WorldWideScience

Sample records for additional terrestrial threat

  1. Amphibian nitrate stress as an additional terrestrial threat from astrophysical ionizing radiation events?

    Thomas, Brian C

    2008-01-01

    As diversity in amphibian species declines, the search for causes has intensified. Work in this area has shown that amphibians are especially susceptible to the combination of heightened UVB radiation and increased nitrate concentrations. Various astrophysical events have been suggested as sources of ionizing radiation that could pose a threat to life on Earth, through destruction of the ozone layer and subsequent increase in UVB, followed by deposition of nitrate. In this study, we investigate whether the nitrate deposition following an ionizing event is sufficiently large to cause an additional stress beyond that of the heightened UVB previously considered. We have converted predicted nitrate depositions to concentration values, utilizing data from the New York State Department of Environmental Conservation Acid Rain Monitoring Network web site. Our results show that the increase in nitrate concentration in bodies of water following the most intense ionization event likely in the last billion years would no...

  2. Linking terrestrial and marine conservation planning and threats analysis.

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems. PMID:18254857

  3. Global response patterns of terrestrial plant species to nitrogen addition.

    Xia, Jianyang; Wan, Shiqiang

    2008-07-01

    Better understanding of the responses of terrestrial plant species under global nitrogen (N) enrichment is critical for projection of changes in structure, functioning, and service of terrestrial ecosystems. Here, a meta-analysis of data from 304 studies was carried out to reveal the general response patterns of terrestrial plant species to the addition of N. Across 456 terrestrial plant species included in the analysis, biomass and N concentration were increased by 53.6 and 28.5%, respectively, under N enrichment. However, the N responses were dependent upon plant functional types, with significantly greater biomass increases in herbaceous than in woody species. Stimulation of plant biomass by the addition of N was enhanced when other resources were improved. In addition, the N responses of terrestrial plants decreased with increasing latitude and increased with annual precipitation. Dependence of the N responses of terrestrial plants on biological realms, functional types, tissues, other resources, and climatic factors revealed in this study can help to explain changes in species composition, diversity, community structure and ecosystem functioning under global N enrichment. These findings are critical in improving model simulation and projection of terrestrial carbon sequestration and its feedbacks to global climate change, especially when progressive N limitation is taken into consideration. PMID:19086179

  4. Hotspots of species richness, threat and endemism for terrestrial vertebrates in SW Europe

    Pascual, López-López; Luigi, Maiorano; Alessandra, Falcucci; Emilio, Barba; Luigi, Boitani

    2011-09-01

    The Mediterranean basin, and the Iberian Peninsula in particular, represent an outstanding "hotspot" of biological diversity with a long history of integration between natural ecosystems and human activities. Using deductive distribution models, and considering both Spain and Portugal, we downscaled traditional range maps for terrestrial vertebrates (amphibians, breeding birds, mammals and reptiles) to the finest possible resolution with the data at hand, and we identified hotspots based on three criteria: i) species richness; ii) vulnerability, and iii) endemism. We also provided a first evaluation of the conservation status of biodiversity hotspots based on these three criteria considering both existing and proposed protected areas (i.e., Natura 2000). For the identification of hotspots, we used a method based on the cumulative distribution functions of species richness values. We found no clear surrogacy among the different types of hotspots in the Iberian Peninsula. The most important hotspots (considering all criteria) are located in the western and southwestern portions of the study area, in the Mediterranean biogeographical region. Existing protected areas are not specifically concentrated in areas of high species richness, with only 5.2% of the hotspots of total richness being currently protected. The Natura 2000 network can potentially constitute an important baseline for protecting vertebrate diversity in the Iberian Peninsula although further improvements are needed. We suggest taking a step forward in conservation planning in the Mediterranean basin, explicitly considering the history of the region as well as its present environmental context. This would allow moving from traditional reserve networks (conservation focused on "patterns") to considerations about the "processes" that generated present biodiversity.

  5. Stimulation of terrestrial ecosystem carbon storage by nitrogen addition: a meta-analysis.

    Yue, Kai; Peng, Yan; Peng, Changhui; Yang, Wanqin; Peng, Xin; Wu, Fuzhong

    2016-01-01

    Elevated nitrogen (N) deposition alters the terrestrial carbon (C) cycle, which is likely to feed back to further climate change. However, how the overall terrestrial ecosystem C pools and fluxes respond to N addition remains unclear. By synthesizing data from multiple terrestrial ecosystems, we quantified the response of C pools and fluxes to experimental N addition using a comprehensive meta-analysis method. Our results showed that N addition significantly stimulated soil total C storage by 5.82% ([2.47%, 9.27%], 95% CI, the same below) and increased the C contents of the above- and below-ground parts of plants by 25.65% [11.07%, 42.12%] and 15.93% [6.80%, 25.85%], respectively. Furthermore, N addition significantly increased aboveground net primary production by 52.38% [40.58%, 65.19%] and litterfall by 14.67% [9.24%, 20.38%] at a global scale. However, the C influx from the plant litter to the soil through litter decomposition and the efflux from the soil due to microbial respiration and soil respiration showed insignificant responses to N addition. Overall, our meta-analysis suggested that N addition will increase soil C storage and plant C in both above- and below-ground parts, indicating that terrestrial ecosystems might act to strengthen as a C sink under increasing N deposition. PMID:26813078

  6. Stimulation of terrestrial ecosystem carbon storage by nitrogen addition: a meta-analysis

    Yue, Kai; Peng, Yan; Peng, Changhui; Yang, Wanqin; Peng, Xin; Wu, Fuzhong

    2016-01-01

    Elevated nitrogen (N) deposition alters the terrestrial carbon (C) cycle, which is likely to feed back to further climate change. However, how the overall terrestrial ecosystem C pools and fluxes respond to N addition remains unclear. By synthesizing data from multiple terrestrial ecosystems, we quantified the response of C pools and fluxes to experimental N addition using a comprehensive meta-analysis method. Our results showed that N addition significantly stimulated soil total C storage by 5.82% ([2.47%, 9.27%], 95% CI, the same below) and increased the C contents of the above- and below-ground parts of plants by 25.65% [11.07%, 42.12%] and 15.93% [6.80%, 25.85%], respectively. Furthermore, N addition significantly increased aboveground net primary production by 52.38% [40.58%, 65.19%] and litterfall by 14.67% [9.24%, 20.38%] at a global scale. However, the C influx from the plant litter to the soil through litter decomposition and the efflux from the soil due to microbial respiration and soil respiration showed insignificant responses to N addition. Overall, our meta-analysis suggested that N addition will increase soil C storage and plant C in both above- and below-ground parts, indicating that terrestrial ecosystems might act to strengthen as a C sink under increasing N deposition.

  7. A new threat to bees? Entomopathogenic nematodes used in biological pest control cause rapid mortality in Bombus terrestris.

    Dutka, Alexandrea; McNulty, Alison; Williamson, Sally M

    2015-01-01

    There is currently a great deal of concern about population declines in pollinating insects. Many potential threats have been identified which may adversely affect the behaviour and health of both honey bees and bumble bees: these include pesticide exposure, and parasites and pathogens. Whether biological pest control agents adversely affect bees has been much less well studied: it is generally assumed that biological agents are safer for wildlife than chemical pesticides. The aim of this study was to test whether entomopathogenic nematodes sold as biological pest control products could potentially have adverse effects on the bumble bee Bombus terrestris. One product was a broad spectrum pest control agent containing both Heterorhabditis sp. and Steinernema sp., the other product was specifically for weevil control and contained only Steinernema kraussei. Both nematode products caused ≥80% mortality within the 96 h test period when bees were exposed to soil containing entomopathogenic nematodes at the recommended field concentration of 50 nematodes per cm(2) soil. Of particular concern is the fact that nematodes from the broad spectrum product could proliferate in the carcasses of dead bees, and therefore potentially infect a whole bee colony or spread to the wider environment. PMID:26618084

  8. Geometric calibration of a terrestrial laser scanner with local additional parameters: An automatic strategy

    García-San-Miguel, D.; Lerma, J. L.

    2013-05-01

    Terrestrial laser scanning systems are steadily increasing in many fields of engineering, geoscience and architecture namely for fast data acquisition, 3-D modeling and mapping. Similarly to other precision instruments, these systems provide measurements with implicit systematic errors. Systematic errors are physically corrected by manufacturers before delivery and sporadically afterwards. The approach presented herein tackles the raw observables acquired by a laser scanner with additional parameters, a set of geometric calibration parameters that model the systematic error of the instrument to achieve the most accurate point cloud outputs, improving eventual workflow owing to less filtering, better registration and best 3D modeling. This paper presents a fully automatic strategy to calibrate geometrically terrestrial laser scanning datasets. The strategy is tested with multiple scans taken by a FARO FOCUS 3D, a phase-based terrestrial laser scanner. A calibration with local parameters for datasets is undertaken to improve the raw observables and a weighted mathematical index is proposed to select the most significant set of additional parameters. The improvements achieved are exposed, highlighting the necessity of correcting the terrestrial laser scanner before handling multiple data sets.

  9. Co2-Y ferrite modified by CuO addition applied to a terrestrial broadcasting antenna

    The addition of CuO to hexagonal Y-type ferrites, Ba2Co2Fe12O22 was investigated as a way to modify the magnetic properties of these materials. It was found that a 0.6 wt% CuO addition led to a real part of complex permeability of 2.7 and a loss factor of 0.05 even at a frequency of 1 GHz. The doped ferrite was applied in a terrestrial broadcasting (ISDB) antenna in the 470–750 MHz frequency range. A ferrite antenna with a dimension of 3 mm×3 mm×30 mm dimensions with helical printed conductor patterns was designed and fabricated. It exhibited excellent average gain of −0.5 dBi at a center frequency of ~600 MHz and showed a wide bandwidth of 160 MHz under a gain level of −5 dBi. - Highlights: • The magnetic properties of Co2-Y hexagonal ferrite was modified by the CuO addition. • A low tan δ of 0.05 along with a permeability of 2.7 at 1 GHz was achieved. • The ferrite was applied to a terrestrial broadcasting antenna with a helical winding. • A wide bandwidth of 160 MHz and average gain of −0.5 dBi at 600 MHz were demonstrated

  10. Threatened freshwater and terrestrial molluscs (Mollusca, Gastropoda et Bivalvia of Santa Catarina State, Southern Brazil: check list and evaluation of regional threats

    2011-06-01

    Full Text Available A total of nineteen continental native mollusc species are confirmed for the Santa Catarina State (SC(organized in ten Genera and seven Families, one aquatic Prosobranchia/Caenogastropoda (Ampullariidae,six Pulmonata terrestrial gastropods (one Ellobiidae, three Megalobulimidae and two micro-snails –Charopidae and Streptaxidae and twelve freshwater mussels (eight Mycetopodidae and four Hyriidae. Thesespecies are designated by the International Union for Conservation of the Nature – IUCN as follows: seven as"Vulnerable", six "In Danger" and six “Without Category Established”. The general regional threats that thesespecies are subjected to are briefly analyzed.

  11. Co2-Y ferrite modified by CuO addition applied to a terrestrial broadcasting antenna

    Fujii, Shigeo; Nishijima, Kaihei; Satoh, Hiroshi; Yamamoto, Setsuo

    2015-04-01

    The addition of CuO to hexagonal Y-type ferrites, Ba2Co2Fe12O22 was investigated as a way to modify the magnetic properties of these materials. It was found that a 0.6 wt% CuO addition led to a real part of complex permeability of 2.7 and a loss factor of 0.05 even at a frequency of 1 GHz. The doped ferrite was applied in a terrestrial broadcasting (ISDB) antenna in the 470-750 MHz frequency range. A ferrite antenna with a dimension of 3 mm×3 mm×30 mm dimensions with helical printed conductor patterns was designed and fabricated. It exhibited excellent average gain of -0.5 dBi at a center frequency of ~600 MHz and showed a wide bandwidth of 160 MHz under a gain level of -5 dBi.

  12. Acidification of East Siberian Arctic Shelf waters through addition of freshwater and terrestrial carbon

    Semiletov, Igor; Pipko, Irina; Gustafsson, Örjan; Anderson, Leif G.; Sergienko, Valentin; Pugach, Svetlana; Dudarev, Oleg; Charkin, Alexander; Gukov, Alexander; Bröder, Lisa; Andersson, August; Spivak, Eduard; Shakhova, Natalia

    2016-05-01

    Ocean acidification affects marine ecosystems and carbon cycling, and is considered a direct effect of anthropogenic carbon dioxide uptake from the atmosphere. Accumulation of atmospheric CO2 in ocean surface waters is predicted to make the ocean twice as acidic by the end of this century. The Arctic Ocean is particularly sensitive to ocean acidification because more CO2 can dissolve in cold water. Here we present observations of the chemical and physical characteristics of East Siberian Arctic Shelf waters from 1999, 2000-2005, 2008 and 2011, and find extreme aragonite undersaturation that reflects acidity levels in excess of those projected in this region for 2100. Dissolved inorganic carbon isotopic data and Markov chain Monte Carlo simulations of water sources using salinity and δ18O data suggest that the persistent acidification is driven by the degradation of terrestrial organic matter and discharge of Arctic river water with elevated CO2 concentrations, rather than by uptake of atmospheric CO2. We suggest that East Siberian Arctic Shelf waters may become more acidic if thawing permafrost leads to enhanced terrestrial organic carbon inputs and if freshwater additions continue to increase, which may affect their efficiency as a source of CO2.

  13. Additive threats from pathogens, climate and land-use change for global amphibian diversity

    Hof, Christian; Bastos Araujo, Miguel; Jetz, Walter;

    2011-01-01

    Amphibian population declines far exceed those of other vertebrate groups, with 30% of all species listed as threatened by the International Union for Conservation of Nature. The causes of these declines are a matter of continued research, but probably include climate change, land-use change and...... are disproportionately more affected by one or multiple threat factors than areas with low richness. Amphibian declines are likely to accelerate in the twenty-first century, because multiple drivers of extinction could jeopardize their populations more than previous, mono-causal, assessments have...

  14. A review of conservation threats on Gough Island: a case study for terrestrial conservation in the Southern Oceans

    Jones, A.; Chown, S.L.; Ryan, P.G.; Gremmen, N.J.M.; Gaston, K.J.

    2003-01-01

    Gough Island is a remote Southern Ocean Island that, despite having no permanent human population, is under substantial conservation threat as a result of human activity. A considerable proportion of the flora and fauna has been accidentally introduced, and new data are presented showing that ca. 70

  15. A new threat to bees? Entomopathogenic nematodes used in biological pest control cause rapid mortality in Bombus terrestris

    Dutka, Alexandrea; McNulty, Alison; Williamson, Sally M.

    2015-01-01

    There is currently a great deal of concern about population declines in pollinating insects. Many potential threats have been identified which may adversely affect the behaviour and health of both honey bees and bumble bees: these include pesticide exposure, and parasites and pathogens. Whether biological pest control agents adversely affect bees has been much less well studied: it is generally assumed that biological agents are safer for wildlife than chemical pesticides. The aim of this stu...

  16. Co{sub 2}-Y ferrite modified by CuO addition applied to a terrestrial broadcasting antenna

    Fujii, Shigeo, E-mail: s502wd@yamaguchi-u.ac.jp; Nishijima, Kaihei; Satoh, Hiroshi; Yamamoto, Setsuo

    2015-04-01

    The addition of CuO to hexagonal Y-type ferrites, Ba{sub 2}Co{sub 2}Fe{sub 12}O{sub 22} was investigated as a way to modify the magnetic properties of these materials. It was found that a 0.6 wt% CuO addition led to a real part of complex permeability of 2.7 and a loss factor of 0.05 even at a frequency of 1 GHz. The doped ferrite was applied in a terrestrial broadcasting (ISDB) antenna in the 470–750 MHz frequency range. A ferrite antenna with a dimension of 3 mm×3 mm×30 mm dimensions with helical printed conductor patterns was designed and fabricated. It exhibited excellent average gain of −0.5 dBi at a center frequency of ~600 MHz and showed a wide bandwidth of 160 MHz under a gain level of −5 dBi. - Highlights: • The magnetic properties of Co{sub 2}-Y hexagonal ferrite was modified by the CuO addition. • A low tan δ of 0.05 along with a permeability of 2.7 at 1 GHz was achieved. • The ferrite was applied to a terrestrial broadcasting antenna with a helical winding. • A wide bandwidth of 160 MHz and average gain of −0.5 dBi at 600 MHz were demonstrated.

  17. Terrestrial exposure of oilfield flowline additives diminish soil structural stability and remediative microbial function

    Onshore oil production pipelines are major installations in the petroleum industry, stretching many thousands of kilometres worldwide which also contain flowline additives. The current study focuses on the effect of the flowline additives on soil physico-chemical and biological properties and quantified the impact using resilience and resistance indices. Our findings are the first to highlight deleterious effect of flowline additives by altering some fundamental soil properties, including a complete loss of structural integrity of the impacted soil and a reduced capacity to degrade hydrocarbons mainly due to: (i) phosphonate salts (in scale inhibitor) prevented accumulation of scale in pipelines but also disrupted soil physical structure; (ii) glutaraldehyde (in biocides) which repressed microbial activity in the pipeline and reduced hydrocarbon degradation in soil upon environmental exposure; (iii) the combinatory effects of these two chemicals synergistically caused severe soil structural collapse and disruption of microbial degradation of petroleum hydrocarbons. - Highlights: → Effects of flowline additives on soil structure and microbial function highlighted. → Phosphonate salts (in scale inhibitor) were found to disrupt soil physical structure. → Glutaraldehyde (in biocides) caused significant reduction of hydrocarbon degradation in soil. → Flowline additive chemicals synergistically affects soil structure and remediative microbial function. - Scale inhibitor and biocide oilfield flowline additives interactively affect soil physical and microbial properties

  18. Terrestrial exposure of oilfield flowline additives diminish soil structural stability and remediative microbial function

    George, S.J.; Sherbone, J.; Hinz, C. [Centre for Land Rehabilitation, School of Earth and Environment, University of Western Australia, 35 Stirling Highway, Crawley, WA 6009 (Australia); Tibbett, M., E-mail: m.tibbett@cranfield.ac.uk [Centre for Land Rehabilitation, School of Earth and Environment, University of Western Australia, 35 Stirling Highway, Crawley, WA 6009 (Australia)

    2011-10-15

    Onshore oil production pipelines are major installations in the petroleum industry, stretching many thousands of kilometres worldwide which also contain flowline additives. The current study focuses on the effect of the flowline additives on soil physico-chemical and biological properties and quantified the impact using resilience and resistance indices. Our findings are the first to highlight deleterious effect of flowline additives by altering some fundamental soil properties, including a complete loss of structural integrity of the impacted soil and a reduced capacity to degrade hydrocarbons mainly due to: (i) phosphonate salts (in scale inhibitor) prevented accumulation of scale in pipelines but also disrupted soil physical structure; (ii) glutaraldehyde (in biocides) which repressed microbial activity in the pipeline and reduced hydrocarbon degradation in soil upon environmental exposure; (iii) the combinatory effects of these two chemicals synergistically caused severe soil structural collapse and disruption of microbial degradation of petroleum hydrocarbons. - Highlights: > Effects of flowline additives on soil structure and microbial function highlighted. > Phosphonate salts (in scale inhibitor) were found to disrupt soil physical structure. > Glutaraldehyde (in biocides) caused significant reduction of hydrocarbon degradation in soil. > Flowline additive chemicals synergistically affects soil structure and remediative microbial function. - Scale inhibitor and biocide oilfield flowline additives interactively affect soil physical and microbial properties

  19. China Threat, What Threat?

    2008-01-01

    Since the end of the Cold War, China has become the candidate of choice among "illusionist" hawks looking to justify Pentagon spending. Henry Rosemont, a professor emeritus at St Mary’s CoUege of Maryland and a visiting scholar in the Religious Studies Department at Brown University, recently wrote an article for Asia Times Online, saying that facts belie the claims of China’s military threat

  20. Nanling protected areas face a major threat to terrestrial vertebrates and the basic strategies%南岭保护区陆栖脊椎动物面临的主要威胁及基本对策

    林芳; 李石洲; 李超荣

    2011-01-01

    Nanling National Nature Reserve to protect terrestrial wildlife spine was investigated, results show that the hunting, eeo-tourism, natural disasters, habitat destruction and other factors on the survival of wild animals are threatened, the main reason for the threat analyzed, and proposed protection measures and measures.%对南岭国家级自然保护区陆栖脊椎野生动物保护进行了调查研究,结果表明狩猎、生态旅游、自然灾害、生境破坏等因素对野生动物的生存均有威胁,针对造成威胁的主要原因进行了分析,并提出了保护对策和措施.

  1. Biological Threats

    ... Workplace Plans School Emergency Plans Main Content Biological Threats Biological agents are organisms or toxins that can ... for Disease Control and Prevention . Before a Biological Threat Unlike an explosion, a biological attack may or ...

  2. Stereotype Threat.

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate. PMID:26361054

  3. Ozone threat

    Ozone hole was first discovered in 1980. Thus 15 years even after the first warming, the world is no where near to the elimination of man made gases that threaten to destroy the ozone layer. Ozone depletion has become a matter of enormous threat which remains to be solved by the Scientists and intelligentia of the world. Ozone (O3) is a pungent poisonous gas. It forms a layer at a distance of about 15 miles above the earth's surface which helps shield living things from the sun shearing ultra violet light. If ozone is lost, more ultra violet light reaches the earth, which can lead to increasing rate of skin cancer, the death of micro organisms and the failure of crops and plants. It was in 1974 when it was discovered that Chlorofluorocarbons (CFCs) cold rise slowly to the upper atmosphere and destroy the earth's fragile ozone shield. Chlorofluorocarbons are commonly used as coolants (such as Freon) for home and automobile air conditioners and in the making of fast food containers. CFCs take about 100 years or more to reach he stratosphere to damage the ozone layers. In 1988, Scientists confirmed that upto 3% of the ozone layer over the more populated Northern Hemisphere has been destroyed. it is believed that for every 1% decrease in ozone, skin cancers are expected to rise 5 to 6 per cent due to the increase of ultraviolet light. Cases of cataracts and certain human immune system diseases are also expected to rise. (author)

  4. Psychoanalysis and the nuclear threat

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  5. Airborne Particulate Threat Assessment

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  6. Is the Hybrid Threat a True Threat?

    David L. Raugh

    2016-06-01

    Full Text Available Does the “hybrid threat” discussed in General Marty Dempsey’s 2015 United States National Military Strategy make logical sense? In this paper I define the national security threat risk assessment process, examine the most significant US security threats, and study the hybrid threat. I conclude that the hybrid threat is the one that could most exploit our nation’s critical vulnerabilities- both from a security and foreign policy perspective. I conclude with a study of security and economic methods to reduce this threat.

  7. Cyber threat metrics.

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  8. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    Yong eZhu

    2015-11-01

    Full Text Available Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes-Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants’ memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed.

  9. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat.

    Zhu, Yong; Zhao, Yufang; Ybarra, Oscar; Stephan, Walter G; Yang, Qing

    2015-01-01

    Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes-Dodson law, Easterbrook's theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants' memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed. PMID:26635669

  10. Terrestrial forest management plan for Palmyra Atoll

    Hathaway, Stacie A.; McEachern, Kathryn; Fisher, Robert N.

