy elements into the interstellar medium. These definitive claims are supported by a detailed analysis where this hypothetical ''Weakless Universe'' is matched to our Universe by simultaneously adjusting Standard Model and cosmological parameters. For instance, chemistry and nuclear physics are essentially unchanged. The apparent habitability of the Weakless Universe suggests that the anthropic principle does not determine the scale of electroweak breaking, or even require that it be smaller than the Planck scale, so long as technically natural parameters may be suitably adjusted. Whether the multi-parameter adjustment is realized or probable is dependent on the ultraviolet completion, such as the string landscape. Considering a similar analysis for the cosmological constant, however, we argue that no adjustments of other parameters are able to allow the cosmological constant to raise up even remotely close to the Planck scale while obtaining macroscopic structure. The fine-tuning problems associated with the electroweak breaking scale and the cosmological constant therefore appear to be qualitatively different from the perspective of obtaining a habitable universe.

  16. Weak Turbulence in Radiation Belts

    NASA Astrophysics Data System (ADS)

    Ganguli, Gurudas; Crabtree, Chris; Rudakov, Leonid

    2015-11-01

    Weak turbulence plays a significant role in space plasma dynamics. Induced nonlinear scattering dominates the evolution in the low-beta isothermal radiation belt plasmas and affects the propagation characteristics of waves. As whistler waves propagate away from the earth they are scattered in the magnetosphere such that their trajectories are turned earthward where they are reflected back towards the magnetosphere. Repeated scattering and reflection of the whistlers establishes a cavity in which the wave energy can be maintained for a long duration with, on average, a smaller wave-normal angle. Consequently, the cyclotron resonance time for the trapped energetic electrons increases, leading to an enhanced pitch-angle scattering rate. Enhanced pitch-angle scattering lowers the lifetime of the energetic electron population. Also, pitch-angle scattering of the trapped population in the cavity with a loss cone distribution amplifies the whistler waves, which in turn promotes a more rapid precipitation through a positive feedback mechanism. Typical storm-pumped radiation belt parameters and laboratory experiments will be used to elucidate this phenomenon Work supported by NRL Base Funds.

  17. Weak Turbulence in Radiation Belts

    NASA Astrophysics Data System (ADS)

    Ganguli, G.; Crabtree, C. E.; Rudakov, L.

    2015-12-01

    Weak turbulence plays a significant role in space plasma dynamics. Induced nonlinear scattering dominates the evolution in the low-beta isothermal radiation belt plasmas and affects the propagation characteristics of waves. As whistler waves propagate away from the earth they are scattered in the magnetosphere such that their trajectories are turned earthward where they are reflected back towards the magnetosphere. Repeated scattering and reflection of the whistlers establishes a cavity in which the wave energy can be maintained for a long duration with, on average, a smaller wave-normal angle. Consequently, the cyclotron resonance time for the trapped energetic electrons increases, leading to an enhanced pitch-angle scattering rate. Enhanced pitch-angle scattering lowers the lifetime of the energetic electron population. Also, pitch-angle scattering of the trapped population in the cavity with a loss cone distribution amplifies the whistler waves, which in turn promotes a more rapid precipitation through a positive feedback mechanism. Typical storm-pumped radiation belt parameters and laboratory experiments will be used to elucidate this phenomenon.

  18. Violation of the Leggett–Garg inequality with weak measurements of photons

    PubMed Central

    Goggin, M. E.; Almeida, M. P.; Barbieri, M.; Lanyon, B. P.; O’Brien, J. L.; White, A. G.; Pryde, G. J.

    2011-01-01

    By weakly measuring the polarization of a photon between two strong polarization measurements, we experimentally investigate the correlation between the appearance of anomalous values in quantum weak measurements and the violation of realism and nonintrusiveness of measurements. A quantitative formulation of the latter concept is expressed in terms of a Leggett–Garg inequality for the outcomes of subsequent measurements of an individual quantum system. We experimentally violate the Leggett–Garg inequality for several measurement strengths. Furthermore, we experimentally demonstrate that there is a one-to-one correlation between achieving strange weak values and violating the Leggett–Garg inequality. PMID:21220296

  19. Severe Weather and Weak Waterspout Checklist in MIDDS

    NASA Technical Reports Server (NTRS)

    Wheeler, Mark M.

    2009-01-01

    The goal of this task was to migrate the functionality of the AMU web-based Severe Weather Forecast Decision Aid and the 45 WS Weak Waterspout Checklist to MIDDS, the operational data ingest and display system of the 45 WS. Forecasting the occurrence and timing of warm season severe weather and weak waterspouts is challenging for 45 WS operational personnel. These interactive tools assist forecasters in determining the probability of issuing severe weather watches and warnings for the day. MIDDS is able retrieve many of the needed parameter values for the worksheet automatically. The AMU was able to develop user-friendly tools in MIDDS for both of these tools using McBASI coded programs. The tools retrieve needed values from MIDDS automatically, and require the forecaster to answer a few subjective questions. Both tools were tested and previewed to the 45 WS on MIDDS. In their previous forms, the forecasters enter values into both tools manually to output a threat index. Making these tools more automatic will reduce the possibility of human error and increase efficiency.

  20. A Lesson Not to Be Learned? Understanding Stereotype Threat Does Not Protect Women from Stereotype Threat

    ERIC Educational Resources Information Center

    Tomasetto, Carlo; Appoloni, Sara

    2013-01-01

    This research examines whether reading a text presenting scientific evidence concerning the phenomenon of stereotype threat improves or disrupts women's performance in a subsequent math task. In two experimental conditions participants (N=118 ) read a text summarizing an experiment in which stereotypes, and not biological differences, were shown…