    2011-01-01

    , and though rarely documented, beach nesting could be affected by terrestrial management actions. There are various nonnative or invasive species throughout the terrestrial ecosystem. The most notable examples of terrestrial invasive species include coconut palms (Cocos nucifera) and black rats (Rattus rattus). Although it is unclear whether they are nonnative, coconut palms are currently the most dominant plant across Palmyra Atoll. They compete with native plant species for space and resources and are potentially detrimental to sea birds dependent on native vegetation for roosting and nesting habitat. This competition in turn impacts nutrient resource availability, thereby reshaping energy flow in the ecosystem. Black rats are known to prey on ground-nesting sea birds and are likely responsible for the lack of burrowing sea bird reproduction at Palmyra Atoll. In addition, they may be facilitating the invasion of other nonnative species and negatively impacting other native fauna. Although the extent and impacts of these and other nonnative and (or) invasive species are not fully understood, the extent and impacts are clearly a threat to the native species and one of the most urgent threats to the overall ecosystem integrity of Palmyra Atoll. This 'Terrestrial Forest Management Plan for Palmyra Atoll' addresses issues related to invasive species and other problems. Priority goals are established as are associated objectives and strategies. The overarching goal is to perpetuate and where possible restore terrestrial ecosystem integrity through the following techniques: 1. Habitat management: Maintain and enhance habitat to the extent possible to sustain thriving Pisonia grandis forest, coastal strand forest, endemic grassland, self-sustaining populations of sea birds, shore birds, coconut crabs, native lizards, and native insects. 2. Monitoring and assessment: Acquire information on distribution and abundance as needed for conservation of each resour

  11. Threats to Bitcoin Software

    Kateraas, Christian H

    2014-01-01

    Collect and analyse threat models to the Bitcoin ecosystem and its software. The create misuse case, attack trees, and sequence diagrams of the threats. Create a malicious client from the gathered threat models. Once the development of the client is complete, test the client and evaluate its performance. From this, assess the security of the Bitcoin software.

  12. Intergroup threat and outgroup attitudes: a meta-analytic review.

    Riek, Blake M; Mania, Eric W; Gaertner, Samuel L

    2006-01-01

    This article examines the relationship between intergroup threat and negative outgroup attitudes. We first qualitatively review the intergroup threat literature, describing the shift from competing theories toward more integrated approaches, such as the integrated threat theory (ITT; W. G. Stephan and Stephan, 2000). The types of threats discussed include: realistic threat, symbolic threat, intergroup anxiety, negative stereotypes, group esteem threat, and distinctiveness threat. We then conducted a quantitative meta-analysis examining the relationships between various intergroup threats and outgroup attitudes. The meta-analysis, involving 95 samples, revealed that 5 different threat types had a positive relationship with negative outgroup attitudes. Additionally, outgroup status moderated some of these relationships. Implications and future directions are considered. PMID:17201592

  13. Contaminant exposure in terrestrial vertebrates

    Here we review mechanisms and factors influencing contaminant exposure among terrestrial vertebrate wildlife. There exists a complex mixture of biotic and abiotic factors that dictate potential for contaminant exposure among terrestrial and semi-terrestrial vertebrates. Chemical fate and transport in the environment determine contaminant bioaccessibility. Species-specific natural history characteristics and behavioral traits then play significant roles in the likelihood that exposure pathways, from source to receptor, are complete. Detailed knowledge of natural history traits of receptors considered in conjunction with the knowledge of contaminant behavior and distribution on a site are critical when assessing and quantifying exposure. We review limitations in our understanding of elements of exposure and the unique aspects of exposure associated with terrestrial and semi-terrestrial taxa. We provide insight on taxa-specific traits that contribute, or limit exposure to, transport phenomenon that influence exposure throughout terrestrial systems, novel contaminants, bioavailability, exposure data analysis, and uncertainty associated with exposure in wildlife risk assessments. Lastly, we identify areas related to exposure among terrestrial and semi-terrestrial organisms that warrant additional research. - Both biotic and abiotic factors determine chemical exposure for terrestrial vertebrates

  14. Insiders and Insider Threats

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  15. Threat, prejudice and stereotyping in the context of Japanese, North Korean, and South Korean intergroup relations.

    Myers, Chris; Abrams, Dominic; Rosenthal, Harriet E.S.; Christian, Julie

    2013-01-01

    Integrated threat theory, realistic conflict theory, and group justification (based on social identity theory) were evaluated in the international context of Japanese prejudice toward North Korea and South Korea. Military threat emerged as an important addition to the four threats outlined by integrated threat theory. Three perceived North Korean threats (realistic [domestic] threat; intergroup anxiety; military threat) predicted prejudice toward North Korea. North Korean preju...

  16. Identifying and Mitigating Insider Threats

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  17. Terrestrial planet formation.

    Righter, K; O'Brien, D P

    2011-11-29

    Advances in our understanding of terrestrial planet formation have come from a multidisciplinary approach. Studies of the ages and compositions of primitive meteorites with compositions similar to the Sun have helped to constrain the nature of the building blocks of planets. This information helps to guide numerical models for the three stages of planet formation from dust to planetesimals (~10(6) y), followed by planetesimals to embryos (lunar to Mars-sized objects; few 10(6) y), and finally embryos to planets (10(7)-10(8) y). Defining the role of turbulence in the early nebula is a key to understanding the growth of solids larger than meter size. The initiation of runaway growth of embryos from planetesimals ultimately leads to the growth of large terrestrial planets via large impacts. Dynamical models can produce inner Solar System configurations that closely resemble our Solar System, especially when the orbital effects of large planets (Jupiter and Saturn) and damping mechanisms, such as gas drag, are included. Experimental studies of terrestrial planet interiors provide additional constraints on the conditions of differentiation and, therefore, origin. A more complete understanding of terrestrial planet formation might be possible via a combination of chemical and physical modeling, as well as obtaining samples and new geophysical data from other planets (Venus, Mars, or Mercury) and asteroids. PMID:21709256

  18. The terrestrial silica pump.

    Carey, Joanna C; Fulweiler, Robinson W

    2012-01-01

    Silicon (Si) cycling controls atmospheric CO(2) concentrations and thus, the global climate, through three well-recognized means: chemical weathering of mineral silicates, occlusion of carbon (C) to soil phytoliths, and the oceanic biological Si pump. In the latter, oceanic diatoms directly sequester 25.8 Gton C yr(-1), accounting for 43% of the total oceanic net primary production (NPP). However, another important link between C and Si cycling remains largely ignored, specifically the role of Si in terrestrial NPP. Here we show that 55% of terrestrial NPP (33 Gton C yr(-1)) is due to active Si-accumulating vegetation, on par with the amount of C sequestered annually via marine diatoms. Our results suggest that similar to oceanic diatoms, the biological Si cycle of land plants also controls atmospheric CO(2) levels. In addition, we provide the first estimates of Si fixed in terrestrial vegetation by major global biome type, highlighting the ecosystems of most dynamic Si fixation. Projected global land use change will convert forests to agricultural lands, increasing the fixation of Si by land plants, and the magnitude of the terrestrial Si pump. PMID:23300825

  19. The terrestrial silica pump.

    Joanna C Carey

    Full Text Available Silicon (Si cycling controls atmospheric CO(2 concentrations and thus, the global climate, through three well-recognized means: chemical weathering of mineral silicates, occlusion of carbon (C to soil phytoliths, and the oceanic biological Si pump. In the latter, oceanic diatoms directly sequester 25.8 Gton C yr(-1, accounting for 43% of the total oceanic net primary production (NPP. However, another important link between C and Si cycling remains largely ignored, specifically the role of Si in terrestrial NPP. Here we show that 55% of terrestrial NPP (33 Gton C yr(-1 is due to active Si-accumulating vegetation, on par with the amount of C sequestered annually via marine diatoms. Our results suggest that similar to oceanic diatoms, the biological Si cycle of land plants also controls atmospheric CO(2 levels. In addition, we provide the first estimates of Si fixed in terrestrial vegetation by major global biome type, highlighting the ecosystems of most dynamic Si fixation. Projected global land use change will convert forests to agricultural lands, increasing the fixation of Si by land plants, and the magnitude of the terrestrial Si pump.

  20. How you perceive threat determines your behavior

    Eliane Volchan

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  1. Alternative Threat Methodology

    Charles B. King III

    2011-01-01

    Full Text Available Of the many challenges facing risk analysis practitioners, perhaps the most difficult to overcome is in the field of terrorist threat analysis. When estimating the threat associated with naturally occurring events, historical data provides a great deal of insight into the frequency of those events. Threat associated with accidents applies many operations research tools to gauge future failure-rates (Failure Mode and Effects Analysis being perhaps the most widely known. However, estimating the probability of an individual's or group's attacking a specific (or even a generic target is an element of risk analysis in which art and intuition are applied far more regularly than is science.

  2. Facing ambiguous threats.

    Roberto, Michael A; Bohmer, Richard M J; Edmondson, Amy C

    2006-11-01

    On February 1, 2003, the world watched in horror as the Columbia space shuttle broke apart while reentering the earth's atmosphere, killing all seven astronauts. Some have argued that NASA's failure to respond with appropriate intensity to the so-called foam strike that led to the accident was evidence of irresponsible or incompetent management. The authors' research, however, suggests that NASA was exhibiting a natural, albeit unfortunate, pattern of behavior common in many organizations. The foam strike is a prime example of what the authors call an ambiguous threat-a signal that may or may not portend future harm. Ambiguous threats differ from threats with obvious causes-say, a fire in the building-for which the response is clear. They also differ from unmistakable threats that may lack straightforward response paths (such as the frightening oxygen-tank explosion aboard Apollo 13). However, when the warning sign is ambiguous and the threat's potential effect is unclear, managers may choose to ignore or discount the risk. Such an approach can be catastrophic. Firms that do a good job of dealing with ambiguous threats do not improvise during a crisis; rather, they apply a rigorous set of detection and response capabilities that they have developed and practiced beforehand. In this article, the authors outline how to put such capabilities in place long before a crisis strikes. First, companies need to hone their teamwork and rapid problem-solving skills through practice. Second, they must learn to recognize weak signals, amplify the threat, and encourage employees to ask disconcerting "what if" questions in a safe environment. Finally, they should explore possible responses to threats through quick, low-cost experimentation. PMID:17131567

  3. The Changing Threat

    Gabriel Siboni

    2010-06-01

    Full Text Available The purpose of this conference is to try to understand the changes in the threat against the State of Israel that have taken place in recent years, and to examine the components of the optimal response to the threat. Today’s seminar is organized within the framework of the INSS Military and Strategic Affairs Program, which aims to enhance the public discourse on subjects relevant to this discipline through conferences and the Military and Strategic Affairs journal.

  4. Terrestrial ecology

    The main effort of the Terrestrial Ecology Division has been redirected to a comprehensive study of the Espiritu Santo Drainage Basin located in northeastern Puerto Rico. The general objective are to provide baseline ecological data for future environmental assessment studies at the local and regional levels, and to provide through an ecosystem approach data for the development of management alternatives for the wise utilization of energy, water, and land resources. The interrelationships among climate, vegetation, soils, and man, and their combined influence upon the hydrologic cycle will be described and evaluated. Environmental management involves planning and decision making, and both require an adequate data base. At present, little is known about the interworkings of a complete, integrated system such as a drainage basin. A literature survey of the main research areas confirmed that, although many individual ecologically oriented studies have been carried out in a tropical environment, few if any provide the data base required for environmental management. In view of rapidly changing socio-economic conditions and natural resources limitations, management urgently requires data from these systems: physical (climatological), biological, and cultural. This integrated drainage basin study has been designed to provide such data. The scope of this program covers the hydrologic cycle as it is affected by the interactions of the physical, biological, and cultural systems

  5. Commercialization of terrestrial applications of aerospace power technology

    The potential for commercialization of terrestrial energy systems based upon aerospace power technology's explored. Threats to the aerospace power technology industry, caused by the end of the cold war and weak world economy are described. There are also new opportunities caused by increasing terrestrial energy needs and world-wide concern for the environment. In this paper, the strengths and weaknesses of the aerospace power industry in commercializing terrestrial energy technologies are reviewed. Finally, actions which will enable the aerospace power technology industry to commercialize products into terrestrial energy markets are described

  6. Future hotspots of terrestrial mammal loss.

    Visconti, Piero; Pressey, Robert L; Giorgini, Daniele; Maiorano, Luigi; Bakkenes, Michel; Boitani, Luigi; Alkemade, Rob; Falcucci, Alessandra; Chiozza, Federica; Rondinini, Carlo

    2011-09-27

    Current levels of endangerment and historical trends of species and habitats are the main criteria used to direct conservation efforts globally. Estimates of future declines, which might indicate different priorities than past declines, have been limited by the lack of appropriate data and models. Given that much of conservation is about anticipating and responding to future threats, our inability to look forward at a global scale has been a major constraint on effective action. Here, we assess the geography and extent of projected future changes in suitable habitat for terrestrial mammals within their present ranges. We used a global earth-system model, IMAGE, coupled with fine-scale habitat suitability models and parametrized according to four global scenarios of human development. We identified the most affected countries by 2050 for each scenario, assuming that no additional conservation actions other than those described in the scenarios take place. We found that, with some exceptions, most of the countries with the largest predicted losses of suitable habitat for mammals are in Africa and the Americas. African and North American countries were also predicted to host the most species with large proportional global declines. Most of the countries we identified as future hotspots of terrestrial mammal loss have little or no overlap with the present global conservation priorities, thus confirming the need for forward-looking analyses in conservation priority setting. The expected growth in human populations and consumption in hotspots of future mammal loss mean that local conservation actions such as protected areas might not be sufficient to mitigate losses. Other policies, directed towards the root causes of biodiversity loss, are required, both in Africa and other parts of the world. PMID:21844048

  7. Ethical Proactive Threat Research

    Aycock, John; Sullins, John

    Through a provocative examination of the positive effects of computer security research on regular users, we argue that traditional security research is insufficient. Instead, we turn to a largely untapped alternative, proactive threat research, a fruitful research area but an ethical minefield. We discuss practices for ethical research and dissemination of proactive research.

  8. Patient Safety Threat - Syringe Reuse

    ... HAIs HICPAC One & Only Campaign A Patient Safety Threat – Syringe Reuse Recommend on Facebook Tweet Share Compartir ... need to be aware of a very serious threat to their health - the reuse of needles or ...

  9. Threat modeling designing for security

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  10. Prejudice towards Muslims in The Netherlands: testing integrated threat theory.

    Velasco González, Karina; Verkuyten, Maykel; Weesie, Jeroen; Poppe, Edwin

    2008-12-01

    This study uses integrated threat theory to examine Dutch adolescents' (N=1,187) prejudice towards Muslim minorities. One out of two participants was found to have negative feelings towards Muslims. Perceived symbolic and realistic threat and negative stereotypes were examined as mediators between antecedent factors (in-group identification, intergroup contact, and the endorsement of multiculturalism) and prejudice. Based on structural equation modelling, it was found that stereotypes and symbolic threats, but not realistic threats, predicted prejudice towards Muslims. Further, it was found that the effect of in-group identification on prejudice was fully mediated by symbolic threat, the effect of contact was partially mediated by stereotypes, and the effect of the endorsement of multiculturalism was mediated by both symbolic threat and stereotypes. In addition, contact and multiculturalism were directly associated with prejudice towards Muslims. The theoretical and practical implications of these findings are discussed. PMID:18284782

  11. Categorizing threat : building and using a generic threat matrix.

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  12. Revising Australia's Design Basis Threat

    Australia’s Design Basis Threat (DBT) was revised in 2012, ten years after the previous review. Using the IAEA’s Nuclear Security Series Guidance document on DBTs the Australian Safeguards and Non-Proliferation Office used an interagency process to devise a series of threat profiles which were distilled into the final DBT. Challenges to the review process included setting the scope, treating insider, cyber and air-borne threats, and interpretation of the final product. (author)

  13. Recurrent dreams: Recurring threat simulations?

    Valli, K; Revonsuo, A

    2006-06-01

    Zadra, Desjardins, and Marcotte (2006) have made a valuable contribution to the empirical testing of the Threat Simulation Theory (TST) (Revonsuo, 2000a) in recurrent dreams. For the most part, their results are in accordance with the theory, while some findings seem to conflict with the predictions of TST. In our commentary, we consider some alternative ways to interpret the results, and we conclude that many prominent features of most recurrent dreams seem to be manifestations of a threat simulation function, leading to repeated rehearsal of threat perception and avoidance, but a minority of recurrent dreams seem to have origins unrelated to threat simulation. PMID:16019227

  14. Linking Stereotype Threat and Anxiety

    Osborne, Jason W.

    2007-01-01

    Claude Steele's stereotype threat hypothesis has attracted significant attention in recent years. This study tested one of the main tenets of his theory--that stereotype threat serves to increase individual anxiety levels, thus hurting performance--using real-time measures of physiological arousal. Subjects were randomly assigned to either high or…

  15. Bomb Threat Assessments. Fact Sheet

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  16. Bio-threat microparticle simulants

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  17. Threat Modelling for Active Directory

    Chadwick, David W

    2004-01-01

    This paper analyses the security threats that can arise against an Active Directory server when it is included in a Web application. The approach is based on the STRIDE classification methodology. The paper also provides outline descriptions of countermeasures that can be deployed to protect against the different threats and vulnerabilities identified here.

  18. The nuclear threat

    For a long time, a small group of big powers has been the only holder of nuclear weapons (US, USSR, Great Britain, France and China). Since then, new weapons have come out on the geopolitical scene: Israel, India, Pakistan, and some others remain uncertain and generate a worrying atmosphere (North Korea, Iran..). But what is the real risk with nuclear proliferation? Should we dread about it? Is nuclear terrorism a real threat? What are the political stakes of nuclear weapons? Is disarmament a real solution? These are some of the questions that the author answers in a precise and clear manner in this book. Contents: 1 - from monopoly to proliferation: who owns nuclear weapons today, why is it so coveted, is it easy to make one?; 2 - the newcomers: what do we really know about the Iranian nuclear programme, Iran and North Korea: between negotiation and confrontation; 3 - international control and regulation: do we have reliable information, how do we know what we know, Iraq: was there a 'lie' somewhere, who are the states who have renounced nuclear weapons?; 4 - the future: is there still a nuclear warfare risk, what if Pakistani weapons fall into islamic hands, is nuclear terrorism a fantasy or a real risk?

  19. 'NRBC' threat: is this concept still valid?

    About 10 years ago, after the Sarin attack in Tokyo, the world discover that terrorists could use again radio-nuclear, chemical or biological agents to launch attacks, just to cause terror and disruption of western economies. This has forged the acronym 'NRBC'. In terms of likelihood, nuclear and radiological attacks could be considered among the most easy to prepare, and some possible acts are listed in this paper. A considerable amount of work has been prepared for the preparedness against radio-nuclear attacks, during the last 3 years, by World Health Organization (WHO), International Atomic Energy Agency (IAEA), the Atomic Energy Agency (AEN) as well as by the International Commission of Radio Protection (ICRP). A series of documents have been issued from international cooperation. These documents shows specificities to the R/N threat in terms of health consequences, that make this threat less prone to international cooperative efforts than biological threats. In addition, the Ministers of Health of the G7 countries have created an 'Global Health Security Initiative' (GHSI) in 2002 to anticipate crisis such as the anthrax problem, or other possible NRBC threats

  20. Mobbing, threats to employees

    Tatjana Vene

    2012-02-01

    Full Text Available RQ: Is there a connection among perception of hostile and unethical communication, timely removal of causes and employee satisfaction?Purpose: Perceived mobbing in the organization, analysing causes and timely removal of them without any effect; achieve an environment of satisfied employees. The purpose is to study the relationship amongthe categories: perceiving mobbing, removing the effects, employee satisfaction.Methods: Qualitative research approach, method of interview by using the seven steps principles.Results: The findings clearly state that being aware of the negative factors and psychological abuse in organizations was present. The interview participants perceived different negative behaviours especially by the female population and from the side of superiors. In some organizations perceived negative factors are insults,insinuations, low wages, inadequate working day, competition, lobbying, and verbal threats. All negative factors lead to serious implications for employees, in which the organization can lose its reputation, productivity is reduced, costs of employment can increase with more sick leaves and in extreme cases, the results can be soserious that the organization can end in bankruptcy or liquidation.Organization: The result of the study warns management to acceptcertain actions and remediate the situation in organizations. The employer and managers must do everything to protect their subordinates from violence and potential offenders.Society: The research study warns on the seriousness of mobbing among employees, the aim is to bring the issue to individuals and society. The victim usually needs help (health costs, losses in the pension system, increased unemployment, and lower productivity of the whole society.Originality: In view of the sensitivity of the issues, the author concludes that the existing research studies are based especially on closed questions (questionnaires; however, interviews create mutual trust between

  1. Stereotype Threat as Validity Threat: The Anxiety-Sex-Threat Interaction

    Delgado, Ana R.; Prieto, Gerardo

    2008-01-01

    Stereotype threat has been invoked to explain underperformance on a variety of groups for whom the stereotypes allege inferior cognitive abilities. In math testing, stereotype threat has been used to explain sex differences in test performance. This paper describes an experimental study on a large sample (n = 313), in which the role of anxiety and…

  2. Global Threats to Child Safety.

    Mace, Sharon E

    2016-02-01

    Children have rights, as enumerated in the Declaration of the Rights of the Child, and need protection from violence, exploitation, and abuse. Global threats to child safety exist. These threats include lack of basic needs (food, clean water, sanitation), maltreatment, abandonment, child labor, child marriage, female genital mutilation, child trafficking, disasters, and armed conflicts/wars. Recent disasters and armed conflicts have led to a record number of displaced people especially children and their families. Strategies and specific programs can be developed and implemented for eliminating threats to the safety of children. PMID:26613687

  3. Heat Waves Are Health Threats

    ... https://medlineplus.gov/news/fullstory_159694.html Heat Waves Are Health Threats Drink plenty of water and ... 2016 SATURDAY, July 2, 2016 (HealthDay News) -- Heat waves are more than uncomfortable, they can be deadly. ...

  4. Today's threat and tomorrow's reaction

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  5. Identity, Power, and Threat Perception

    David L. Rousseau; Rocio Garcia-Retamero

    2007-01-01

    Realists in international relations and realistic conflict theorists in social psychology argue that the perception of threat in intergroup conflict is a function of power asymmetries between groups. In contrast, social constructivists and social identity theorists argue that a shared sense of identity can reduce perceptions of intergroup threat. In this article, we test these competing arguments using three laboratory experiments conducted in two different countries (Spain and the United Sta...

  6. Affirmative Action and Stereotype Threat

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  7. End the nuclear threat

    's promises and commitments. Fulfilling our promises in the Nuclear Non-Proliferation Treaty, now with 189 member States, must be a primary aim. This Treaty, essential to our security, will be reviewed formally in 2005 at the UN. The International Atomic Energy Agency (IAEA) performs a vital role under the Treaty - it's the world's nuclear inspectorate to check that countries are not pursuing nuclear weapons. I've had the chance to visit the UN and IAEA at their headquarters in Vienna, Austria, and know how tough the job can be. We need to back the IAEA and make sure it stays strong in our fight against nuclear weapons. At the 2000 Review of the Treaty, the US along with all other parties to the Treaty made a pledge. Let me remind you of what was promised, and I quote: 'an unequivocal undertaking by the nuclear weapons States to accomplish the total elimination of their nuclear arsenals. leading to nuclear disarmament.' There are tens of thousands of nuclear weapons in the world, over 90% are possessed by Russia and the US. Most are many times more devastating than those used on Hiroshima. The arsenals of Russia and the US are armed, targeted and poised, waiting for three short computer signals to fire. These hair trigger devices represent the devastation of approximately 100,000 Hiroshimas and pose a horrific threat to life. The use of a nuclear weapon could take place by accident or design by States, or even terrorists. These weapons pose an unacceptable risk to the planet. We must demonstrate our unambiguous commitment to fulfill our promises. Other-wise, the prospect of more nuclear weapons States, and the construction of new nuclear weapons, will only increase human peril. The world needs a more effective non-proliferation and disarmament regime and is looking to us for leadership

  8. Introduced Terrestrial Species (Future)

    U.S. Environmental Protection Agency — These data represent predicted future potential distributions of terrestrial plants, animals, and pathogens non-native to the Middle-Atlantic region. These data are...

  9. Entry Threat and Entry Deterrence: The Timing of Broadband Rollout

    Mo Xiao; Orazem, Peter F.

    2007-01-01

    Past empirical literature provides strong evidence that competition increases when new firms enter a market. However, rarely have economists been able to examine how competition changes with the threat of entry. This paper uses the evolution of the zip code level market structure of facilities-based broadband providers from 1999 to 2004 to investigate how a firm adjusts its entry strategy when facing the threat of additional entrants. We identify the potential entrant into a local market as t...

  10. Cyber threat model for tactical radio networks

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  11. Matrix Characterization in Threat Material Detection Processes

    Obhodas, J.; Sudac, D.; Valkovic, V.

    2009-03-01

    Matrix characterization in the threat material detection is of utmost importance, it generates the background against which the threat material signal has to be identified. Threat materials (explosive, chemical warfare, …) are usually contained within small volume inside large volumes of variable matrices. We have studied the influence of matrix materials on the capability of neutron systems to identify hidden threat material. Three specific scenarios are considered in some details: case 1—contraband material in the sea containers, case 2—-explosives in soil (landmines), case 3—explosives and chemical warfare on the sea bottom. Effects of container cargo material on tagged neutron system are seen in the increase of gamma background and the decrease of neutron beam intensity. Detection of landmines is more complex because of variable soil properties. We have studied in detail space and time variations of soil elemental compositions and in particular hydrogen content (humidity). Of special interest are ammunitions and chemical warfare on the sea bottom, damping sites and leftovers from previous conflicts (WW-I, WW-II and local). In this case sea sediment is background source and its role is similar to the role of the soil in the landmine detection. In addition to geochemical cycling of chemical elements in semi-enclosed sea, like the Adriatic Sea, one has to consider also anthropogenic influence, especially when studying small scale variations in concentration levels. Some preliminary experimental results obtained with tagged neutron sensor inside an underwater vehicle are presented as well as data on sediment characterization by X-Ray Fluorescence.

  12. Matrix Characterization in Threat Material Detection Processes

    Matrix characterization in the threat material detection is of utmost importance, it generates the background against which the threat material signal has to be identified. Threat materials (explosive, chemical warfare, ...) are usually contained within small volume inside large volumes of variable matrices. We have studied the influence of matrix materials on the capability of neutron systems to identify hidden threat material. Three specific scenarios are considered in some details: case 1--contraband material in the sea containers, case 2 - explosives in soil (landmines), case 3 - explosives and chemical warfare on the sea bottom. Effects of container cargo material on tagged neutron system are seen in the increase of gamma background and the decrease of neutron beam intensity. Detection of landmines is more complex because of variable soil properties. We have studied in detail space and time variations of soil elemental compositions and in particular hydrogen content (humidity). Of special interest are ammunitions and chemical warfare on the sea bottom, damping sites and leftovers from previous conflicts (WW-I, WW-II and local). In this case sea sediment is background source and its role is similar to the role of the soil in the landmine detection. In addition to geochemical cycling of chemical elements in semi-enclosed sea, like the Adriatic Sea, one has to consider also anthropogenic influence, especially when studying small scale variations in concentration levels. Some preliminary experimental results obtained with tagged neutron sensor inside an underwater vehicle are presented as well as data on sediment characterization by X-Ray Fluorescence.

  13. Parallel Computing for Terrestrial Ecosystem Carbon Modeling

    Terrestrial ecosystems are a primary component of research on global environmental change. Observational and modeling research on terrestrial ecosystems at the global scale, however, has lagged behind their counterparts for oceanic and atmospheric systems, largely because the unique challenges associated with the tremendous diversity and complexity of terrestrial ecosystems. There are 8 major types of terrestrial ecosystem: tropical rain forest, savannas, deserts, temperate grassland, deciduous forest, coniferous forest, tundra, and chaparral. The carbon cycle is an important mechanism in the coupling of terrestrial ecosystems with climate through biological fluxes of CO2. The influence of terrestrial ecosystems on atmospheric CO2 can be modeled via several means at different timescales. Important processes include plant dynamics, change in land use, as well as ecosystem biogeography. Over the past several decades, many terrestrial ecosystem models (see the 'Model developments' section) have been developed to understand the interactions between terrestrial carbon storage and CO2 concentration in the atmosphere, as well as the consequences of these interactions. Early TECMs generally adapted simple box-flow exchange models, in which photosynthetic CO2 uptake and respiratory CO2 release are simulated in an empirical manner with a small number of vegetation and soil carbon pools. Demands on kinds and amount of information required from global TECMs have grown. Recently, along with the rapid development of parallel computing, spatially explicit TECMs with detailed process based representations of carbon dynamics become attractive, because those models can readily incorporate a variety of additional ecosystem processes (such as dispersal, establishment, growth, mortality etc.) and environmental factors (such as landscape position, pest populations, disturbances, resource manipulations, etc.), and provide information to frame policy options for climate change impact

  14. 28 CFR 36.208 - Direct threat.

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) Direct threat means a...

  15. Comparative Environmental Threat Analysis: Three Case Studies.

    Latour, J. B.; Reiling, R.

    1994-01-01

    Reviews how carrying capacity for different environmental problems is operationalized. Discusses whether it is possible to compare threats, using the exceeding of carrying capacity as a yardstick. Points out problems in comparative threat analysis using three case studies: threats to European groundwater resources, threats to ecosystems in Europe,…

  16. DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING

    Ali Gholami

    2016-03-01

    Full Text Available Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured approach for identifying attacks and proposing countermeasures against the exploitation of vulnerabilities in a system. This paper describes an extension of Cloud Privacy Threat Modeling (CPTM methodology for privacy threat modeling in relation to processing sensitive data in cloud computing environments. It describes the modeling methodology that involved applying Method Engineering to specify characteristics of a cloud privacy threat modeling methodology, different steps in the proposed methodology and corresponding products. In addition, a case study has been implemented as a proof of concept to demonstrate the usability of the proposed methodology. We believe that the extended methodology facilitates the application of a privacy-preserving cloud software development approach from requirements engineering to design.

  17. Terrestrial Gravity Fluctuations

    Jan Harms

    2015-12-01

    Full Text Available Different forms of fluctuations of the terrestrial gravity field are observed by gravity experiments. For example, atmospheric pressure fluctuations generate a gravity-noise foreground in measurements with super-conducting gravimeters. Gravity changes caused by high-magnitude earthquakes have been detected with the satellite gravity experiment GRACE, and we expect high-frequency terrestrial gravity fluctuations produced by ambient seismic fields to limit the sensitivity of ground-based gravitational-wave (GW detectors. Accordingly, terrestrial gravity fluctuations are considered noise and signal depending on the experiment. Here, we will focus on ground-based gravimetry. This field is rapidly progressing through the development of GW detectors. The technology is pushed to its current limits in the advanced generation of the LIGO and Virgo detectors, targeting gravity strain sensitivities better than 10^–23 Hz^–1/2 above a few tens of a Hz. Alternative designs for GW detectors evolving from traditional gravity gradiometers such as torsion bars, atom interferometers, and superconducting gradiometers are currently being developed to extend the detection band to frequencies below 1 Hz. The goal of this article is to provide the analytical framework to describe terrestrial gravity perturbations in these experiments. Models of terrestrial gravity perturbations related to seismic fields, atmospheric disturbances, and vibrating, rotating or moving objects, are derived and analyzed. The models are then used to evaluate passive and active gravity noise mitigation strategies in GW detectors, or alternatively, to describe their potential use in geophysics. The article reviews the current state of the field, and also presents new analyses especially with respect to the impact of seismic scattering on gravity perturbations, active gravity noise cancellation, and time-domain models of gravity perturbations from atmospheric and seismic point sources. Our

  18. Terrestrial Gravity Fluctuations

    Harms, Jan

    2015-12-01

    Different forms of fluctuations of the terrestrial gravity field are observed by gravity experiments. For example, atmospheric pressure fluctuations generate a gravity-noise foreground in measurements with super-conducting gravimeters. Gravity changes caused by high-magnitude earthquakes have been detected with the satellite gravity experiment GRACE, and we expect high-frequency terrestrial gravity fluctuations produced by ambient seismic fields to limit the sensitivity of ground-based gravitational-wave (GW) detectors. Accordingly, terrestrial gravity fluctuations are considered noise and signal depending on the experiment. Here, we will focus on ground-based gravimetry. This field is rapidly progressing through the development of GW detectors. The technology is pushed to its current limits in the advanced generation of the LIGO and Virgo detectors, targeting gravity strain sensitivities better than 10^-23 Hz^-1/2 above a few tens of a Hz. Alternative designs for GW detectors evolving from traditional gravity gradiometers such as torsion bars, atom interferometers, and superconducting gradiometers are currently being developed to extend the detection band to frequencies below 1 Hz. The goal of this article is to provide the analytical framework to describe terrestrial gravity perturbations in these experiments. Models of terrestrial gravity perturbations related to seismic fields, atmospheric disturbances, and vibrating, rotating or moving objects, are derived and analyzed. The models are then used to evaluate passive and active gravity noise mitigation strategies in GW detectors, or alternatively, to describe their potential use in geophysics. The article reviews the current state of the field, and also presents new analyses especially with respect to the impact of seismic scattering on gravity perturbations, active gravity noise cancellation, and time-domain models of gravity perturbations from atmospheric and seismic point sources. Our understanding of

  19. Threats in Optical Burst Switched Network

    P. Siva Subramanian

    2011-05-01

    Full Text Available Optical network is a viable network for future communication, which transmits data at an average rate of 50Tb/s. Optical Burst Switching is a trusted mechanism used for Optical network. There is a good amount of research done in the area of security in Optical networks. In addition, the issues related to physical network security has been dealt with respect to Optical networks. Our proposed work is intend to find the possible security threats that may happen in Optical Burst Switched Networks and the counter measures are examined separately. The NS-2 simulator with modified OBS patch is used to verify and validate the proposed mechanism

  20. Countering the nuclear terrorist threat

    Full text: An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to a RDD. RDDs, or 'dirty bombs' as they are often called, spread radioactivity but they do not generate nuclear yield. The fabrication of a RDD requires radioactive material and a dispersal mechanism. Standards for safe handling and accountability of radioactive material vary around the world. Terrorist acquisition and use of an IND is a low-probability but high-consequence threat. Terrorist use of a RDD is a threat of higher probability but lower consequence. Two threats need to be considered for civil radiological and nuclear facilities. One is the theft of materials by terrorists, and the other is an attack on a facility to disperse radiological or nuclear materials. Facilities may include reactors as well as nuclear waste and storage areas. While important elements of a layered defense against these threats are already in place, improved international cooperation and a sustained investment in the science and technology needed to win the war on terrorism is necessary. (author)

  1. Measuring Vulnerability to Stereotype Threat

    Barnard, Lucy; Burley, Hansel; Olivarez, Arturo; Crooks, Steven

    2008-01-01

    Introduction: In this study, we examined the psychometric properties of an instrument intended to measure vulnerability to stereotype threat. Method: We revised the instrument through assessing score reliability and then examined a domain specific model using confirmatory factor analyses. After examining the responses of the total sample…

  2. Threat from Emerging Vectorborne Viruses

    2016-06-09

    Reginald Tucker reads an abridged version of the commentary by CDC author Ronald Rosenberg, Threat from Emerging Vectorborne Viruses.  Created: 6/9/2016 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 6/9/2016.

  3. Cyber Threats to Nuclear Infrastructures

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  4. Cyber Threats to Nuclear Infrastructures

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  5. Terrestrial mammals in an Atlantic Forest remnant, Paraná, Brazil

    Gustavo Borba de Miranda; Mateus Da Fré; Márcia Regina Wolfart; Elaine Maria Lucas

    2013-01-01

    The threat degree and the ecological importance of terrestrial mammals make clear the need for constantly conducting researches in order to add information to the current knowledge on this theme. This study aimed to provide a list of terrestrial mammal species in an Atlantic Forest remnant located in the Southwestern Paraná state, Brazil. Species richness and occurrence frequency were studied from April to October 2009 using two methods: direct observation and recording of traces. We register...

  6. Terrestrial plant methane production

    Mikkelsen, Teis Nørgaard; Bruhn, Dan; Møller, Ian M.; Ambus, Per

    We evaluate all experimental work published on the phenomenon of aerobic methane (CH4) generation in terrestrial plants. We conclude that the phenomenon is true. Four stimulating factors have been observed to induce aerobic plant CH4 production, i.e. cutting injuries, increasing temperature...

  7. Histories of terrestrial planets

    The uneven historical development of terrestrial planets - Mercury, Venus, Earth, Moon and Mars - is probably due to the differences in their size, weight and rotational dynamics in association with the internal planet structure, their distance from the Sun, etc. A systematic study of extraterrestrial planets showed that the time span of internal activity was not the same for all bodies. It is assumed that the initial history of all terrestrial planets was marked with catastrophic events connected with the overall dynamic development of the solar system. In view of the fact that the cores of small terrestrial bodies cooled quicker, their geological development almost stagnated after two or three thousand million years. This is what probably happened to the Mercury and the Moon as well as the Mars. Therefore, traces of previous catastrophic events were preserved on the surface of the planets. On the other hand, the Earth is the most metamorphosed terrestrial planet and compared to the other planets appears to be atypical. Its biosphere is significantly developed as well as the other shell components, its hydrosphere and atmosphere, and its crust is considerably differentiated. (J.P.)

  8. Volcanic ash - Terrestrial versus extraterrestrial

    Okeefe, J. A.

    1976-01-01

    A principal difference between terrestrial and extraterrestrial lavas may consist in the greater ability of terrestrial lavas to form thin films (like those of soap bubbles) and hence foams. It would follow that, in place of the pumice and spiny shards found in terrestrial volcanic ash, an extraterrestrial ash should contain minute spherules. This hypothesis may help to explain lunar microspherules.

  9. Is China Threat a Hoax?

    Niu Weigan; Ma Zongshi

    2008-01-01

    The Beijing Olympics has focused unprecedented world attention on China this year. Many people hail the Games as an occasion that showcases China's growing contribution to world development and harmony. But intent on politicizing this global event, a few modern Cassandras still cling to the flawed China Threat theory. In this paper, the author traces the origins of this fallacious theory. He sees it as a product of Western empiricism viewed through an historical and philosophical prism. He argues that the assertion of threat arises from a generalization of historical facts. The assertion links China's growing clout with declining Western dominance in international affairs. Starting with the myth that peace is possible only among democracies, the theory predicts the inevitability of conflict between the West and China, a country with an alleged expansionist tradition and under an authoritarian system.

  10. Countering 21st Century Threats

    Scharling Pedersen, Peter; Pillai, Chad M.; Hun, Lee Jae

    2015-01-01

    The United States and its Allies confront an increasingly volatile world where threats range from traditional state-on-state challenges to non-state transnational networks. To successfully combat these 21st Century problems, in an era of resource and geo-political power constraints, the U.S. and......), Counter-Terrorism (CT), and Security and Stability Operations (SSO). • Establishing a construct that allows a strategic Whole-of-Government capacity for operations coordinated by joint interagency task forces. • Continue to developing the Global SOF network. • Increased intelligence sharing in areas of...... shared interests pre-crisis. • Establish political agreements and/or intentions with partners to address potential threats. • Establishing mutual trust through Building Partnership Capacity with capable SOF and intelligence organizations....

  11. Sea Level Threat in Tuvalu

    Than Aung; Awnesh Singh; Uma Prasad

    2009-01-01

    Problem statement: Recently the impacts of climate change, in particular, sea level rise, had been a major concern for many Pacific island countries. In early 2000, there were a series of media coverage over sea level rise issues using Tuvalu as an example. The daily life of Tuvalu revolves around the ocean and the immediate threat on the islands people, economy, environment and its islands is of concern to the Tuvalu government. The Tuvalu government has concluded that Tuvalu was destined to...

  12. Affirmative action and stereotype threat

    Bracha, Anat; Cohen, Alma; Conell-Price, Lynn

    2013-01-01

    In spite of the apparent success of affirmative action (AA) in the past, many oppose such policies. Opponents argue that the cost of attaining proportional representation by preferential policies is too high, reducing the quality of selected groups and stigmatizing members of the protected class. One way in which preferential policies might harm groups they are designed to benefit is by producing stereotype threat; that is, cueing a negative stereotype may lead individuals to conform to it. A...

  13. Cyber Terrorism– Global Security Threat

    Bogdanoski, Mitko; Petreski, Drage

    2013-01-01

    It is more than obvious that the way of conducting terrorism with the time is becoming more sophisticated. The cyber terrorism is real threat to fast technology development. Potential targets are systems which control the nation’s defenses and critical infrastructure. The terrorist of the future will win the wars without firing a shot - just by destroying infrastructure that significantly relies on information technology. The fast growth of the Internet users and Internet dependence dramat...

  14. Symbian `vulnerability' and Mobile Threats

    Gharibi, Wajeb

    2012-01-01

    Modern technologies are becoming ever more integrated with each other. Mobile phones are becoming increasing intelligent, and handsets are growing ever more like computers in functionality. We are entering a new era - the age of smart houses, global advanced networks which encompass a wide range of devices, all of them exchanging data with each other. Such trends clearly open new horizons to malicious users, and the potential threats are self evident. In this paper, we study and discuss one o...

  15. Filling in biodiversity threat gaps

    Joppa, Lucas; O'Connor, Brian; Visconti, Piero;

    2016-01-01

    he diversity of life on Earth—which provides vital services to humanity (1)—stems from the difference between rates of evolutionary diversification and extinction. Human activities have shifted the balance (2): Species extinction rates are an estimated 1000 times the “background” rate (3) and cou...... United Nations' 2030 Agenda for Sustainable Development and its 17 Sustainable Development Goals (SDGs). We identify major gaps in data available for assessing global biodiversity threats and suggest mechanisms for closing them....

  16. Subordinates as Threats to Leaders

    Glazer, Amihai; Segendorff, Björn

    2001-01-01

    A leader of an organization may view a subordinate as threatening or weakening the leader's position. The threat may increase with the subordinate's ability and reduce the rents the leader wins. In particular, a leader who trains his subordinate reduces the cost to the owner of a firm in replacing the leader, and so reduces the leader's bargaining power. The leader therefore provides inefficiently low training for the subordinate.

  17. The early evolution of the atmospheres of terrestrial planets

    Raulin, François; Muller, Christian; Nixon, Conor; Astrophysics and Space Science Proceedings : Volume 35

    2013-01-01

    “The Early Evolution of the Atmospheres of Terrestrial Planets” presents the main processes participating in the atmospheric evolution of terrestrial planets. A group of experts in the different fields provide an update of our current knowledge on this topic. Several papers in this book discuss the key role of nitrogen in the atmospheric evolution of terrestrial planets. The earliest setting and evolution of planetary atmospheres of terrestrial planets is directly associated with accretion, chemical differentiation, outgassing, stochastic impacts, and extremely high energy fluxes from their host stars. This book provides an overview of the present knowledge of the initial atmospheric composition of the terrestrial planets. Additionally it includes some papers about the current exoplanet discoveries and provides additional clues to our understanding of Earth’s transition from a hot accretionary phase into a habitable world. All papers included were reviewed by experts in their respective fields. We are ...

  18. Raising New Zealand’s Terrorism Threat Level: Is Transparency Important in National Security?

    Richard Shortt

    2015-03-01

    Full Text Available In mid-October 2014, ten years after the New Zealand Government confirmed the establishment of a Combined Threat Assessment Group (CTAG to advise it on a range of potential threats, the prime minister announced, for the first time, the raising of New Zealand’s domestic terrorism threat level. Unfortunately, the assessment that gave rise to the threat level’s change (or a version of it was not made public. Therefore, how were New Zealanders or others expected to properly understand the environment giving rise to the threat changes, and to judge whether the assessors got the setting right. This paper argues increased public transparency is appropriate when additional security measures resulting from a change in threat perception impact citizens’ lives and cost tax-payers more money. In presenting this argument, the paper briefly describes the role of threat assessments and how threat levels are set. In the absence of a public version of New Zealand’s threat assessment giving a cohesive, concise and transparent outline of the threat environment, the paper presents publicly available information from well-informed high office holders to see if that provides alternative and suitable transparency. Finally, the paper compares New Zealand’s terrorism threat assessment transparency processes with those of four countries with similar characteristics to New Zealand to see if alternative models of public transparency are available for consideration.

  19. Working group 4: Terrestrial

    A working group at a Canada/USA symposium on climate change and the Arctic identified major concerns and issues related to terrestrial resources. The group examined the need for, and the means of, involving resource managers and users at local and territorial levels in the process of identifying and examining the impacts and consequences of climatic change. Climatic change will be important to the Arctic because of the magnitude of the change projected for northern latitudes; the apparent sensitivity of its terrestrial ecosystems, natural resources, and human support systems; and the dependence of the social, cultural, and economic welfare of Arctic communities, businesses, and industries on the health and quality of their environment. Impacts of climatic change on the physical, biological, and associated socio-economic environment are outlined. Gaps in knowledge needed to quantify these impacts are listed along with their relationships with resource management. Finally, potential actions for response and adaptation are presented

  20. Antibiotic and Antimicrobial Resistance: Threat Report 2013

    ... this? Submit What's this? Submit Button Antibiotic Resistance Threats in the United States, 2013 Recommend on Facebook Tweet Share Compartir This report, Antibiotic resistance threats in the United States, 2013 gives a first- ...

  1. Time Scales: Terrestrial

    Petit, G.; Murdin, P.

    2000-11-01

    Terrestrial time is at present derived from atomic clocks. The SI second, the unit of time of the international system of units, has been defined since 1967 in terms of a hyperfine transition of the cesium atom and the best primary frequency standards now realize it with a relative uncertainty of a few parts in 1015, which makes it the most accurately measurable physical quantity. INTERNATIONAL A...

  2. Stereotype Threat and Survey Response Bias

    King, Kenya Latonya

    2014-01-01

    Stereotype threat is the threat of confirming a negative stereotype about a group with which a person identifies. Researchers have found that stereotype threat can result in underperformance in multiple domains, shifts in social behavior, and shifts in assessed implicit attitudes, the likelihood of which increases as an individual's concern about the domain of interest increases. According to theory, this threat can be "alleviated",thereby diminishing or eliminating its impact. In this projec...

  3. The role of threats in animal cooperation

    Cant, Michael A.

    2010-01-01

    In human societies, social behaviour is strongly influenced by threats of punishment, even though the threats themselves rarely need to be exercised. Recent experimental evidence suggests that similar hidden threats can promote cooperation and limit within-group selfishness in some animal systems. In other animals, however, threats appear to be ineffective. Here I review theoretical and empirical studies that help to understand the evolutionary causes of these contrasting patterns, and identi...

  4. Security of radioactive sources: Threats and answers

    The general issue of the security of radioactive sources is presented as a prime but constitutive element of radiation safety, focusing particularly on the perceived threats for the malevolent use of radioactive sources and on the possible answers to these threats. The paper discusses the source security threat and the possible international response, and presents an overall outlook for the future. (author)

  5. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  6. 24 CFR 9.131 - Direct threat.

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Direct threat. 9.131 Section 9.131... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT § 9.131 Direct threat. (a) This part does not require the agency..., privileges, advantages and accommodations of that agency when that individual poses a direct threat to...

  7. Ruthenium Isotopic Composition of Terrestrial Materials, Iron Meteorites and Chondrites

    Becker, H.; Walker, R. J.

    2002-01-01

    Ru isotopic compositions of magmatic iron meteorites and chondrites overlap with terrestrial Ru at the 0.3 to 0.9 (epsilon) level. Additional information is contained in the original extended abstract.

  8. Nuclear threats and emergency preparedness in Finland

    The political and economic upheavals which have taken place in Eastern Europe have had an impact on radiation and nuclear safety throughout Europe. Emergency preparedness systems for unexpected nuclear events have been developed further in all European countries, and prosperous western nations have invested in improving the safety of East European nuclear power plants. The economic crisis facing countries of the former Soviet Union has also promoted illicit trade in nuclear materials; this has made it necessary for various border guards and police authorities to intensify their collaboration and to tighten border controls. On 3-4 October 1995, Finnish Centre for Radiation and Nuclear Safety (STUK) arranged a seminar on nuclear threats and emergency preparedness in Finland. In addition to STUK experts, a wide range of rescue and civil defence authorities, environmental health specialists and other persons engaged in emergency preparedness attended the seminar. The publication contains a compilation of reports presented at the seminar. The reports cover a broad spectrum of nuclear threats analyzed at STUK, the impacts of radioactive fallout on human beings and on the environment, and preparedness systems by which the harmful effects of radiation or nuclear accidents can, if necessary, be minimized. (33 figs., 5 tabs.)

  9. The nuclear threat and the Nuclear Threat Initiative

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  10. Terrestrial Steering Group. 2014. Arctic Terrestrial Biodiversity Monitoring Plan

    Aastrup, Peter; Aronsson, Mora; Barry, Tom;

    implementation of the Arctic Terrestrial Biodiversity Monitoring Plan for the next two years. Identify expert networks required for successful implementation of the plan. Identify key gaps and opportunities for the TSG related to plan implementation and identify near-term next steps to address gaps.......The Terrestrial Steering Group (TSG), has initiated the implementation phase of the CBMP Terrestrial Plan. The CBMP Terrestrial Steering Group, along with a set of invited experts (see Appendix A for a participants list), met in Iceland from February 25-27th to develop a three year work plan to...... guide implementation of the CBMP-Terrestrial Plan. This report describes the outcome of that workshop. The aim of the workshop was to develop a three year work plan to guide implementation of the CBMP-Terrestrial Plan. The participants were tasked with devising an approach to both (a) determine what...

  11. Stereotype threat prevents perceptual learning

    Rydell, Robert J.; Shiffrin, Richard M.; Boucher, Kathryn L.; Van Loo, Katie; Rydell, Michael T.

    2010-01-01

    Stereotype threat (ST) refers to a situation in which a member of a group fears that her or his performance will validate an existing negative performance stereotype, causing a decrease in performance. For example, reminding women of the stereotype “women are bad at math” causes them to perform more poorly on math questions from the SAT and GRE. Performance deficits can be of several types and be produced by several mechanisms. We show that ST prevents perceptual learning, defined in our task...

  12. New Threat to World Economy

    2007-01-01

    The aggregate amount of money and credit in the global economy has risen sharply over the past 30 years,with its growth rate and stock far exceeding that of the real economy or real assets of the world.This is the view of Xiang Songzuo,professor at the Huazhong University of Science and Technology,whose opinion was first published in a recent article in China Business News.Xiang said this situation is a real threat to the world economy.Excerpts of his article are reprinted below:

  13. Symbian `vulnerability' and Mobile Threats

    Gharibi, Wajeb

    2012-01-01

    Modern technologies are becoming ever more integrated with each other. Mobile phones are becoming increasing intelligent, and handsets are growing ever more like computers in functionality. We are entering a new era - the age of smart houses, global advanced networks which encompass a wide range of devices, all of them exchanging data with each other. Such trends clearly open new horizons to malicious users, and the potential threats are self evident. In this paper, we study and discuss one of the most famous mobile operating systems 'Symbian'; its vulnerabilities and recommended protection technologies.

  14. Wireless LAN Security Threats & Vulnerabilities

    Md. Waliullah

    2014-01-01

    Full Text Available Wireless LANs are everywhere these days from home to large enterprise corporate networks due to the ease of installation, employee convenience, avoiding wiring cost and constant mobility support. However, the greater availability of wireless LANs means increased danger from attacks and increased challenges to an organisation, IT staff and IT security professionals. This paper discusses the various security issues and vulnerabilities related to the IEEE 802.11 Wireless LAN encryption standard and common threats/attacks pertaining to the home and enterprise Wireless LAN system and provide overall guidelines and recommendation to the home users and organizations.

  15. Terrestrial planet formation

    Righter, K.; D. P. O’Brien

    2011-01-01

    Advances in our understanding of terrestrial planet formation have come from a multidisciplinary approach. Studies of the ages and compositions of primitive meteorites with compositions similar to the Sun have helped to constrain the nature of the building blocks of planets. This information helps to guide numerical models for the three stages of planet formation from dust to planetesimals (∼106 y), followed by planetesimals to embryos (lunar to Mars-sized objects; few × 106 y), and finally e...

  16. MCNPX improvements for threat reduction applications

    Waters, Laurie S [Los Alamos National Laboratory; Durkee, Joe W [Los Alamos National Laboratory; Elson, Jay S [Los Alamos National Laboratory; Esch, Ernst I [Los Alamos National Laboratory; Fensin, Michael L [Los Alamos National Laboratory; Hendricks, John S [Los Alamos National Laboratory; Holloway, Shannon T [Los Alamos National Laboratory; James, Michael R [Los Alamos National Laboratory; Jason, Andrew [Los Alamos National Laboratory; Johns, Russell C [Los Alamos National Laboratory; Johnson, M William [Los Alamos National Laboratory; Kawano, Toshihiko [Los Alamos National Laboratory; Mckinney, Gregg W [Los Alamos National Laboratory; Moller, Peter [Los Alamos National Laboratory; Pelowitz, Denise B [Los Alamos National Laboratory

    2008-01-01

    The DHS Domestic Nuclear Detection Office (DNDO) is funding a multiyear program of improvements for the MCNPX{sup TM} Monte Carlo radiation-transport code. Additional work is underway for the DTRA Active Interrogation programs. Enhancements contained in the current MCNPX 2.6.0 RSICC release will be presented, including stopped-muon physics, delayed neutron and photon generation and automatic generation of source photons. Preliminary benchmarking comparisons with data taken with a PSI muon beam will be discussed. We will also describe current improvements now underway, including Nuclear Resonance Fluorescence, pulsed sources, and others. We will also describe very new work begun on a Threat-Reduction user inferface, designed to simplify the setup of TR-related calculations, and introduce standards into geometry, sources and backgrounds.

  17. The threat of illicit trafficking

    Intelligence services, the army, the navy, the air force and the police together work to avoid illicit trafficking around the world by taking actions as follows: examining the risks and threats of illicit trafficking of radioactive material by terrorists or criminals; gaining a better understanding of current and future patterns and trends in the illicit trafficking of radioactive material; determining progress on efforts to establish detection capabilities at borders and to exchange information on developments in detection technology and response methodologies through installation of radiation detection equipment; strengthening existing networks and cooperation for sharing information on illicit trafficking reports on incidents involving smuggling, theft, loss and illegal disposal, illegal possession and transfer, and attempted illegal sales of the material; examining how an enhanced export/import regime can assist in combating illicit trafficking control through unauthorized movement of radioactive material; sharing information on activities intended to implement international obligations, recommendations and guidance relevant to nuclear security; suggest actions by which the international effort, through the IAEA, would be strengthened. This paper examines the threat and context of illicit nuclear trafficking of radioactive material, what is being done to combat such trafficking and highlights where more needs to be done

  18. Threat sensitivity in bipolar disorder.

    Muhtadie, Luma; Johnson, Sheri L

    2015-02-01

    Life stress is a major predictor of the course of bipolar disorder. Few studies have used laboratory paradigms to examine stress reactivity in bipolar disorder, and none have assessed autonomic reactivity to laboratory stressors. In the present investigation we sought to address this gap in the literature. Participants, 27 diagnosed with bipolar I disorder and 24 controls with no history of mood disorder, were asked to complete a complex working memory task presented as "a test of general intelligence." Self-reported emotions were assessed at baseline and after participants were given task instructions; autonomic physiology was assessed at baseline and continuously during the stressor task. Compared to controls, individuals with bipolar disorder reported greater increases in pretask anxiety from baseline and showed greater cardiovascular threat reactivity during the task. Group differences in cardiovascular threat reactivity were significantly correlated with comorbid anxiety in the bipolar group. Our results suggest that a multimethod approach to assessing stress reactivity-including the use of physiological parameters that differentiate between maladaptive and adaptive profiles of stress responding-can yield valuable information regarding stress sensitivity and its associations with negative affectivity in bipolar disorder. (PsycINFO Database Record (c) 2015 APA, all rights reserved). PMID:25688436

  19. Arctic Terrestrial Biodiversity Monitoring Plan

    Christensen, Tom; Payne, J.; Doyle, M.;

    -Terrestrial Plan/the Plan) as the framework for coordinated, long-term Arctic terrestrial biodiversity monitoring. The goal of the CBMP-Terrestrial Plan is to improve the collective ability of Arctic traditional knowledge (TK) holders, northern communities, and scientists to detect, understand and report on long......-term change in Arctic terrestrial ecosystems and biodiversity. The CBMP-Terrestrial Plan aims to address these priority management questions: 1. What are the status, distribution, and conditions of terrestrial focal species, populations, communities, and landscapes/ecosystems and key processes...... network of scientists, conservation organizations, government agencies, Permanent Participants Arctic community experts and leaders. Using an ecosystem-based monitoring approach which includes species, ecological functions, ecosystems, their interactions, and potential drivers, the CBMP focuses on...

  20. Atmospheric Circulation of Terrestrial Exoplanets

    Showman, Adam P.; Wordsworth, Robin D.; Merlis, Timothy M.; Kaspi, Yohai

    2013-01-01

    The investigation of planets around other stars began with the study of gas giants, but is now extending to the discovery and characterization of super-Earths and terrestrial planets. Motivated by this observational tide, we survey the basic dynamical principles governing the atmospheric circulation of terrestrial exoplanets, and discuss the interaction of their circulation with the hydrological cycle and global-scale climate feedbacks. Terrestrial exoplanets occupy a wide range of physical a...

  1. Terrestrial Plume Impingement Testbed Project

    National Aeronautics and Space Administration — Masten Space Systems proposes to create a terrestrial plume impingement testbed for generating novel datasets for extraterrestrial robotic missions. This testbed...

  2. The recognition of terrestrial impact structures

    Therriault A M

    2002-12-01

    Full Text Available The Earth is the most endogenically active of the terrestrial planets and, thus, has retained the poorest sample of impacts that have occurred throughout geological time. The current known sample consists of approximately 160 impact structures or crater fields. Approximately 30% of known impact structures are buried and were initially detected as geophysical anomalies and subsequently drilled to provide geologic samples. The recognition of terrestrial impact structures may, or may not, come from the discovery of an anomalous quasi-circular topographic, geologic or geophysical feature. In the geologically active terrestrial environment, anomalous quasi-circular features, however, do not automatically equate with an impact origin. Specific samples must be acquired and the occurrence of shock metamorphism, or, in the case of small craters, meteoritic fragments, must be demonstrated before an impact origin can be confirmed. Shock metamorphism is defined by a progressive destruction of the original rock and mineral structure with increasing shock pressure. Peak shock pressures and temperatures produced by an impact event may reach several hundreds of gigaPascals and several thousand degrees Kelvin, which are far outside the range of endogenic metamorphism. In addition, the application of shockwave pressures is both sudden and brief. Shock metamorphic effects result from high strain rates, well above the rates of normal tectonic processes. The well-characterized and documented shock effects in quartz are unequivocal indicators and are the most frequently used indicator for terrestrial impact structures and lithologies.

  3. Countering the Nuclear Terrorist Threat

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  4. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes. PMID:24345711

  5. Real threat of nuclear smuggling

    Trade in uranium and plutonium during the past five years has given smuggling unprecedented relevance to international security. Yet there is considerable controversy over the threat nuclear smuggling poses. Even though serious efforts are being made to attack the problem at the source, the international community has been slow to respond to the dangers that nuclear smuggling presents. We suggest that systematic multinational measures be taken as soon as possible to inhibit theft at the source, to disrupt trafficking and to deter buyers. The U.S., Germany, Russia and other nations with an interest in the nuclear problem should set up a 'flying squad' with an investigative arm, facilities for counter terrorist and counter extortion actions and a disaster management team. This paper discusses these issues. 3 refs

  6. World's soils are under threat

    Montanarella, Luca; Pennock, Daniel Jon; McKenzie, Neil; Badraoui, Mohamed; Chude, Victor; Baptista, Isaurinda; Mamo, Tekalign; Yemefack, Martin; Singh Aulakh, Mikha; Yagi, Kazuyuki; Hong, Suk Young; Vijarnsorn, Pisoot; Zhang, Gan-Lin; Arrouays, Dominique; Black, Helaina; Krasilnikov, Pavel; Sobocká, Jaroslava; Alegre, Julio; Henriquez, Carlos Roberto; de Lourdes Mendonça-Santos, Maria; Taboada, Miguel; Espinosa-Victoria, David; AlShankiti, Abdullah; Kazem AlaviPanah, Sayed; El Mustafa Elsheikh, Elsiddig Ahmed; Hempel, Jon; Camps Arbestain, Marta; Nachtergaele, Freddy; Vargas, Ronald

    2016-02-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources Report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecurity among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the State of the World's Soil Resources Report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  7. Can polar bears use terrestrial foods to offset lost ice-based hunting opportunities?

    Rode, Karyn D.; Robbins, Charles T.; Nelson, Lynne; Amstrup, Steven C.

    2015-01-01

    Increased land use by polar bears (Ursus maritimus) due to climate-change-induced reduction of their sea-ice habitat illustrates the impact of climate change on species distributions and the difficulty of conserving a large, highly specialized carnivore in the face of this global threat. Some authors have suggested that terrestrial food consumption by polar bears will help them withstand sea-ice loss as they are forced to spend increasing amounts of time on land. Here, we evaluate the nutritional needs of polar bears as well as the physiological and environmental constraints that shape their use of terrestrial ecosystems. Only small numbers of polar bears have been documented consuming terrestrial foods even in modest quantities. Over much of the polar bear's range, limited terrestrial food availability supports only low densities of much smaller, resident brown bears (Ursus arctos), which use low-quality resources more efficiently and may compete with polar bears in these areas. Where consumption of terrestrial foods has been documented, polar bear body condition and survival rates have declined even as land use has increased. Thus far, observed consumption of terrestrial food by polar bears has been insufficient to offset lost ice-based hunting opportunities but can have ecological consequences for other species. Warming-induced loss of sea ice remains the primary threat faced by polar bears.

  8. Terrestrial animal ecology

    The Animal Ecology project is an integral part of the terrestrial ecology program. For convenience, it is reported separately because of the specialized nature of its techniques. It includes studies to characterize faunal populations taxonomically and ecologically and to estimate density and biomass of important mammal, bird, herpetofauna, and invertebrate populations. Extensive studies of small mammal populations conducted in past years are being summarized for open literature publication. Methodology and techniques developed in the animal ecology program are expected to be vital to studies to be initiated under a newly funded 189 entitled Radioecology of Waste Management Zones. These kinds of supportive studies will be needed to determine dietary habits of important animals inhabiting waste management zones, construction of realistic food chain models, and estimating radioactivity doses to biota

  9. Terrestrial plant methane production

    Mikkelsen, Teis Nørgaard; Bruhn, Dan; Møller, Ian M.;

    We evaluate all experimental work published on the phenomenon of aerobic methane (CH4) generation in terrestrial plants. We conclude that the phenomenon is true. Four stimulating factors have been observed to induce aerobic plant CH4 production, i.e. cutting injuries, increasing temperature......, ultraviolet radiation and reactive oxygen species. Further, we analyze rates of measured emission of aerobically produced CH4 in pectin and in plant tissues from different studies and argue that pectin is very far from the sole contributing precursor. Hence, scaling up of aerobic CH4 emission needs to take...... the aerobic methane emission in plants. Future work is needed for establishing the relative contribution of several proven potential CH4 precursors in plant material....

  10. Sensor-guided threat countermeasure system

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  11. Beeinflusst Stereotype Threat die Leseleistung von Jungen?

    Eckert, Christine

    2012-01-01

    Ein durchgängiger Befund internationaler Schulleistungsvergleichsstudien bezieht sich auf die niedrigere Lesekompetenz von Jungen im Vergleich zu Mädchen (OECD, 2010). Ziel der vorliegenden Arbeit war, zu prüfen, welchen Einfluss negative Stereotype – im Sinne der Stereotype Threat-Theorie (Steele & Aronson, 1995) – auf die Leseleistung von Jungen haben. Basierend auf Befunden aus der Lese- und Stereotype Threat-Forschung wurde ein Mediator-Moderator-Modell des Stereotype Threat-Effekts (vgl....

  12. Gender, Stereotype Threat and Mathematics Test Scores

    Ming Tsui; Xu, Xiao Y.; Edmond Venator

    2011-01-01

    Problem statement: Stereotype threat has repeatedly been shown to depress womens scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: ...

  13. Reaction to New Security Threat Class

    Elovici, Yuval; Rokach, Lior

    2014-01-01

    Each new identified security threat class triggers new research and development efforts by the scientific and professional communities. In this study, we investigate the rate at which the scientific and professional communities react to new identified threat classes as it is reflected in the number of patents, scientific articles and professional publications over a long period of time. The following threat classes were studied: Phishing; SQL Injection; BotNet; Distributed Denial of Service; ...

  14. DOE site-specific threat assessment

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  15. Nuclear terrorism: How real is the threat?

    After the end of the Cold War the threat of proliferation of weapons of mass destruction to non-state actors has increased and since non-territorial actors cannot be deterred as easily as states, new responses have to be found. The author offers a definition of nuclear terrorism which includes also attacks on, and sabotage of, nuclear reactors and the dispersal of radioactive waste, in addition to the possession or use of weapon-grade nuclear materials. It is held that the main bottleneck for would-be nuclear terrorists is not so much bomb design than access to nuclear material for which the territories of the former Soviet Union are a likely source, due to gaps in safety and security. The article discusses the smuggling of nuclear material from the former USSR's territories and lists seven possible methods of acquisition of nuclear materials by terrorists. The intentions of various types of groups to use weapons of mass destruction and their possible goals are analyzed and the question whether or not Osama Bin Laden has acquired nuclear materials is raised. A discussion of possible motivations for nuclear terrorism by non-state actors and a listing of facilitating and inhibiting factors with regard to terrorist use of weapons of mass destruction lead to the conclusion that nuclear terrorism by non-state actors is still a low probability event but that no risks can be taken and that a broad action plan to counter the threat is needed whereby the IAEA should stand in the forefront. (author)

  16. Birds as Bioindicators of Pollution in Aquatic and Terrestrial Environments

    Cotín Martínez, Javier

    2012-01-01

    [eng] Birds have been widely used as bioindicators. In this study we face the use of birds as bioindicators of metal pollution in two different scenarios of contamination: one that takes place in an aquatic environment, the Ebro river basin, and a second that occurs in a terrestrial environment, the Bolivian Andes. In the case of the Ebro river basin, the pollution threat is a factory located at the river bend, close to Flix, that due to its long operational activity and along with the co...

  17. Prepare for scare-Impact of threat predictability on affective visual processing in spider phobia.

    Klahn, Anna Luisa; Klinkenberg, Isabelle A G; Notzon, Swantje; Arolt, Volker; Pantev, Christo; Zwanzger, Peter; Junghöfer, Markus

    2016-07-01

    The visual processing of emotional faces is influenced by individual's level of stress and anxiety. Valence unspecific affective processing is expected to be influenced by predictability of threat. Using a design of phasic fear (predictable threat), sustained anxiety (unpredictable threat) and safety (no threat), we investigated the magnetoencephalographic correlates and temporal dynamics of emotional face processing in a sample of phobic patients. Compared to non-anxious controls, phobic individuals revealed decreased parietal emotional attention processes during affective processing at mid-latency and late processing stages. While control subjects showed increasing parietal processing of the facial stimuli in line with decreasing threat predictability, phobic subjects revealed the opposite pattern. Decreasing threat predictability also led to increasing neural activity in the orbitofrontal and dorsolateral prefrontal cortex at mid-latency stages. Additionally, unpredictability of threat lead to higher subjective discomfort compared to predictability of threat and no threat safety condition. Our findings indicate that visual processing of emotional information is influenced by both stress induction and pathologic anxiety. PMID:27036648

  18. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2012-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stere...

  19. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    Zhu, Yong; ZHAO Yufang; Ybarra, Oscar; Stephan, Walter G.; Yang, Qing

    2015-01-01

    Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes–Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study...

  20. Game Theoretic Risk Analysis of Security Threats

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  1. The Smallpox Threat: The School Nurse's Role

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  2. Gender, Stereotype Threat and Mathematics Test Scores

    Ming Tsui

    2011-01-01

    Full Text Available Problem statement: Stereotype threat has repeatedly been shown to depress women’s scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: Experiment 1, where in Chinese students were tested with the added independent variable of test importance. Our results produced only marginally significant stereotype threat effects. Experiment 2, a replication of experiment 1, yielded completely different results, with no threat effects at all. Math-test scores were significantly higher in the threat condition for both men and women, consistent with the phenomena of stereotype lift and stereotype reactance. Experiment 3, which did not include the test-important variable, yielded no significant effects. Conclusion: Stereotype threat, in the mathematics domain, does not seem to be a problem for women in China. We discuss our results in terms of factors which moderate stereotype threat and societal differences in the U.S. and China.

  3. Development of the Academic Stereotype Threat Inventory

    Pseekos, A. Chantelle; Dahlen, Eric R.; Levy, Jacob J.

    2008-01-01

    The authors describe the development and preliminary validation of the Academic Stereotype Threat Inventory, a self-report measurement of math-related stereotype threat among women. A preliminary version of the instrument was administered to 308 undergraduate women. Principal component analysis yielded a 3-factor solution. Convergent and…

  4. Stereotype Threat, Identity Salience, and Spatial Reasoning

    McGlone, Matthew S.; Aronson, Joshua

    2006-01-01

    Stereotype threat research provides insight into how the low standardized test scores of students from stigmatized social groups may derive in part from the negative performance expectations about these groups. Because these students belong to many social groups, one means of mitigating the threat is to remind them of their membership in groups…

  5. The Nature of the Bioterrorism Threat

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  6. In Brief: Forecasting meningitis threats

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  7. [Counterfeit medicines: a growing threat].

    Barbereau, S

    2006-12-01

    The medical drug market has undergone considerable transformation in recent years. Like other products, medicines have been affected by globalization. Free trade policies have had a number of negative effects including a reduction in quality control not only for some products but also for raw materials and finished products. The global environment has also created conditions conducive to counterfeit medicines. The term counterfeit medicine is defined differently from one country to another in terms of quality, legality and fraudulent intent. This situation prompted the WHO to propose the following definition: "A counterfeit medicine is one which is deliberately and fraudulently mislabeled with respect to identity and/or source. Counterfeiting can apply to both branded and generic products and counterfeit products may include products with the correct ingredients or with the wrong ingredients, without active ingredients, with insufficient active ingredients or with fake packaging." Weak pharmaceutical regulation often compounded by widespread corruption in developing countries has greatly facilitated the development of this illicit market with harmful and costly effects on public health. Due to the lack of pharmocovigilance accidents involving use of counterfeit drugs go unreported. For this reason it is not possible to measure the economic impact. While counterfeiting has become a major threat in developing countries, it also affects industrialized countries. Fraudulent behavior occurs all over the world. PMID:17286014

  8. The Threat of Terrorist Organizations in Cyberspace

    Gabi Siboni

    2013-12-01

    Full Text Available This article discusses the threat of terrorism in cyberspace and examines the truth of the perceptions of this threat that have formed in recent years. It examines the capabilities that a non-state actor can achieve and whether these can constitute a real threat to the national security of states. For an analysis of the main threats facing a state from a multi-year perspective and in light of anticipated changes in a state’s strategic balance, the factors that threaten the state are presented and the roots of the threat are identified. The article thus examines whether terrorism, whose impact is generally tactical, could make (or perhaps has already made the transition to a cyber weapon capability with strategic impact. Specifically, the question is could terrorists develop cyber weapon capabilities that could inflict widespread damage or damage over time, of the sort that brings states to their knees and causes critical systems to crash.

  9. Insider threat to secure facilities: data analysis

    1979-12-07

    This report is the culmination of a project in which data from several industries confronting internal security threats were collected and analyzed. The industries and threats involved are deemed to be analogous in one or more respects to potential threats confronting decision makers in the nuclear industry. The analog internal threats consist of bank frauds and embezzlements over $10,000, computer crimes of various types and insider drug thefts from drug manufactures and distributors. These data have been subjected to careful analysis utilizing both descriptive and formal statistical techniques. A number of findings are quite suggestive as to the general nature of the internal threat and are discussed and interpreted in terms of thenuclear industry analogy.

  10. Ecological transfer mechanisms - Terrestrial

    Radionuclides produced by nuclear excavation detonations and released to the environment may enter a variety of biogeochemical cycles and follow essentially the same transfer pathways as their stable-element counterparts. Estimation of potential internal radiation doses to individuals and/or populations living in or near fallout-contaminated areas requires analysis of the food-chain and other ecological pathways by which radionuclides released to the environment may be returned to man. A generalized materials transfer diagram, applicable to the forest, agricultural, freshwater and marine ecosystems providing food and water to the indigenous population of Panama and Colombia in regions that could be affected by nuclear excavation of a sea-level canal between the Atlantic and Pacific Oceans, is presented. Transfer mechanisms effecting the movement of stable elements and radionuclides in terrestrial ecosystems are discussed, and methods used to simulate these processes by means of mathematical models are described to show how intake values are calculated for different radionuclides in the major ecological pathways leading to man. These data provide a basis for estimating potential internal radiation doses for comparison with the radiation protection criteria established by recognized authorities; and this, in turn, provides a basis for recommending measures to insure the radiological safety of the nuclear operation plan. (author)

  11. Terrestrial locomotion in arachnids.

    Spagna, Joseph C; Peattie, Anne M

    2012-05-01

    In this review, we assess the current state of knowledge on terrestrial locomotion in Arachnida. Arachnids represent a single diverse (>100,000 species) clade containing well-defined subgroups (at both the order and subordinal levels) that vary morphologically around a basic body plan, yet exhibit highly disparate limb usage, running performance, and tarsal attachment mechanisms. Spiders (Araneae), scorpions (Scorpiones), and harvestmen (Opiliones) have received the most attention in the literature, while some orders have never been subject to rigorous mechanical characterization. Most well-characterized taxa move with gaits analogous to the alternating tripod gaits that characterize fast-moving Insecta - alternating tetrapods or alternating tripods (when one pair of legs is lifted from the ground for some other function). However, between taxa, there is considerable variation in the regularity of phasing between legs. Both large and small spiders appear to show a large amount of variation in the distribution of foot-ground contact, even between consecutive step-cycles of a single run. Mechanisms for attachment to vertical surfaces also vary, and may depend on tufts of adhesive hairs, fluid adhesives, silks, or a combination of these. We conclude that Arachnida, particularly with improvements in microelectronic force sensing technology, can serve as a powerful study system for understanding the kinematics, dynamics, and ecological correlates of sprawled-posture locomotion. PMID:22326455

  12. Aquatic and Terrestrial Environment 2004

    Andersen, J. M.; Boutrup, S.; Bijl, L. van der;

    This report presents the 2004 results of the Danish National Monitoring and Assess-ment Programme for the Aquatic and Terrestrial Environments (NOVANA). 2004 was the first year in which terrestrial nature was included in the monitoring pro-gramme. The report reviews the state of the groundwater......, watercourses, lakes and marine waters and the pressures upon them and reviews the monitoring of terrestrial natural habitats and selected plants and animals. The report is based on the annual reports prepared for each subprogramme by the Topic Centres. The latter reports are mainly based on data collected and...

  13. Transfer coefficients for terrestrial foodchains

    Transfer coefficients to predict the passage of isotopes from the environment to terrestrial foods have been derived for various radionuclides of importance in the nuclear fuel cycle. These data update and extend previously recommended handbook values. We derive transfer coefficients to terrestrial foods and describe the systematics of the derived transfer coefficients. Suggestions are offered for changes in the values of transfer coefficients to terrestrial foods that now appear in federal regulatory guides. Deficiencies in our present knowledge concerning transfer coefficients and limitations in the use of these values to ensure compliance with radiation protection standards are discussed. (orig.) 891 HP/orig. 892 MB

  14. Terrestrial sources and sinks of carbon inferred from terrestrial data

    Houghton, R. A.

    2011-01-01

    Two approaches have been used to calculate changes in terrestrial carbon storage with data obtained from terrestrial ecosystems, rather than with atmospheric or oceanographic data. One approach is based on the changes in carbon that result from changes in land use (conversion of forest to agricultural land, abandonment of agricultural land, harvest and regrowth). The other approach uses measurements of forest biomass obtained through forests inventories to determine change directly. These lat...

  15. The threat of nuclear terrorism

    Full text: There have always been enormous gaps between the potential of a weapon and the abilities and/or the will to employ it by terrorists. New means and methods of violence with unknown outcomes could be less appealing for sub-national groups. Conventional 'off the shelf' weaponry is thus likely to remain the major tools for traditional terrorists. However, the analysis show that while the risk of nuclear terrorism may be remote, it should not and cannot be excluded. Rigorous standards and means the protection, control and accounting of fissile materials are thus needed. 'Nuclear terrorism' can be defined as acts of violence and destruction where the means applied are nuclear devices, or threats of use of such means, to create a condition of fear, to get attention, or to blackmail to have wider effect on others than the directly targeted victim(s). Nuclear terrorism is a subset of radiological terrorism, were the means (or threats) applied are radioactive substances. While being distinctly dissimilar in terms of technical approaches and damage potentials, many of the features with regards to public threat perception are likely to be similar. No non-state actors have ever deployed or used a nuclear device, and the number of (publicly known) nuclear bomb treats has been limited. However, there is a disturbing interest among some terrorist organizations in acquiring nuclear weapon capabilities, probably for tactical purposes. The biological and chemical programs of the Japanese 'Aum Shinrikyo' cult that culminated in the Tokyo metro attack is highly publicized. Less well-known is the nuclear weapon program of the group. Nuclear material was acquired from the sect's properties in Australia and markets were explored to purchase nuclear technology via straw trading companies. Another highly profiled terrorist group with obvious nuclear intentions is the 'Al- Qa'ida', the group of bin Laden. The recent trail for the bombings of the U.S. embassies in Nairobi, Kenya

  16. Food additives

    ... this page: //medlineplus.gov/ency/article/002435.htm Food additives To use the sharing features on this page, please enable JavaScript. Food additives are substances that become part of a food ...

  17. Atmospheric Circulation of Terrestrial Exoplanets

    Showman, Adam P; Merlis, Timothy M; Kaspi, Yohai

    2013-01-01

    The investigation of planets around other stars began with the study of gas giants, but is now extending to the discovery and characterization of super-Earths and terrestrial planets. Motivated by this observational tide, we survey the basic dynamical principles governing the atmospheric circulation of terrestrial exoplanets, and discuss the interaction of their circulation with the hydrological cycle and global-scale climate feedbacks. Terrestrial exoplanets occupy a wide range of physical and dynamical conditions, only a small fraction of which have yet been explored in detail. Our approach is to lay out the fundamental dynamical principles governing the atmospheric circulation on terrestrial planets--broadly defined--and show how they can provide a foundation for understanding the atmospheric behavior of these worlds. We first survey basic atmospheric dynamics, including the role of geostrophy, baroclinic instabilities, and jets in the strongly rotating regime (the "extratropics") and the role of the Hadle...

  18. Insider threat to secure facilities: data analysis

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs

  19. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  20. Ebola Virus ─ A Global Threat

    Mejbah Uddin Ahmed

    2015-01-01

    Full Text Available Ebola virus is a filamentous, enveloped, non-segmented, single-stranded, negative-sense RNA virus. It belongs to the Filoviridae and was first recognized near the Ebola River valley in Zaire in 1976. Since then most of the outbreaks have occurred to both human and nonhuman primates in sub-Saharan Africa. Ebola virus causes highly fatal hemorrhagic fever in human and nonhuman primates. In addition to hemorrhagic fever, it could be used as a bioterrorism agent. Although its natural reservoir is yet to be proven, current data suggest that fruit bats are the possibility. Infection has also been documented through the handling of infected chimpanzees, gorillas, monkeys, forest antelope and porcupines. Human infection is caused through close contact with the blood, secretion, organ or other body fluids of infected animal. Human-to-human transmission is also possible. Ebola virus infections are characterized by immune suppression and a systemic inflammatory response that causes impairment of the vascular, coagulation, and immune systems, leading to multiorgan failure and shock. The virus constitutes an important public health threat in Africa and also worldwide as no effective treatment or vaccine is available till now

  1. Sea Level Threat in Tuvalu

    Than Aung

    2009-01-01

    Full Text Available Problem statement: Recently the impacts of climate change, in particular, sea level rise, had been a major concern for many Pacific island countries. In early 2000, there were a series of media coverage over sea level rise issues using Tuvalu as an example. The daily life of Tuvalu revolves around the ocean and the immediate threat on the islands people, economy, environment and its islands is of concern to the Tuvalu government. The Tuvalu government has concluded that Tuvalu was destined to become the first nation to be sunk by global warming because it is one of the smallest and lowest-lying countries in the world. Approach: In this study, sea level data from the Australian project will be focussed on despite the fact that the length of data is not sufficiently long. The AusAID funded South Pacific Sea Level and climate monitoring project was set up in response to concerns raised by Pacific island countries over the potential impacts of an enhanced greenhouse effect on climate and sea levels in the South Pacific for 20 years. Results: Based upon the 15½ years of sea level data from the project, the sea level rise rate in Tuvalu as at september 2008 was 5.9 mM year-1. This was about four times higher than the global average of 1-2 mm year-1. Sea level in the Tuvalu area had risen approximately 9.14 cm since the inception of the project 15½ years ago. However, it was to be noted that the land is quite stable and the rate of land sinking is -0.06 mM year-1 only. Accordingly, there was no significant impact on the sea level trends. Conclusion: Although the data length is just over 15 years, the sea level trend values do not fluctuate significantly since 1999. It simply indicated that the rate of sea level rise in the Tuvalu region was not accelerating as anticipated by the community.

  2. Acid Rain: The Silent Environmental Threat.

    Zmud, Mia

    1992-01-01

    Describes the silent environmental threat posed by acid rain. Caused mainly by manmade pollutants, acid rain damages water and trees, decreases visibility, corrodes monuments, and threatens public health. The article includes guidelines for action. (SM)

  3. Heat Waves Pose Big Health Threats

    ... https://medlineplus.gov/news/fullstory_159744.html Heat Waves Pose Big Health Threats Kids, elderly among those ... can be inherently dangerous, but the initial heat waves every summer can be particularly perilous to those ...

  4. Cyber Threats In Social Networking Websites

    Wajeb Ghari

    2012-02-01

    Full Text Available A social network is a social structure made up of individuals or organizations called nodes, which areconnected by one or more specific types of interdependency, such as friendship, common interest, and exchange of finance, relationships of beliefs, knowledge or prestige. A cyber threat can be both unintentional and intentional, targeted or non targeted, and it can come from a variety of sources, including foreign nations engaged in espionage and information warfare, criminals, hackers, virus writers, disgruntled employees and contractors working within an organization. Social networking sitesare not only to communicate or interact with other people globally, but also one effective way for business promotion. In this paper, we investigate and study the cyber threats in social networking websites. We go through the amassing history of online social websites, classify their types and also discuss the cyber threats, suggest the anti-threats strategies and visualize the future trends of such hoppy popular websites.

  5. Cyber threats in social networking websites

    Gharibi, Wajeb

    2012-01-01

    A social network is a social structure made up of individuals or organizations called nodes, which are connected by one or more specific types of interdependency, such as friendship, common interest, and exchange of finance, relationships of beliefs, knowledge or prestige. A cyber threat can be both unintentional and intentional, targeted or non targeted, and it can come from a variety of sources, including foreign nations engaged in espionage and information warfare, criminals, hackers, virus writers, disgruntled employees and contractors working within an organization. Social networking sites are not only to communicate or interact with other people globally, but also one effective way for business promotion. In this paper, we investigate and study the cyber threats in social networking websites. We go through the amassing history of online social websites, classify their types and also discuss the cyber threats, suggest the anti-threats strategies and visualize the future trends of such hoppy popular websi...

  6. Counter-terrorism threat prediction architecture

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  7. Accumulation and fluxes of mercury in terrestrial and aquatic food chains with special reference to Finland

    Martin Lodenius

    2013-03-01

    Full Text Available Mercury is known for its biomagnification especially in aquatic food chains and for its toxic effects on different organisms including man. In Finland mercury has formerly been used in industry and agriculture and in addition many anthropogenic activities may increase the mercury levels in ecosystems. Phenyl mercury was widely used as slimicide in the pulp and paper industry in the 1950s and 1960s. In the chlor-alkali industry metallic mercury was used as catalyst at three plants. The most toxic form of mercury, methyl mercury, may be formed in soils, water, sediments and organisms. Many factors, including microbial activity, temperature, oxygen status etc., affect the methylation rate. In the lake ecosystem bioaccumulation of methyl mercury is very strong. In early 1980s there was a restriction of fishing concerning approximately 4000 km2 of lakes and sea areas because of mercury pollution. In aquatic systems we still find elevated concentrations near former emission sources. Long-range atmospheric transport and mechanical operations like ditching and water regulation may cause increased levels of mercury in the aquatic ecosystems. In the Finnish agriculture organic mercury compounds were used for seed dressing until 1992. Although the amounts used were substantial the concentrations in agricultural soils have remained rather low. In terrestrial food chains bioaccumulation is normally weak with low or moderate concentration at all ecosystem levels. Due to a weak uptake through roots terrestrial, vascular plants normally contain only small amounts of mercury. There is a bidirectional exchange of mercury between vegetation and atmosphere. Contrary to vascular plants, there is a very wide range of concentrations in fungi. Mercury may pose a threat to human health especially when accumulated in aquatic food chains.

  8. Reducing stereotype threat by blurring intergroup boundaries.

    Rosenthal, H. E. S.; Crisp, R. J.

    2006-01-01

    The authors aimed to establish whether interventions designed to reduce intergroup bias could be applied to the stereotype threat domain. In three experiments, the hypothesis was tested that blurring intergroup boundaries would reduce stereotype threat. In the first study, it was found that female participants who thought about characteristics shared between the genders tended to show less preference for stereotypical female careers than did participants in the baseline condition. In. Experim...

  9. Stereotype Threat and the Student-Athlete

    Thomas S. Dee

    2009-01-01

    Achievement gaps may reflect the cognitive impairment thought to occur in evaluative settings (e.g., classrooms) where a stereotyped identity is salient (i.e., stereotype threat). This study presents an economic model of stereotype threat that reconciles prior evidence on how student effort and performance are influenced by this social-identity phenomenon. This study also presents empirical evidence from a laboratory experiment in which students at a selective college were randomly assigned t...

  10. Environmental Health: Threats and their Interactions

    Holdstock, Douglas

    2008-01-01

    Improvements in the provision of an acceptable standard of health care, particularly in the developing world, will be undermined by three ongoing processes: ongoing armed conflicts; the threat of global warming due to rising levels of greenhouse gases, particularly carbon dioxide emitted by developed countries; and by rapidly rising populations. The key features of these three threats are summarised, and it is shown that interactions between them increase both the likelihood of their occurren...

  11. Contemporary terrorism as a global threat

    Smolarek, Mirosław; Żuber, Marian

    2013-01-01

    Terrorism has been present in human history since ancient times, but it was not considered a serious threat for global security. The attacks on the World Trade Center have demonstrated that it is a threat of a global nature. It is an effective weapon used by the "weaker" against the stronger opponents. The subject of terrorism is very complex, difficult and elusive. There is a divergence among the scholars in understanding terrorism studies due to the lack of uniform criteria for the deter...

  12. WIRELESS NETWORKS: DEVELOPMENTS, THREATS AND COUNTERMEASURES

    Mardiana Mohamad Noor; Wan Haslina Hassan

    2013-01-01

    This paper discusses current threats in wireless networks and some academia research reviews regarding the matters. Significant and persistent threats discussed are sniffing, Man In the Middle Attack (MITM), Rogue Access Points (RAP), Denial Of Services (DoS) and social engineering attacks. Some current developments of wireless communication technology such as short range communication, cloud computing, bring your own device policy (BYOD), devices tethering and convergences of WiFi and cellul...

  13. Security Solutions against Computer Networks Threats

    Fatemeh Soleimani Roozbahani; Reihaneh Azad

    2015-01-01

    The spread of information networks in communities and organizations have led to a daily huge volume of information exchange between different networks which, of course, has resulted in new threats to the national organizations. It can be said that information security has become today one of the most challenging areas. In other words, defects and disadvantages of computer network security address irreparable damage for enterprises. Therefore, identification of security threats and ways of dea...

  14. Sniffing Threat and Practices in IPv6 Networks

    YI Xiushuang; WEN Zhankao; ZHANG Dengke

    2006-01-01

    The IPv4 protocol suite is vulnerable to a variety of attacks.IPv6 security is in many ways the same as IPv4 security, the basic mechanisms for transporting packets across the network stay mostly unchanged, and the upper-layer protocols that transport the actual application data are mostly unaffected.This paper illustrates sniffing threat against IPv4 and then compares how the threat might influence an IPv6 networks.This is prefaced by a brief overview of current practices around the design of an IPv4 Internet edge network and then followed by a review of how that IPv4 edge network needs to evolve in order to secure the addition of IPv6.As IPv6 security is a large and complex subject, and also, IPv6 network is still at the very beginning stage and has not been fully examined in fact, this paper focus on the security requirements of medium edge networks.

  15. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    The Florida manatee (Trichechus manatus latirostris) is an endangered marine mammal endemic to the southeastern United States. The primary threats to manatee populations are collisions with watercraft and the potential loss of warm-water refuges. For the purposes of listing, recovery, and regulation under the Endangered Species Act (ESA), an understanding of the relative effects of the principal threats is needed. This work is a quantitative approach to threats analysis, grounded in the assumption that an appropriate measure of status under the ESA is based on the risk of extinction, as quantified by the probability of quasi-extinction. This is related to the qualitative threats analyses that are more common under the ESA, but provides an additional level of rigor, objectivity, and integration. In this approach, our philosophy is that analysis of the five threat factors described in Section 4(a)(1) of the ESA can be undertaken within an integrated quantitative framework. The basis of this threats analysis is a comparative population viability analysis. This involves forecasting the Florida manatee population under different scenarios regarding the presence of threats, while accounting for process variation (environmental, demographic, and catastrophic stochasticity) as well as parametric and structural uncertainty. We used the manatee core biological model (CBM) for this viability analysis, and considered the role of five threats: watercraft-related mortality, loss of warm-water habitat in winter, mortality in water-control structures, entanglement, and red tide. All scenarios were run with an underlying parallel structure that allowed a more powerful estimation of the effects of the various threats. The results reflect our understanding of manatee ecology (as captured in the structure of the CBM), our estimates of manatee demography (as described by the parameters in the model), and our characterization of the mechanisms by which the threats act on manatees. As an

  16. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat. PMID:19245886

  17. Simulations for terrestrial planets formation

    2009-01-01

    In this paper,the formation of terrestrial planets in the late stage of planetary formation is investigated using the two-planet model.At that time,the protostar formed for about 3 Ma and the gas disk dissipated.In the model,the perturbations from Jupiter and Saturn are considered.Variations of the mass of outer planet,and the initial eccentricities and inclinations of embryos and planetesimals are also considered.Our results show that,terrestrial planets are formed in 50 Ma,and the accretion rate is about 60%-80%.In each simulation,3-4 terrestrial planets are formed inside"Jupiter"with masses of 0.15 -3.6M⊕.In the 0.5-4 AU,when the eccentricities of planetesimals are excited,planetesimals are able to accrete material from wide radial direction.The plenty of water material of the terrestrial planet in the Habitable Zone may be transferred from the farther places by this mechanism.Accretion could also happen a few times between two major planets only if the outer planet has a moderate mass and the small terrestrial planet could survive at some resonances over time scale of 10 8 a.In one of our simulations,commensurability of the orbital periods of planets is very common.Moreover,a librating-circulating 3:2 configuration of mean motion resonance is found.

  18. Simulations for terrestrial planets formation

    ZHANG Niu; JI JiangHui

    2009-01-01

    In this paper, the formation of terrestrial planets in the late stage of planetary formation is Investigated using the two-planet model. At that time, the protostar formed for about 3 Ma and the gas disk dissipated. In the model, the perturbations from Jupiter and Saturn are considered. Variations of the mass of outer planet, and the initial eccentricities and inclinations of embryos and planetesimals are also considered. Our results show that, terrestrial planets are formed in 50 Ma, and the accretion rate is about 60%-80%. In each simulation, 3-4 terrestrial planets are formed inside "Jupiter" with masses of 0.15-3.6 M(⊙). In the 0.5-4 AU, when the eccentricities of planetesimals are excited, planetesimals are able to accrete material from wide radial direction. The plenty of water material of the terrestrial planet in the Habitable Zone may be transferred from the farther places by this mechanism. Accretion could also happen a few times between two major planets only if the outer planet has a moderate mass and the small terrestrial planet could survive at some resonances over time scale of 108a. In one of our simulations, commensurability of the orbital periods of planets is very common. Moreover, a librating-circulating 3:2 configuration of mean motion resonance is found.

  19. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    Carels, Robert A.; Domoff, Sarah E.; Burmeister, Jacob M; Koball, Afton M.; Hinman, Nova G.; Davis, Alan K.; Oehlhof, Marissa Wagner; LeRoy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    Objective The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method 216 adults completed an online survey. Participants’ mean age was 2...

  20. Study on a Threat-Countermeasure Model Based on International Standard Information

    Guillermo Horacio Ramirez Caceres

    2008-12-01

    Full Text Available Many international standards exist in the field of IT security. This research is based on the ISO/IEC 15408, 15446, 19791, 13335 and 17799 standards. In this paper, we propose a knowledge base comprising a threat countermeasure model based on international standards for identifying and specifying threats which affect IT environments. In addition, the proposed knowledge base system aims at fusing similar security control policies and objectives in order to create effective security guidelines for specific IT environments. As a result, a knowledge base of security objectives was developed on the basis of the relationships inside the standards as well as the relationships between different standards. In addition, a web application was developed which displays details about the most common threats to information systems, and for each threat presents a set of related security control policies from different international standards, including ISO/IEC 27002.

  1. Anomaly metrics to differentiate threat sources from benign sources in primary vehicle screening.

    Cohen, Israel Dov; Mengesha, Wondwosen

    2011-09-01

    Discrimination of benign sources from threat sources at Port of Entries (POE) is of a great importance in efficient screening of cargo and vehicles using Radiation Portal Monitors (RPM). Currently RPM's ability to distinguish these radiological sources is seriously hampered by the energy resolution of the deployed RPMs. As naturally occurring radioactive materials (NORM) are ubiquitous in commerce, false alarms are problematic as they require additional resources in secondary inspection in addition to impacts on commerce. To increase the sensitivity of such detection systems without increasing false alarm rates, alarm metrics need to incorporate the ability to distinguish benign and threat sources. Principal component analysis (PCA) and clustering technique were implemented in the present study. Such techniques were investigated for their potential to lower false alarm rates and/or increase sensitivity to weaker threat sources without loss of specificity. Results of the investigation demonstrated improved sensitivity and specificity in discriminating benign sources from threat sources.

  2. Identifying serotonergic mechanisms underlying the corticolimbic response to threat in humans

    Fisher, Patrick M; Hariri, Ahmad R

    2013-01-01

    A corticolimbic circuit including the amygdala and medial prefrontal cortex (mPFC) plays an important role in regulating sensitivity to threat, which is heightened in mood and anxiety disorders. Serotonin is a potent neuromodulator of this circuit; however, specific serotonergic mechanisms......-dependent functional magnetic resonance imaging. This multi-modal neuroimaging strategy can be integrated with additional techniques including imaging genetics and pharmacological challenge paradigms to more clearly understand how serotonin signalling modulates neural pathways underlying sensitivity to threat...

  3. Priapism caused by 'Tribulus terrestris'.

    Campanelli, M; De Thomasis, R; Tenaglia, R L

    2016-01-01

    A 36-year-old Caucasian man was diagnosed with a 72-h-lasting priapism that occurred after the assumption of a Herbal supplement based on Tribulus terrestris, which is becoming increasingly popular for the treatment of sexual dysfunction. The patient underwent a cavernoglandular shunt (Ebbehoj shunt) in order to obtain complete detumescence, from which derived negative post-episode outcomes on sexual function. All patients consuming non-FDA-approved alternative supplements such as Tribulus terrestris should be warned about the possible serious side effects. PMID:26631925

  4. 77 FR 62139 - Authorizing the Implementation of Certain Sanctions Set Forth in the Iran Threat Reduction and...

    2012-10-12

    ... From the Federal Register Online via the Government Publishing Office TD12OC12.013 [FR Doc. 2012... Threat Reduction and Syria Human Rights Act of 2012 and Additional Sanctions With Respect to Iran By the... (Public Law 111-195) (22 U.S.C. 8501 et seq.), as amended (CISADA), the Iran Threat Reduction and...

  5. Additivity dominance

    Paul Rozin

    2009-10-01

    Full Text Available Judgments of naturalness of foods tend to be more influenced by the process history of a food, rather than its actual constituents. Two types of processing of a ``natural'' food are to add something or to remove something. We report in this study, based on a large random sample of individuals from six countries (France, Germany, Italy, Switzerland, UK and USA that additives are considered defining features of what makes a food not natural, whereas ``subtractives'' are almost never mentioned. In support of this, skim milk (with major subtraction of fat is rated as more natural than whole milk with a small amount of natural vitamin D added. It is also noted that ``additives'' is a common word, with a synonym reported by a native speaker in 17 of 18 languages, whereas ``subtractive'' is lexicalized in only 1 of the 18 languages. We consider reasons for additivity dominance, relating it to omission bias, feature positive bias, and notions of purity.

  6. Impact of an interactive anti-speeding threat appeal: how much threat is too much?

    Panić, Katarina; Cauberghe, Verolien; De Pelsmacker, Patrick

    2011-05-01

    This study investigates the impact of an interactive television public-service announcement (PSA) containing an anti-speeding threat appeal on feelings of telepresence and behavioral intention. In a 2 × 2 × 2 between-subjects factorial design with 213 participants, the level of threat evoked by a traditional PSA, by the interactive part of the PSA (dedicated advertising location or DAL) and by the preceding program context are manipulated to be either low or high. The results support the assumptions of the Extended Parallel Processing Model with regard to the effect of the level of perceived threat and perceived efficacy in an interactive media environment, and the important role of telepresence as a processing variable. The results of the three-way interaction effect of threat evoked by the program, the PSA and the DAL on telepresence show that when the threat levels of the program and the PSA are both either low or high, exposure to the threatening information in the DAL does not generate a significantly higher feeling of telepresence. However, when a low-threat program is followed by a high-threat PSA, the threat level of the DAL has a positive effect on telepresence. The same trend is found with a high-threat program and a low-threat PSA, although the effect of the threat evoked by the DAL on telepresence is not significant at conventional levels. Finally, there is a positive effect of telepresence on the behavioral intention to reduce speeding, which is partly mediated by the viewer's perceived efficacy to follow the recommended behavior. PMID:21204691

  7. Chemical-Sensing Cables Detect Potential Threats

    2007-01-01

    Intelligent Optical Systems Inc. (IOS) completed Phase I and II Small Business Innovation Research (SBIR) contracts with NASA's Langley Research Center to develop moisture- and pH-sensitive sensors to detect corrosion or pre-corrosive conditions, warning of potentially dangerous conditions before significant structural damage occurs. This new type of sensor uses a specially manufactured optical fiber whose entire length is chemically sensitive, changing color in response to contact with its target, and demonstrated to detect potentially corrosive moisture incursions to within 2 cm. After completing the work with NASA, the company received a Defense Advanced Research Projects Agency (DARPA) Phase III SBIR to develop the sensors further for detecting chemical warfare agents, for which they proved just as successful. The company then worked with the U.S. Department of Defense (DoD) to fine tune the sensors for detecting potential threats, such as toxic industrial compounds and nerve agents. In addition to the work with government agencies, Intelligent Optical Systems has sold the chemically sensitive fiber optic cables to major automotive and aerospace companies, who are finding a variety of uses for the devices. Marketed under the brand name Distributed Intrinsic Chemical Agent Sensing and Transmission (DICAST), these unique continuous-cable fiber optic chemical sensors can serve in a variety of applications: Corrosive-condition monitoring, aiding experimentation with nontraditional power sources, as an economical means of detecting chemical release in large facilities, as an inexpensive "alarm" systems to alert the user to a change in the chemical environment anywhere along the cable, or in distance-resolved optical time domain reflectometry systems to provide detailed profiles of chemical concentration versus length.

  8. Reproductive disturbance of Japanese bumblebees by the introduced European bumblebee Bombus terrestris

    Kondo, Natsuko Ito; Yamanaka, Daisei; Kanbe, Yuya; Kunitake, Yoko Kawate; Yoneda, Masahiro; Tsuchida, Koji; Goka, Koichi

    2009-04-01

    The European bumblebee, Bombus terrestris, is an invasive eusocial species whose distribution is expanding greatly beyond its native range because numerous colonies are imported to or locally produced in non-native countries for pollination of agricultural crops. Closely related species exist in Japan where the unrestricted import and use of B. terrestris has resulted in the establishment of wild colonies. Laboratory studies previously showed that B. terrestris and Japanese native species can copulate and produce fertilized eggs. Although these eggs do not hatch, the interspecific mating can cause a serious reproductive disturbance to native bumblebees. In this study, we determined the frequencies of interspecies mating between B. terrestris males and native bumblebee queens in the wild on the islands of Hokkaido and Honshu by analyzing the DNA sequences of spermatozoa stored in spermathecae of native queens. We found that 20.2% of B. hypocrita hypocrita queens and 30.2% of B. hypocrita sapporoensis queens had spermatozoa of B. terrestris males in their spermathecae. Given that a Bombus queen generally mates only once in her life, such high frequencies of interspecific mating with B. terrestris pose serious threats to the populations of native bumblebees in Japan.

  9. Ready and waiting: Freezing as active action preparation under threat.

    Gladwin, Thomas E; Hashemi, Mahur M; van Ast, Vanessa; Roelofs, Karin

    2016-04-21

    Freezing is a defensive response characterized by rigidity and bradycardia, but it is unclear whether it is a passive versus active preparatory state. We developed a shooting task in which preparation and threat were manipulated independently: Participants were either helpless or able to respond to a possible upcoming attack, and attacks were either associated with an electric shock or not. Essentially, a purely anticipatory preparatory period was used during which no stimuli occurred. Freezing was assessed during this period. In addition to heart rate, body sway was measured, using a stabilometric force platform. The efficacy of the threat manipulation was confirmed via self-report. The ability to prepare led to decreases in heart rate and postural sway, while threat led to decreased heart rate. Further, exploratory analyses suggested that aggressive participants showed reduced initial freezing for threatening opponents, but increased postural freezing when armed. The results suggest that freezing may involve active preparation. Relations to results in passive viewing tasks are discussed. PMID:26994781

  10. Assessing the potential threat landscape of a proposed reintroduction site for carnivores.

    Samantha K Page

    Full Text Available This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent's first language (isiXhosa had more positive indices, education level (poorer education was synonymous with more positive threat indices, land use (wildlife ranching being the most negative and land tenure (community respondents had more positive indices than private landowners. Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid.

  11. Assessing the potential threat landscape of a proposed reintroduction site for carnivores.

    Page, Samantha K; Parker, Daniel M; Peinke, Dean M; Davies-Mostert, Harriet T

    2015-01-01

    This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus) as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent's first language (isiXhosa had more positive indices), education level (poorer education was synonymous with more positive threat indices), land use (wildlife ranching being the most negative) and land tenure (community respondents had more positive indices than private landowners). Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid. PMID:25822468

  12. Threat navigator: grouping and ranking malicious external threats to current and future urban smart grids

    Vasenev, Alexandr; Montoya, Lorena; Ceccarelli, Andrea; Le, Anhtuan; Ionita, Dan

    2016-01-01

    Deriving value judgements about threat rankings for large and entangled systems, such as those of urban smart grids, is a challenging task. Suitable approaches should account for multiple threat events posed by different classes of attackers who target system components. Given the complexity of the

  13. Paleoenvironmental reconstruction using microfossils : terrestrial

    The following section provides a brief summary of the use of pollen and chironomids in terrestrial paleoenvironmental reconstruction and lists some key references and general text addressing the history, methods and development of these techniques in Quaternary paleoclimate research and their application in New Zealand. (author). 52 refs., 8 figs

  14. 49 CFR 1544.303 - Bomb or air piracy threats.

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight... upon receiving information that an act or suspected act of air piracy has been committed, the...

  15. 49 CFR 1546.301 - Bomb or air piracy threats.

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  16. 49 CFR 1540.203 - Security threat assessment.

    2010-10-01

    ... check conducted by TSA. (2) A security threat assessment conducted under 49 CFR part 1572 for the... 49 Transportation 9 2010-10-01 2010-10-01 false Security threat assessment. 1540.203 Section 1540... Security Threat Assessments § 1540.203 Security threat assessment. (a) Each operator subject to...

  17. 49 CFR 1572.5 - Standards for security threat assessments.

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Standards for security threat assessments. 1572.5... CREDENTIALING AND SECURITY THREAT ASSESSMENTS Procedures and General Standards § 1572.5 Standards for security threat assessments. (a) Standards. TSA determines that an applicant poses a security threat...

  18. 49 CFR 1540.209 - Fees for security threat assessment.

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Fees for security threat assessment. 1540.209...: GENERAL RULES Security Threat Assessments § 1540.209 Fees for security threat assessment. This section describes the payment process for completion of the security threat assessments required under subpart....

  19. Satellite Threat Warning and Attack Reporting

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  20. On the special status of "ego threats".

    Schotte, D E

    1992-05-01

    This article comments on a recent article by Heatherton, Herman, and Polivy (1991) in which they suggest that ego threats are a prerequisite to affectively induced disinhibition of food intake in restrained eaters and current dieters. In contrast, the present review suggests that mood induction procedures that involve no apparent threat (e.g., viewing a frightening film) can also prompt disinhibition in restrained eaters. Thus, any mood induction procedure that does not directly physically threaten the S may disinhibit restrained eaters. It is concluded that recommendations to focus future research on ego threats are premature and may serve to obscure the mechanisms by which changes in affective state influence food intake in dieters. PMID:1507070

  1. Left-Wing Extremism: The Current Threat

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  2. The Range of Threats against Israel

    Yaakov Amidror

    2010-06-01

    Full Text Available This essay focuses primarily on the threats against the State of Israel and touches little on the responses to these threats. Over the last sixty years, the threats Israel has been forced to tackle have assumed different emphases, but the fundamental principle for understanding them has not changed, namely: the world around us, the Arab world, most of the Muslim world – not necessarily “most” in the numerical-statistical terms, but in terms of those determining the outlook of that world – does not consent to the existence of an independent, sovereign Jewish state in the heart of the Middle East and will do whatever it takes to destroy it.

  3. Additivity dominance

    Paul Rozin; Claude Fischler; Christy Shields-Argeles

    2009-01-01

    Judgments of naturalness of foods tend to be more influenced by the process history of a food, rather than its actual constituents. Two types of processing of a ``natural'' food are to add something or to remove something. We report in this study, based on a large random sample of individuals from six countries (France, Germany, Italy, Switzerland, UK and USA) that additives are considered defining features of what makes a food not natural, whereas ``subtractives'' are almost never mentioned....

  4. GLOBAL WARMING: IS A NEW THREAT?

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  5. Terrorism: the threat of a radiological device

    Full text: This paper will discuss terrorism from the perspective of a terrorist organization building and detonating a 'dirty bomb' with a radiological component. The paper will discuss how such devices are made and how security of radiological material world wide will minimize the risk of such devices being used. It will discuss the threat assessments against nuclear waste processing and storage sites, threats to nuclear plants and other sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device be detonated. (author)

  6. Bio-Terrorism Threat and Casualty Prevention

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  7. The role of warning behaviors in threat assessment: an exploration and suggested typology.

    Reid Meloy, J; Hoffmann, Jens; Guldimann, Angela; James, David

    2012-01-01

    The concept of warning behaviors offers an additional perspective in threat assessment. Warning behaviors are acts which constitute evidence of increasing or accelerating risk. They are acute, dynamic, and particularly toxic changes in patterns of behavior which may aid in structuring a professional's judgment that an individual of concern now poses a threat - whether the actual target has been identified or not. They require an operational response. A typology of eight warning behaviors for assessing the threat of intended violence is proposed: pathway, fixation, identification, novel aggression, energy burst, leakage, directly communicated threat, and last resort warning behaviors. Previous research on risk factors associated with such warning behaviors is reviewed, and examples of each warning behavior from various intended violence cases are presented, including public figure assassination, adolescent and adult mass murder, corporate celebrity stalking, and both domestic and foreign acts of terrorism. Practical applications and future research into warning behaviors are suggested. PMID:22556034

  8. Learning to smell danger: acquired associative representation of threat in the olfactory cortex.

    Li, Wen

    2014-01-01

    Neuroscience research over the past few decades has reached a strong consensus that the amygdala plays a key role in emotion processing. However, many questions remain unanswered, especially concerning emotion perception. Based on mnemonic theories of olfactory perception and in light of the highly associative nature of olfactory cortical processing, here I propose a sensory cortical model of olfactory threat perception (i.e., sensory-cortex-based threat perception): the olfactory cortex stores threat codes as acquired associative representations (AARs) formed via aversive life experiences, thereby enabling encoding of threat cues during sensory processing. Rodent and human research in olfactory aversive conditioning was reviewed, indicating learning-induced plasticity in the amygdala and the olfactory piriform cortex. In addition, as aversive learning becomes consolidated in the amygdala, the associative olfactory (piriform) cortex may undergo (long-term) plastic changes, resulting in modified neural response patterns that underpin threat AARs. This proposal thus brings forward a sensory cortical pathway to threat processing (in addition to amygdala-based processes), potentially accounting for an alternative mechanism underlying the pathophysiology of anxiety and depression. PMID:24778610

  9. The Threat to Religious Liberties and the European Institutions

    Roger Kiska

    2011-07-01

    Full Text Available The following article analyzes the 3 chief threats facing religious liberty today in Europe, namely: (1 hate speech legislation; (2 anti-discrimination laws; (3 attacks on parental rights. Concrete examples are given of offenses to religious freedom. Additionally, the black letter law is set out in each section with suggested action points for national governments. The Article also discusses the Lautsi v. Italy judgment of the European Court of Human Rights, explaining its importance and using it as evidence to establish the political nature of the Strasbourg based court.

  10. Threat displays for final approach

    Jennings, Chad Warren

    During periods of good visibility, airports can conduct Closely Spaced Parallel Approaches (CSPA) and simultaneously operate parallel runways separated by more than 750 feet. When visibility degrades to Instrument Meteorological Conditions (IMC) and pilots must fly exclusively by the instruments, the runway separation required to operate parallel runways increases to 3400 feet or more. For many airports around the country and the world this means the second runway must be closed and the airport operates at half capacity. To alleviate the delays caused by this capacity reduction many airports worldwide are planning to expand and build new runways. The projected cost of the ten largest airport projects in the United States is $8-16 Billion. Perhaps a less expensive solution can be found with innovative technology rather than real estate? This research presents the first ever design, implementation, and characterization of a synthetic vision display and the supporting flight system to attempt to achieve this solution. The display uses 3D graphics and an air to air datalink called Automatic Dependent Surveillance--Broadcast to present the pilot with the information necessary to aviate, navigate and monitor traffic. This thesis also documents the first series of flight experiments to test the applicability of synthetic vision displays to both runway incursion avoidance and CSPA. Finally, utilizing the results from the flight testing in a Monte Carlo analysis, the effect of deploying this display on minimum safe runway separation is calculated. It has been found that the minimum safe runway separation for IMC operation can safely be reduced to 1900 feet. If, in addition, significant changes are made in Air Traffic Control procedures for longitudinal aircraft spacing, the analysis shows that the display system presented herein will allow for runway separation of 1400 feet with no new restrictions on aircraft size or crosswind. Furthermore, with certain restrictions on

  11. Threats and Vulnerabilities of RFID and Beyond

    Hoepman, J.H.; Veugen, P.J.M.

    2009-01-01

    This chapter discusses both security and privacy threats to RFID systems, in a balanced way. We first outline the general architecture of an RFID system, the stakeholders managing the different components, and identify the specific properties of RFID systems relevant for privacy and security. We the

  12. The Missing Piece in Threat Intelligence

    Frank Denis

    2016-03-01

    Full Text Available Common systems for sharing intelligence on security threats have not been designed to efficiently process feedback from infrastructure providers. In order to fill this gap, we introduce DIP, a new description language to expose changes being made on a network that are relevant to security research and prevention.

  13. Global threat to agriculture from invasive species

    Paini, Dean R.; Sheppard, Andy W.; Cook, David C.; De Barro, Paul J.; Worner, Susan P.; Thomas, Matthew B.

    2016-01-01

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread. PMID:27325781

  14. Global threat to agriculture from invasive species.

    Paini, Dean R; Sheppard, Andy W; Cook, David C; De Barro, Paul J; Worner, Susan P; Thomas, Matthew B

    2016-07-01

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread. PMID:27325781

  15. Diversity, Racial Threat and Metropolitan Housing Segregation

    DeFina, Robert; Hannon, Lance

    2009-01-01

    Previous studies have shown that as the percent black or percent Hispanic grows, that group's residential segregation from whites tends to increase as well. Typically, these findings are explained in terms of white discriminatory reaction to the perceived threat associated with minority population growth. The present analysis examines whether…

  16. Reemerging Threat of Epidemic Typhus in Algeria

    Mokrani, K.; Fournier, P E; Dalichaouche, M.; Tebbal, S.; Aouati, A.; Raoult, D

    2004-01-01

    We report a case of epidemic typhus in a patient from the Batna region of Algeria, who presented with generalized febrile exanthema. The clinical diagnosis was confirmed by serological cross-adsorption followed by Western blotting. Our report emphasizes the threat of epidemic typhus in the highlands of Algeria.

  17. Extensible threat taxonomy for critical infrastructures

    Luiijf, H.A.M.; Nieuwenhuijs, A.H.

    2008-01-01

    The European Union-sponsored project Vital Infrastructure Threats and Assurance (VITA) has the objective of exploring and showing new paths in Critical Infrastructure Protection (CIP) R&D. This paper describes one of VITA’s results: the idea and the development of a novel extensible and generic thre

  18. After Heart Attack, New Threat: Heart Failure

    ... nih.gov/medlineplus/news/fullstory_159007.html After Heart Attack, New Threat: Heart Failure 1 in 4 survivors develops this serious ... TUESDAY, May 24, 2016 (HealthDay News) -- Risk of heart failure appears high within a few years of ...

  19. Threats and countermeasures for network security

    Denning, Peter J.

    1991-01-01

    In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented.

  20. Miocene Antarctic Terrestrial Realm

    Ashworth, A. C.; Lewis, A.; Marchant, D. R.

    2009-12-01

    The discovery of several locations in the Transantarctic Mountains that contain macrofossils and pollen is transforming our understanding of late Cenozoic Antarctica. The most southerly location is on the Beardmore Glacier (85.1°S) about 500 km from the South Pole. The environment was an active glacial margin in which plants, insects and freshwater mollusks inhabited the sand and gravel bars and small lakes on an outwash plain. In addition to leaves and wood of dwarf Nothofagus (Southern Beech) shrubs, achenes of Ranunculus (Buttercup), in situ cushion growth forms of mosses and a vascular plant, the assemblages contains various exoskeletal parts of carabid and curculionid beetles and a cyclorrhaphan fly, the shells of freshwater bivalve and gastropod species and a fish tooth. Initially the deposits were assigned a Pliocene age (3.5 Ma) but a mid- to early Miocene age is more probable (c. 14 - 25 Ma) based on correlation of fossil pollen from the deposits with 39Ar/40Ar dated pollen assemblages from the McMurdo Dry Valleys locations. The oldest location within the Dry Valleys also involved an active ice margin but was part of a valley system that was completely deglaciated for intervals long enough for thick paleosols to develop. The Friis Hills fossil deposits of the Taylor Valley region (77.8°S) are at least 19.76 Ma based on the 39Ar/40Ar age of a volcanic ash bed. The valley floor during the non-glacial phases had poorly-drained soils and the extensive development of mossy mires. Wood and leaves of Nothofagus are abundant in lacustrine deposits. The silts of shallow fluvial channels contain abundant megaspores and spiky leaves of the aquatic lycopod Isoetes (Quillwort). Fossils of beetles are also present in these deposits. During the glacial phases, proglacial lakes were surrounded by dwarfed, deciduous Nothofagus shrubs. The youngest fossils recovered from the Dry Valleys are from the Olympus Range (77.5°S) with an age of 14.07 Ma. The environment was an

  1. The concept of risk in the design basis threat

    . Secondly, it allows us to categorise consequences. Where the consequences would be less serious, a higher probability can be allowed before protection becomes necessary. For those consequences that would be severe, strong protective measures are justified because we have eliminated the zero probabilities. Furthermore, the protective measures can be specifically focussed to reduce those probabilities to a tolerable, near zero, level. The presentation discusses the relationship between risk assessment, threat assessment, and the Design Basis Threat. The paper argues that criteria-based judgement at the level of Regulator is just as responsive to circumstances as criteria-based judgement at the facilities level, and, in addition, offers a more coherent method for determining priorities and for considering intangible assets at risk. (author)

  2. Insider Threat - Material Control and Accountability Mitigation

    Powell, Danny H [ORNL; Elwood Jr, Robert H [ORNL; Roche, Charles T [ORNL

    2011-01-01

    The technical objectives of nuclear safeguards are (1) the timely detection of diversion of significant quantities of nuclear material from peaceful uses to the manufacture of nuclear weapons or other nuclear explosive devices or for purposes unknown and (2) the deterrence of such diversion by the risk of early detection. The safeguards and security program must address both outsider threats and insider threats. Outsider threats are primarily addressed by the physical protection system. Insider threats can be any level of personnel at the site including passive or active insiders that could attempt protracted or abrupt diversion. This could occur by an individual acting alone or by collusion between an individual with material control and accountability (MC&A) responsibilities and another individual who has responsibility or control within both the physical protection and the MC&A systems. The insider threat is one that must be understood and incorporated into the safeguards posture. There have been more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. The insider has access, authority, and knowledge, as well as a set of attributes, that make him/her difficult to detect. An integrated safeguards program is designed as a defense-in-depth system that seeks to prevent the unauthorized removal of nuclear material, to provide early detection of any unauthorized attempt to remove nuclear material, and to rapidly respond to any attempted removal of nuclear material. The program is also designed to support protection against sabotage, espionage, unauthorized access, compromise, and other hostile acts that may cause unacceptable adverse impacts on national security, program continuity, the health and safety of employees, the public, or the environment. Nuclear MC&A play an essential role in the capabilities of an integrated safeguards system to deter and detect theft or diversion of nuclear material. An integrated safeguards system with

  3. Transplant rejection in terrestrial molluscs

    E Furuta; Yamaguchi, K

    2011-01-01

    To know whether or not molluscs are capable of recognizing tissue allo-antigens, dorsal skin-allografts were exchanged between adult terrestrial slug, Incilaria fruhstorferi. We succeeded for the first time in orthotopic transplantation of allografts and observed chronic rejection of allografts. Cellular changes in the rejection process continued over for 40 days. Two functional types of “effector” cells were recognized at the rejection site, but they were observed to be macrophages possessin...

  4. Phytopharmacological overview of Tribulus terrestris

    Saurabh Chhatre; Tanuja Nesari; Gauresh Somani; Divya Kanchan; Sadhana Sathaye

    2014-01-01

    Tribulus terrestris (family Zygophyllaceae), commonly known as Gokshur or Gokharu or puncture vine, has been used for a long time in both the Indian and Chinese systems of medicine for treatment of various kinds of diseases. Its various parts contain a variety of chemical constituents which are medicinally important, such as flavonoids, flavonol glycosides, steroidal saponins, and alkaloids. It has diuretic, aphrodisiac, antiurolithic, immunomodulatory, antidiabetic, absorption enhancing, hyp...

  5. Terrestrial atmosphere, water and astrobiology

    Coradini M.; Brack A.

    2010-01-01

    Primitive life, defined as a chemical system capable to transfer its molecular information via self-replication and also capable to evolve, originated about 4 billion years ago from the processing of organic molecules by liquid water. Terrestrial atmosphere played a key role in the process by allowing the permanent presence of liquid water and by participating in the production of carbon-based molecules. Water molecules exhibit specific properties mainly due to a dense network of hydrogen bon...

  6. NASA's Terrestrial Planet Finder Missions

    Coulter, Daniel R.

    2004-01-01

    NASA has decided to move forward with two complementary Terrestrial Planet Finder (TPF) missions, a visible coronagraph and an infrared formation flying interferometer. These missions are major missions in the NASA Office of Space Science Origins Theme. The primary science objectives of the TPF missions are to search for, detect, and characterize planets and planetary systems beyond our own Solar System, including specifically Earth-like planets.

  7. Sexual harassment under social identity threat: the computer harassment paradigm.

    Maass, Anne; Cadinu, Mara; Guarnieri, Gaia; Grasselli, Annalisa

    2003-11-01

    Two laboratory experiments investigated the hypothesis that threat to male identity would increase the likelihood of gender harassment. In both experiments, using the computer harassment paradigm, male university students (N=80 in Experiment 1, N=90 in Experiment 2) were exposed to different types of identity threat (legitimacy threat and threat to group value in Experiment 1 and distinctiveness threat and prototypicality threat in Experiment 2) or to no threat and were then given the opportunity to send pornographic material to a virtual female interaction partner. Results show that (a) participants harassed the female interaction partner more when they were exposed to a legitimacy, distinctiveness, or prototypicality threat than to no threat; (b) this was mainly true for highly identified males; and (c) harassment enhanced postexperimental gender identification. Results are interpreted as supporting a social identity account of gender harassment. PMID:14599249

  8. Ontogenetic shifts in terrestrial reliance of stream-dwelling brown trout

    Javier Sánchez-Hernández

    2016-07-01

    Full Text Available This study focuses on terrestrial reliance of brown trout (Salmo trutta and compared it to the potential prey available (macrozoobenthos and drifting invertebrates in three temperate rivers (Galicia, NW Spain, with special emphasis on variations in terrestrial energy intake through the ontogeny of brown trout. Additionally, we paid particular attention to individual variation of terrestrial resource use within and between age classes. Prey items were grouped in four categories: i aquatic invertebrates; ii imagoes of aquatic invertebrates; iii terrestrial invertebrates; and iv fish prey. Next, energy composition was measured according to dry weight-energy equations for each individual in line with above-mentioned prey categories. Our findings illustrate that terrestrial invertebrates appeared to be scarce in the environment, whereas aquatic food resources were rather abundant and accessible. The use of terrestrial invertebrates tended to increase with age, but with a high degree of inter-individual variation in resource use. In fact, the individual reliance of brown trout on terrestrial invertebrates may vary considerably (between 0% and 76.9%. Besides, the frequency of terrestrial foragers, i.e., individuals with terrestrial invertebrates in their stomachs, increased with age, except in one population which had the maximum value in the age-2 class. The acquisition of terrestrial invertebrates thus appears to be a process strongly dependent upon the actual food availability in the environment, but with a high degree of individual variance in resource use within the same age class. Finally, we discuss that terrestrial invertebrates may largely contribute to cover the energy intake of the species, highlighting the interface between terrestrial and aquatic ecosystems, and thereby the importance of riparian canopy cover as a key factor for food supply of stream-dwelling salmonids species.

  9. Arsenic Speciation of Terrestrial Invertebrates

    Moriarty, M.M.; Koch, I.; Gordon, R.A.; Reimer, K.J. ((Simon)); ((Royal))

    2009-07-01

    The distribution and chemical form (speciation) of arsenic in terrestrial food chains determines both the amount of arsenic available to higher organisms, and the toxicity of this metalloid in affected ecosystems. Invertebrates are part of complex terrestrial food webs. This paper provides arsenic concentrations and arsenic speciation profiles for eight orders of terrestrial invertebrates collected at three historical gold mine sites and one background site in Nova Scotia, Canada. Total arsenic concentrations, determined by inductively coupled plasma mass spectrometry (ICP-MS), were dependent upon the classification of invertebrate. Arsenic species were determined by high-performance liquid chromatography (HPLC) ICP-MS and X-ray absorption spectroscopy (XAS). Invertebrates were found by HPLC ICP-MS to contain predominantly arsenite and arsenate in methanol/water extracts, while XAS revealed that most arsenic is bound to sulfur in vivo. Examination of the spatial distribution of arsenic within an ant tissue highlighted the differences between exogenous and endogenous arsenic, as well as the extent to which arsenic is transformed upon ingestion. Similar arsenic speciation patterns for invertebrate groups were observed across sites. Trace amounts of arsenobetaine and arsenocholine were identified in slugs, ants, and spiders.

  10. Spatial Vision in Bombus terrestris.

    Chakravarthi, Aravin; Baird, Emily; Dacke, Marie; Kelber, Almut

    2016-01-01

    Bombus terrestris is one of the most commonly used insect models to investigate visually guided behavior and spatial vision in particular. Two fundamental measures of spatial vision are spatial resolution and contrast sensitivity. In this study, we report the threshold of spatial resolution in B. terrestris and characterize the contrast sensitivity function of the bumblebee visual system for a dual choice discrimination task. We trained bumblebees in a Y-maze experimental set-up to associate a vertical sinusoidal grating with a sucrose reward, and a horizontal grating with absence of a reward. Using a logistic psychometric function, we estimated a resolution threshold of 0.21 cycles deg(-1) of visual angle. This resolution is in the same range but slightly lower than that found in honeybees (Apis mellifera and A. cerana) and another bumblebee species (B. impatiens). We also found that the contrast sensitivity of B. terrestris was 1.57 for the spatial frequency 0.090 cycles deg(-1) and 1.26 for 0.18 cycles deg(-1). PMID:26912998

  11. Spatial vision in Bombus terrestris

    Aravin eChakravarthi

    2016-02-01

    Full Text Available Bombus terrestris is one of the most commonly used insect models to investigate visually guided behavior and spatial vision in particular. Two fundamental measures of spatial vision are spatial resolution and contrast sensitivity. In this study, we report the threshold of spatial resolution in B. terrestris and characterize the contrast sensitivity function of the bumblebee visual system for a dual choice discrimination task. We trained bumblebees in a Y-maze experimental set-up to associate a vertical sinusoidal grating with a sucrose reward, and a horizontal grating with absence of a reward. Using a logistic psychometric function, we estimated a resolution threshold of 0.21 cycles deg-1 of visual angle. This resolution is in the same range but slightly lower than that found in honeybees (Apis mellifera and A. cerana and another bumblebee species (B. impatiens. We also found that the contrast sensitivity of B. terrestris was 1.57 for the spatial frequency 0.09 cycles deg-1 and 1.26. for 0.18 cycles deg-1.

  12. A threat in the computer: the race implicit association test as a stereotype threat experience.

    Frantz, Cynthia M; Cuddy, Amy J C; Burnett, Molly; Ray, Heidi; Hart, Allen

    2004-12-01

    Three experiments test whether the threat of appearing racist leads White participants to perform worse on the race Implicit Association Test (IAT) and whether self-affirmation can protect from this threat. Experiments 1 and 2 suggest that White participants show a stereotype threat effect when completing the race IAT, leading to stronger pro-White scores when the test is believed to be diagnostic of racism. This effect increases for domain-identified (highly motivated to control prejudice) participants (Experiment 2). In Experiment 3, self-affirmation inoculates participants against stereotype threat while taking the race IAT. These findings have methodological implications for use of the race IAT and theoretical implications concerning the malleability of automatic prejudice and the potential interpersonal effects of the fear of appearing racist. PMID:15536243

  13. Promoting dental hygiene to children: comparing traditional and interactive media following threat appeals.

    Panic, Katarina; Cauberghe, Veroline; De Pelsmacker, Patrick

    2014-01-01

    Until now, social marketing campaigns mainly targeted children using traditional media. However, little is known about the effectiveness of computer games to communicate health-related information to children. This study compares the impact of an interactive game as a medium to provide health information and improve children's dietary habits to the impact of more traditional media. Using a 2 × 3 between-subject factorial design with 190 children (7-9 years old), this study investigates the effect of threat messages (weak vs. strong) concerning dental hygiene on behavioral outcome (snack choice), and how this effect is moderated by the type of medium used to communicate subsequent health information after the threat appeal (computer game, information brochure, narrative story). Results show a positive significant effect of perceived threat on children's adaptive behavior. However, this effect only remains significant when afterwards children are exposed to a narrative health-related story. When children play a game or read a brochure, they need to devote more attention to process this content, distracting them from the original threat message. In sum, when a threat message is followed by additional health information, the medium through which this information is presented influences the effectiveness of the preceding threat message. PMID:24393019

  14. Controllability modulates the neural response to predictable but not unpredictable threat in humans.

    Wood, Kimberly H; Wheelock, Muriah D; Shumen, Joshua R; Bowen, Kenton H; Ver Hoef, Lawrence W; Knight, David C

    2015-10-01

    Stress resilience is mediated, in part, by our ability to predict and control threats within our environment. Therefore, determining the neural mechanisms that regulate the emotional response to predictable and controllable threats may provide important new insight into the processes that mediate resilience to emotional dysfunction and guide the future development of interventions for anxiety disorders. To better understand the effect of predictability and controllability on threat-related brain activity in humans, two groups of healthy volunteers participated in a yoked Pavlovian fear conditioning study during functional magnetic resonance imaging (fMRI). Threat predictability was manipulated by presenting an aversive unconditioned stimulus (UCS) that was either preceded by a conditioned stimulus (i.e., predictable) or by presenting the UCS alone (i.e., unpredictable). Similar to animal model research that has employed yoked fear conditioning procedures, one group (controllable condition; CC), but not the other group (uncontrollable condition; UC) was able to terminate the UCS. The fMRI signal response within the dorsolateral prefrontal cortex (PFC), dorsomedial PFC, ventromedial PFC, and posterior cingulate was diminished during predictable compared to unpredictable threat (i.e., UCS). In addition, threat-related activity within the ventromedial PFC and bilateral hippocampus was diminished only to threats that were both predictable and controllable. These findings provide insight into how threat predictability and controllability affects the activity of brain regions (i.e., ventromedial PFC and hippocampus) involved in emotion regulation, and may have important implications for better understanding neural processes that mediate emotional resilience to stress. PMID:26149610

  15. WIRELESS NETWORKS: DEVELOPMENTS, THREATS AND COUNTERMEASURES

    Mardiana Mohamad Noor

    2013-01-01

    Full Text Available This paper discusses current threats in wireless networks and some academia research reviews regarding the matters. Significant and persistent threats discussed are sniffing, Man In the Middle Attack (MITM, Rogue Access Points (RAP, Denial Of Services (DoS and social engineering attacks. Some current developments of wireless communication technology such as short range communication, cloud computing, bring your own device policy (BYOD, devices tethering and convergences of WiFi and cellular network technology are also presented. Some practical suggestion and advanced countermeasures are also reviewed in this paper. The findings from reviewing these research papers proved that the complexity of the attacks had increased by time and the attacks in WiFi network are passive and more dangerous to the end users.

  16. Securing Infrastructure from High Explosive Threats

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  17. The nuclear threat. 2. enl. ed.

    The volume contains a collection of essays published already in 1972 under the title 'The last days and end of time'. Inspite of the articles having been written between 1958 and 1967, the author feels that they are not void of present-day interest because the threat of a global cataclysm has uninterruptedly continued to exist. What he fights is not this or that enemy who might be attacked or suppressed by nuclear means but the nuclear situation as such. As he makes clear, he is not unaware of the annihilation potential working in nuclear reactors but, he feels, the threat of nuclear war has almost creased to be noticed. So then, in his opinion, the anti-nuclear-power movement is something of an obstacle to the movement against nuclear war. (HSCH)

  18. Indian estuaries: Dynamics, ecosystems, and threats

    Shetye, S.R.

    ARTICLE Indian estuaries: Dynamics, ecosystems, and threats Satish R. Shetye National Institute of Oceanography Dona Paula, Goa - 403 004. e-mail: shetye@nio.org Received May 11, 2011 Abstract Indian estuaries have special features that are derived from... the tide pulls the mixed water out of the estuary through its mouth. Different processes within an estuary contribute to mixing of the two waters, the important among these in the Mandovi estuary are: influence of the tide on the advective field within...

  19. Stereotype Threat Reinterpreted as a Regulatory Mismatch

    Grimm, Lisa R.; Markman, Arthur B.; Maddox, W. Todd; Baldwin, Grant C.

    2009-01-01

    Research documents performance decrements resulting from the activation of a negative task-relevant stereotype. We combine a number of strands of work to identify causes of stereotype threat in a way that allows us to reverse the effects and improve the performance of individuals with negative task-relevant stereotypes. We draw on prior work suggesting that negative stereotypes induce a prevention focus, and other research suggesting that people exhibit greater flexibility when their regulato...

  20. The Neuroscience of Stigma and Stereotype Threat

    Derks, Belle; Inzlicht, Michael; Kang, Sonia

    2008-01-01

    Abstract This article reviews social neuroscience research on the experience of stigma from the target's perspective. More specifically, we discuss several research programs that employ electroencephalography, event-related potentials, or functional magnetic resonance imaging methods to examine neural correlates of stereotype and social identity threat. We present neuroimaging studies that show brain activation related to the experience of being stereotyped and ERP studies that she...

  1. Nonproliferation, Nuclear Security, and the Insider Threat

    Balatsky, Galya I. [Los Alamos National Laboratory; Duggan, Ruth [SNL

    2012-07-12

    Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

  2. Avian influenza: an emerging pandemic threat.

    Jin, Xian Wen; Mossad, Sherif B

    2005-12-01

    While we are facing the threat of an emerging pandemic from the current avian flu outbreak in Asia, we have learned important traits of the virus responsible for the 1918 Spanish influenza pandemic that made it so deadly. By using stockpiled antiviral drugs effectively and developing an effective vaccine, we can be in a better position than ever to mitigate the global impact of an avian influenza pandemic. PMID:16392727

  3. Handsets Malware Threats and Facing Techniques

    Elfattah, Marwa M A; Sarhan, Ebada

    2012-01-01

    Nowadays, mobile handsets combine the functionality of mobile phones and PDAs. Unfortunately, mobile handsets development process has been driven by market demand, focusing on new features and neglecting security. So, it is imperative to study the existing challenges that facing the mobile handsets threat containment process, and the different techniques and methodologies that used to face those challenges and contain the mobile handsets malwares. This paper also presents a new approach to group the different malware containment systems according to their typologies.

  4. Community Changes Address Common Health Threat

    2013-09-30

    This podcast helps residents living in multiunit housing, like apartments and condos, understand the threat of secondhand smoke. It also helps residents understand what steps they can take to breathe a little easier if involuntarily exposed to secondhand smoke.  Created: 9/30/2013 by Division of Community Health, National Center for Chronic Disease Prevention and Health Promotion.   Date Released: 9/30/2013.

  5. High-angular Resolution Laser Threat Warner

    Sushil Kumar

    2007-07-01

    Full Text Available In this paper, the design and development aspects of a high-angular resolution laser-threat Warner developed at the Laser Science & Technology Centre (LASTEC, Delhi are presented. It describes a high-angular resolution laser-threat warner capable of giving warning with a resolution of i 3" when it is exposed to laser radiation from visible and near-IR pulsed solid-state laser source. It has a field of view of 90' in the azimuth direction, whereas the elevation coverage is between -5" and + 25". It is capable of handling multiple types of laser threats covering wavelength from 400 nm to 1100 nm and has an operational range of 4 km for a Q-switched laser source energy (10 ns of 10 mJ/pulse and output beam divergence of 1 mrad. The paper also describes its simulated evaluation process and field-testing which it has undergone. The result of field-testing confirms that it meets all its performance specifications mentioned above.

  6. Asymmetric threat data mining and knowledge discovery

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  7. Evaluation of Potential Biological Threats in Ukraine

    Dilating of biological threats spectrum, EDI diffusion opportunities and routes, unpredictability of outbreaks connected with connatural, technogenic, terrorist factors determines constant monitoring and readiness for operative BPA indication and identification. Scientific analytical approach of existing and probable regional bio-threats evaluation is necessary for adequate readiness system creation and maintenance of medical counteraction tactics to probable biological threats. Basing on the international experience, we carry out analysis of a situation present in Ukraine and routes for the decisions. The basic directions are: - Evaluation of a reality for EDI penetration from abroad and presence of conditions for their further diffusion inside the country. - Revealing of presence and definition of connatural EDI foci biocenoses features and BPAs. - Appropriate level of biological safety and physical protection of bio-laboratories and pathogens collections maintenance. - Gene/molecular and phenotypical definition of EDI circulating strains. - Creation of the circulating EDI gene/ phenotypic characteristics regional data bank. - Ranging of EDI actual for area. - Introduction of GPT, mathematical modeling and forecasting for tactics development in case of technogenic accidents and connatural outbreaks. - Methodical basis and equipment improvement for BPA system indication for well-timed identification of natural, or modified agent. - Education and training The international cooperation in maintenance of biosafety and bioprotection within the framework of scientific programs, grants, exchange of experience, introduction of international standards and rules are among basic factors in the decision for creating system national biosafety for countries not included in EU and the NATO. (author)

  8. Near Earth Asteroid Characteristics for Asteroid Threat Assessment

    Dotson, J.; Wooden, D. H.; Bryson, K.; Ostrowski, D. R.

    2015-12-01

    Information about the physical characteristics of Near Earth Asteroids (NEAs) is needed to model behavior during atmospheric entry, to assess the risk of an impact, and to model possible mitigation techniques. The intrinsic properties of interest to entry and mitigation modelers, however, rarely are directly measureable. Instead we measure other properties and infer the intrinsic physical properties, so determining the complete set of characteristics of interest is far from straightforward. In addition, for the majority of NEAs, only the basic measurements exist so often properties must be inferred from statistics of the population of more completely characterized objects. We will provide an assessment of the current state of knowledge about the physical characteristics of importance to asteroid threat assessment. In addition, an ongoing effort to collate NEA characteristics into a readily accessible database for use by the planetary defense community will be discussed.

  9. Cyber Terrorism demands a Global Risks and Threats Strategic Management

    The world is in the third wave of development, which is digital managed and networked. Information, which creates the knowledge is transferring thorough the Internet by exponential function. The rapid advancement of the computer technology has a great influence over the development of the critical information infrastructure, thus changing the safety environment and the national values and interests. This advancement produces threats and risks from computer perspective which are sublimated in different forms of international terrorism and particularly in cyber terrorism. The main aim of this paper is based on a thorough analysis of what is scientifically known and practiced when nowadays critical information infrastructure is in the focus of the cyber terrorism. The rapid IT development demands changes in the strategic management focus. As a result of a time-consuming theoretical and empirical research this paper suggests a methodology for strategic managing of: threats, risks and vulnerabilities. The proposed methodology is seen as a mean to increase the human security conscious in every sense of the word, and to promote the need for rules, procedures and standards establishment from the aspect of the strategic management in the new information epoch concerning. In addition, through a scientific discourse, a short attempt is made to relate Macedonian reality with the phenomenon mentioned above. The most fundamental set phrase is that the efficiency and promptly made decisions during strategic planning are a projection of the systematic organization of functions and models for managing the risks and threats of the critical information infrastructure. Hence, this paper could be seen as a perspective when taking in consideration the regional strategic management, and the cyber space vital functioning. (author)

  10. Preventing radiological threat in the Republic of Azerbaijan

    Full text: Azerbaijan is a developing and transit country in the Caucasus, connecting East and West. In addition, Azerbaijan is neighboring countries with pronounced political instability, some of which have extensive nuclear infrastructure or try to develop nuclear infrastructure. Furthermore, in the recent past fundamentalist religious terrorism has taken roots in some of these countries. Therefore, in spite of the fact that the Republic of Azerbaijan has no nuclear facilities or nuclear materials in its own territory, it could be interesting for terrorist groups trying to develop a crude radiological dispersal device using radioactive sources that are widely used in everyday life especially in such areas as oil industry, medicine, agriculture and scientific researches. The issues of reduction and prevention of both radiological and nuclear terrorism threat are one of the main global challenges around the world. The Republic of Azerbaijan is a part of world community and so we are concerned that radioactive sources used for peaceful applications could be stolen by the terrorist groups and used in the development of radiological dispersal devices sometimes referred to as a 'dirty bomb'. It is obvious that using highly radioactive materials in radiological dispersal devices could be very disruptive to society, causing panic, environmental contamination, and large financial losses. One of the ways for reduction and prevention of radiological threat for the countries like Azerbaijan with underdeveloped nuclear security and radiation safety infrastructure is closely participation in the international cooperation programs. As an example of such cooperation, I would like to present the United States Department of Energy's International Radiological Threat Reduction (IRTR) Program. Good progress has made in the field of radiological security within the framework of this program that was started 2003. Actually, in comparison with any IAEA programs, the progress reached by

  11. Introduction to Administrative Programs that Mitigate the Insider Threat

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  12. Stereotype Threat and Feedback Seeking in the Workplace.

    Roberson, Loriann; Deitch, Elizabeth A.; Brief, Arthur P.; Block, Caryn J.

    2003-01-01

    Among 166 African American managers, those who were the only minority-group member in their workgroup perceived more stereotype threat. Stereotype threat was related to indirect feedback seeking and discounting of supervisors' performance feedback. (Contains 41 references.) (SK)

  13. 41 CFR 60-741.22 - Direct threat defense.

    2010-07-01

    ... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... individual or others in the workplace. (See § 60-741.2(y) defining direct threat.)...

  14. Zika Threat Calls for Extra Mosquito Protection This Summer

    ... page: https://medlineplus.gov/news/fullstory_159168.html Zika Threat Calls for Extra Mosquito Protection This Summer ... THURSDAY, June 2, 2016 (HealthDay News) -- With the Zika threat growing in the United States, people need ...

  15. Zika Threat Calls for Extra Mosquito Protection This Summer

    ... nlm.nih.gov/medlineplus/news/fullstory_159168.html Zika Threat Calls for Extra Mosquito Protection This Summer ... THURSDAY, June 2, 2016 (HealthDay News) -- With the Zika threat growing in the United States, people need ...

  16. Use of multisensor fusion technology to meet the challenges of emerging EO and RF threats to a combat aircraft

    Shukla, Arvind K.; Parthasarathy, T.; Rao, P. N. A. P.

    2003-04-01

    The pilot on-board a combat aircraft encounters during any mission a dynamically varying threat environment of diverse EO and RF threats. Different sensors are carried on-board the aircraft to combat these threats. However, these sensors have their own limitations and no single sensor is able to perform in all kinds of situations. In addition, the technological advances in the threat scenario - in terms of higher speeds, small signatures and multimode guidance - and increased complex threats in the battlefield leading to generation of large amount of data input to the pilot make his decision making task very difficult due to increased workload. These challenges can be efficiently handled by deployment of a system on-board the aircraft with a comprehensive goal of autonomous target detection and tracking, situation and threat assessment and decision making based on multi-sensor data fusion techniques. In this paper, major emerging EO and RF threats for a combat aircraft and some important EO and RF sensors on-board the aircraft have been discussed. A design approach for the development of a multi-sensor data fusion system for a combat aircraft to provide better threat assessment than that provided by any single stand alone sensor has also been presented.

  17. Groundwater and Terrestrial Water Storage

    Rodell, Matthew; Chambers, Don P.; Famiglietti, James S.

    2014-01-01

    Terrestrial water storage (TWS) comprises groundwater, soil moisture, surface water, snow,and ice. Groundwater typically varies more slowly than the other TWS components because itis not in direct contact with the atmosphere, but often it has a larger range of variability onmultiannual timescales (Rodell and Famiglietti, 2001; Alley et al., 2002). In situ groundwaterdata are only archived and made available by a few countries. However, monthly TWSvariations observed by the Gravity Recovery and Climate Experiment (GRACE; Tapley et al.,2004) satellite mission, which launched in 2002, are a reasonable proxy for unconfinedgroundwater at climatic scales.

  18. Features of terrestrial plasma transport

    Moore, T. E.; Chandler, M. O.; Chappell, C. R.; Pollock, C. J.; Waite, J. H., Jr.

    1989-01-01

    Research concerning the transport and distribution of ionospheric plasma in the magnetosphere are reviewed, stressing the dichotomy in explanations given for the low plasma densities outside the plasmasphere. The convection/hot solar plasma model and the convection/loss model are considered. Observations of global ionospheric outflows are compared with theoretical studies. It is suggested that there is a need for a hybrid model of magnetospheric plasma in which terrestrial plasma is both lost into the solar wind and energized and trapped within the magnetosphere, inflating the geomagnetic field and excluding cold plasma from conjugate regions.

  19. Stereotype threat can reduce older adults' memory errors

    Barber, Sarah J.; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment (Seibt & Förster, 2004). Because of this, we predic...

  20. The Consequences of Chronic Stereotype Threat: Domain Disidentification and Abandonment

    Woodcock, Anna; Hernandez, Paul R.; Estrada, Mica; Schultz, P. Wesley

    2012-01-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s “leak” from each juncture of the academic scientific pip...

  1. Gender, Stereotype Threat, and Anxiety: Psychophysiological and Cognitive Evidence

    Osborne, Jason W.

    2006-01-01

    Introduction: Claude Steele's stereotype threat hypothesis proposed that negative group stereotypes increase individual anxiety levels, hurting performance. However, the role of anxiety in stereotype threat has not been fully explored. This study examined the hypothesis that experimental manipulation of stereotype threat would influence real-time…

  2. Unleashing Latent Ability: Implications of Stereotype Threat for College Admissions

    Logel, Christine R.; Walton, Gregory M.; Spencer, Steven J.; Peach, Jennifer; Mark, Zanna P.

    2012-01-01

    Social-psychological research conducted over the past 15 years provides compelling evidence that pervasive psychological threats are present in common academic environments--especially threats that originate in negative intellectual stereotypes--and that these threats undermine the real-world academic performance of non-Asian ethnic minority…

  3. CBRN Threats and the Economic Analysis of Terrorism

    Ramseger, Alexander; Kalinowski, Martin B.; Weiß, Lucia

    2009-01-01

    The aim of this paper is to investigate the economic aspects of CBRN threats. For this purpose, the extent to which this topic is reflected in freely-accessible academic literature and the costs associated with such threats will be assessed. Furthermore, it is to be determined which industries have a particular interest in security against such CBRN threats.

  4. Attention Training and the Threat Bias: An ERP Study

    O'Toole, Laura; Dennis, Tracy A.

    2012-01-01

    Anxiety is characterized by exaggerated attention to threat. Several studies suggest that this threat bias plays a causal role in the development and maintenance of anxiety disorders. Furthermore, although the threat bias can be reduced in anxious individuals and induced in non-anxious individual, the attentional mechanisms underlying these…

  5. 41 CFR 60-250.22 - Direct threat defense.

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60... VETERANS Discrimination Prohibited § 60-250.22 Direct threat defense. The contractor may use as a... position held or desired without posing a direct threat to the health or safety of the individual or...

  6. 77 FR 73516 - Federal Acquisition Regulation; Iran Threat Reduction

    2012-12-10

    ... RIN 9000-AM44 Federal Acquisition Regulation; Iran Threat Reduction AGENCY: Department of Defense (DoD... and III of the Iran Threat Reduction and Syria Human Rights Act of 2012. DATES: Effective Date...), to implement sections of Titles II and III of the Iran Threat Reduction and Syria Human Rights Act...

  7. 49 CFR 1540.205 - Procedures for security threat assessment.

    2010-10-01

    ... TSA determines that the applicant meets the security threat assessment standards in 49 CFR 1540.201(c... the applicant does not meet the security threat assessment standards in 49 CFR 1540.201(c). The... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  8. 77 FR 1672 - Threat Reduction Advisory Committee; Notice of Meeting

    2012-01-11

    ... of the Secretary Threat Reduction Advisory Committee; Notice of Meeting AGENCY: Department of Defense... Department of Defense announces the following Federal advisory committee meeting of the Threat Reduction.... William Hostyn, GS-15, DoD, Defense Threat Reduction Agency/SP-ACP, 8725 John J. Kingman Road, MS...

  9. 41 CFR 60-300.22 - Direct threat defense.

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60... VETERANS Discrimination Prohibited § 60-300.22 Direct threat defense. The contractor may use as a... position held or desired without posing a direct threat to the health or safety of the individual or...

  10. 77 FR 27208 - Renewal of Threat Reduction Advisory Committee

    2012-05-09

    ... of the Secretary Renewal of Threat Reduction Advisory Committee AGENCY: DoD. ACTION: Renewal of...), the Department of Defense gives notice that it is renewing the charter for the Threat Reduction... Biological Defense Programs), independent advice and recommendations on: a. Reducing the threat to the...

  11. 75 FR 30002 - Federal Advisory Committee; Threat Reduction Advisory Committee

    2010-05-28

    ... Office of the Secretary Federal Advisory Committee; Threat Reduction Advisory Committee AGENCY... the charter for the Threat Reduction Advisory Committee (hereafter referred to as the Committee). FOR... Acquisition, Technology and Logistics and the Director of the Defense Threat Reduction Agency on the...

  12. Comparative Climatology of Terrestrial Planets

    Mackwell, Stephen J.; Simon-Miller, Amy A.; Harder, Jerald W.; Bullock, Mark A.

    Public awareness of climate change on Earth is currently very high, promoting significant interest in atmospheric processes. We are fortunate to live in an era where it is possible to study the climates of many planets, including our own, using spacecraft and groundbased observations as well as advanced computational power that allows detailed modeling. Planetary atmospheric dynamics and structure are all governed by the same basic physics. Thus differences in the input variables (such as composition, internal structure, and solar radiation) among the known planets provide a broad suite of natural laboratory settings for gaining new understanding of these physical processes and their outcomes. Diverse planetary settings provide insightful comparisons to atmospheric processes and feedbacks on Earth, allowing a greater understanding of the driving forces and external influences on our own planetary climate. They also inform us in our search for habitable environments on planets orbiting distant stars, a topic that was a focus of Exoplanets, the preceding book in the University of Arizona Press Space Sciences Series. Quite naturally, and perhaps inevitably, our fascination with climate is largely driven toward investigating the interplay between the early development of life and the presence of a suitable planetary climate. Our understanding of how habitable planets come to be begins with the worlds closest to home. Venus, Earth, and Mars differ only modestly in their mass and distance from the Sun, yet their current climates could scarcely be more divergent. Our purpose for this book is to set forth the foundations for this emerging science and to bring to the forefront our current understanding of atmospheric formation and climate evolution. Although there is significant comparison to be made to atmospheric processes on nonterrestrial planets in our solar system — the gas and ice giants — here we focus on the terrestrial planets, leaving even broader comparisons

  13. How to deal with the Radiological Dispersal Device (RDD) threat

    In the United States of America, the IAEA's Code of Conduct on the Safety and Security of Radioactive Sources (Code of Conduct) and RS-G-1.9, Categorization of Radioactive Sources, provide a basis for risk informing both safety and security actions to protect against the threat of radiological dispersal devices (RDDs). The US Government, States, and the private and public sectors are working to address a broad range of issues for reducing RDD risk, in a consistent manner, across multi-jurisdictional authorities. Key Nuclear Regulatory Commission safety and security actions for protection against RDDs and implementation of the key elements of the Code of Conduct include developing and implementing increased controls for risk significant radioactive material, enhancing import/export protocols and establishing a national source registry, known as the National Source Tracking System. Challenges arise in coordinating a national threat policy and consequences of concern and implementing protective strategies that balance safety, security and response as well as sharing burdens across diverse operational modes and overlapping regulatory responsibilities. The Nuclear Regulatory Commission participates in several collaborative initiatives with the Department of Homeland Security (DHS) to achieve consistency in the protection and response to national threats. The National Infrastructure Protection Plan describes the integrated activities needed to protect the nation's critical infrastructure/key resources, including protection from an RDD attack. In addition, the National Response Plan provides the protocols for coordinating response to nuclear or radiological incidents. In January 2006, the DHS issued its draft Application of Protective Action Guides for Radiological Dispersal Devices and Improvised Nuclear Device Incidents, which was developed within the Government in coordination with State and local agencies. The Government continues to work with State and local

  14. Identification of threats using linguistics-based knowledge extraction.

    Chew, Peter A.

    2008-09-01

    One of the challenges increasingly facing intelligence analysts, along with professionals in many other fields, is the vast amount of data which needs to be reviewed and converted into meaningful information, and ultimately into rational, wise decisions by policy makers. The advent of the world wide web (WWW) has magnified this challenge. A key hypothesis which has guided us is that threats come from ideas (or ideology), and ideas are almost always put into writing before the threats materialize. While in the past the 'writing' might have taken the form of pamphlets or books, today's medium of choice is the WWW, precisely because it is a decentralized, flexible, and low-cost method of reaching a wide audience. However, a factor which complicates matters for the analyst is that material published on the WWW may be in any of a large number of languages. In 'Identification of Threats Using Linguistics-Based Knowledge Extraction', we have sought to use Latent Semantic Analysis (LSA) and other similar text analysis techniques to map documents from the WWW, in whatever language they were originally written, to a common language-independent vector-based representation. This then opens up a number of possibilities. First, similar documents can be found across language boundaries. Secondly, a set of documents in multiple languages can be visualized in a graphical representation. These alone offer potentially useful tools and capabilities to the intelligence analyst whose knowledge of foreign languages may be limited. Finally, we can test the over-arching hypothesis--that ideology, and more specifically ideology which represents a threat, can be detected solely from the words which express the ideology--by using the vector-based representation of documents to predict additional features (such as the ideology) within a framework based on supervised learning. In this report, we present the results of a three-year project of the same name. We believe

  15. The Laboratory for Terrestrial Physics

    2003-01-01

    The Laboratory for Terrestrial Physics is dedicated to the advancement of knowledge in Earth and planetary science, by conducting innovative research using space technology. The Laboratory's mission and activities support the work and new initiatives at NASA's Goddard Space Flight Center (GSFC). The Laboratory's success contributes to the Earth Science Directorate as a national resource for studies of Earth from Space. The Laboratory is part of the Earth Science Directorate based at the GSFC in Greenbelt, MD. The Directorate itself is comprised of the Global Change Data Center (GCDC), the Space Data and Computing Division (SDCD), and four science Laboratories, including Laboratory for Terrestrial Physics, Laboratory for Atmospheres, and Laboratory for Hydrospheric Processes all in Greenbelt, MD. The fourth research organization, Goddard Institute for Space Studies (GISS), is in New York, NY. Relevant to NASA's Strategic Plan, the Laboratory ensures that all work undertaken and completed is within the vision of GSFC. The philosophy of the Laboratory is to balance the completion of near term goals, while building on the Laboratory's achievements as a foundation for the scientific challenges in the future.

  16. Consideration on Measures against Insiders Threats in ROK

    They can also threaten cyber security, safety measures, and material control and accountancy (MC and A). Insiders are likely to have the time to plan their actions. In addition, they may work with an external adversary who shares their objectives. Because of these reasons, IAEA published 'The Implementing Guide Preventive and Protective Measures against Insider Threats, IAEA Nuclear Security Series No. 8' to help understanding of the Member States. This paper focus on the current status of the measures to prevent, detect and respond to potential insiders at nuclear facilities in Republic of KOREA. Insiders are able to take advantage of their access rights and knowledge of facilities where they are working or have worked to bypass dedicated security measures. Therefore, insiders can be the most dangerous threats to cyber security, safety measures, and material control and accountancy of nuclear facilities. Preventive and protective measures against the potential insiders in the nuclear facilities are yet insufficient according to the security inspection results. Especially, preventive and protective measures for unauthorized removal of nuclear material by insiders are the weakest area of whole security systems and should be further strengthened

  17. Nuclear threats and emergency preparedness in Finland; Ydinuhkat ja varautuminen

    Mustonen, R.; Aaltonen, H.; Laaksonen, J.; Lahtinen, J.; Rantavaara, A.; Reponen, H.; Rytoemaa, T.; Suomela, M.; Toivonen, H.; Varjoranta, T.

    1995-10-01

    The political and economic upheavals which have taken place in Eastern Europe have had an impact on radiation and nuclear safety throughout Europe. Emergency preparedness systems for unexpected nuclear events have been developed further in all European countries, and prosperous western nations have invested in improving the safety of East European nuclear power plants. The economic crisis facing countries of the former Soviet Union has also promoted illicit trade in nuclear materials; this has made it necessary for various border guards and police authorities to intensify their collaboration and to tighten border controls. On 3-4 October 1995, Finnish Centre for Radiation and Nuclear Safety (STUK) arranged a seminar on nuclear threats and emergency preparedness in Finland. In addition to STUK experts, a wide range of rescue and civil defence authorities, environmental health specialists and other persons engaged in emergency preparedness attended the seminar. The publication contains a compilation of reports presented at the seminar. The reports cover a broad spectrum of nuclear threats analyzed at STUK, the impacts of radioactive fallout on human beings and on the environment, and preparedness systems by which the harmful effects of radiation or nuclear accidents can, if necessary, be minimized. (33 figs., 5 tabs.).

  18. Taking Steps to Protect Against the Insider Threat

    Pope, Noah Gale [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Williams, Martha [Tetra Tech HEI; Powell, TN (United States); Lewis, Joel [Gregg Protection Services; Lynchburg, VA (United States); Pham, Thomas [United States Nuclear Regulatory Commission; CHattanooga, TN (United States)

    2015-10-16

    Research reactors are required (in accordance with the Safeguards Agreement between the State and the IAEA) to maintain a system of nuclear material accounting and control for reporting quantities of nuclear material received, shipped, and held on inventory. Enhancements to the existing accounting and control system can be made at little additional cost to the facility, and these enhancements can make nuclear material accounting and control useful for nuclear security. In particular, nuclear material accounting and control measures can be useful in protecting against an insider who is intent on unauthorized removal or misuse of nuclear material or misuse of equipment. An enhanced nuclear material accounting and control system that responds to nuclear security is described in NSS-25G, Use of Nuclear Material Accounting and Control for Nuclear Security Purposes at Facilities, which is scheduled for distribution by the IAEA Department of Nuclear Security later this year. Accounting and control measures that respond to the insider threat are also described in NSS-33, Establishing a System for Control of Nuclear Material for Nuclear Security Purposes at a Facility During Storage, Use and Movement, and in NSS-41, Preventive and Protective Measures against Insider Threats (originally issued as NSS-08), which are available in draft form. This paper describes enhancements to existing material control and accounting systems that are specific to research reactors, and shows how they are important to nuclear security and protecting against an insider.

  19. Facing freeze: social threat induces bodily freeze in humans.

    Roelofs, Karin; Hagenaars, Muriel A; Stins, John

    2010-11-01

    Freezing is a common defensive response in animals threatened by predators. It is characterized by reduced body motion and decreased heart rate (bradycardia). However, despite the relevance of animal defense models in human stress research, studies have not shown whether social threat cues elicit similar freeze-like responses in humans. We investigated body sway and heart rate in 50 female participants while they were standing on a stabilometric force platform and viewing cues that were socially threatening, socially neutral, and socially affiliative (angry, neutral, and happy faces, respectively). Posturographic analyses showed that angry faces (compared with neutral faces and happy faces) induced significant reductions in body sway. In addition, the reduced body sway for angry faces was accompanied by bradycardia and correlated significantly with subjective anxiety. Together, these findings indicate that spontaneous body responses to social threat cues involve freeze-like behavior in humans that mimics animal freeze responses. These findings open avenues for studying human freeze responses in relation to various sociobiological markers and social-affective disorders. PMID:20876881

  20. Potential and Actual Terrestrial Rabies Exposures in People and Domestic Animals, Upstate South Carolina, 1994–2004: A Surveillance Study

    Foppa Ivo M; Goolsby W David; Roseveare Catherine W

    2009-01-01

    Abstract Background Although there has been a reduction of rabies in pets and domestic animals during recent decades in the United States, rabies remains enzootic among bats and several species of terrestrial wildlife. Spillover transmission of wildlife rabies to domestic animals therefore remains a public health threat Methods Retrospective analysis of surveillance data of reported animal incidents (bites, scratches, mucous membrane contacts) from South Carolina, 1995 to 2003, was performed ...

  1. Experimental Evidence of Threat-Sensitive Collective Avoidance Responses in a Large Wild-Caught Herring School

    Rieucau, Guillaume; Boswell, Kevin M.; De Robertis, Alex; Macaulay, Gavin J.; Handegard, Nils Olav

    2014-01-01

    Aggregation is commonly thought to improve animals' security. Within aquatic ecosystems, group-living prey can learn about immediate threats using cues perceived directly from predators, or from collective behaviours, for example, by reacting to the escape behaviours of companions. Combining cues from different modalities may improve the accuracy of prey antipredatory decisions. In this study, we explored the sensory modalities that mediate collective antipredatory responses of herring (Clupea harengus) when in a large school (approximately 60 000 individuals). By conducting a simulated predator encounter experiment in a semi-controlled environment (a sea cage), we tested the hypothesis that the collective responses of herring are threat-sensitive. We investigated whether cues from potential threats obtained visually or from the perception of water displacement, used independently or in an additive way, affected the strength of the collective avoidance reactions. We modified the sensory nature of the simulated threat by exposing the herring to 4 predator models differing in shape and transparency. The collective vertical avoidance response was observed and quantified using active acoustics. The combination of sensory cues elicited the strongest avoidance reactions, suggesting that collective antipredator responses in herring are mediated by the sensory modalities involved during threat detection in an additive fashion. Thus, this study provides evidence for magnitude-graded threat responses in a large school of wild-caught herring which is consistent with the “threat-sensitive hypothesis”. PMID:24489778

  2. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  3. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false How does an operator identify potential threats to pipeline integrity and use the threat identification in its integrity program? 192.917 Section 192.917....917 How does an operator identify potential threats to pipeline integrity and use the...

  4. Cooperative Threat Reduction: Cooperation Threat Reduction Program Liquid Propellant Disposition Project

    2002-09-01

    This audit is one in a series of audits the Deputy Secretary of Defense requested. As part of the Cooperative Threat Reduction (CTR) Program, DoD agreed to assist the Russian Federation in disposing of its liquid rocket propellant. Public Law 102-228 (section 2551 NOTE, title 22, United States Code), the Soviet Nuclear Threat Reduction Act of 1991 designates DoD as the executive agent for the CTR Program. Specific objectives of the act are to destroy chemical, nuclear, and other weapons; transport, store, disable, and safeguard weapons in connection with their destruction; and establish verifiable safeguards against proliferation of weapons of mass destruction. The Office of the Assistant Secretary of Defense (International Security Policy), under the Office of the Under Secretary of Defense for Policy, develops, coordinates, and oversees implementation of policy for the CTR Program. The CTR Directorate, Defense Threat Reduction Agency operates the program.

  5. Synergistic Antimicrobial Effect of Tribulus terrestris and Bitter Almond Extracts

    Hamid Abtahi; Ali Ghazavi; Masode Karimi

    2014-01-01

    Background: The antimicrobial effects of the extracts of different kinds of plants have been demonstrated in several studies. However, no study has been conducted so far on the synergistic effects of two herbal extracts on their germicidal effects. In this study, in addition to antibacterial effects of the aqueous, methanol or ethanol extracts of Tribulus terrestris and bitter almond on some bacteria, the synergistic effects of the extracts of these two plants were also evaluated. Material...

  6. Correlations between Lumbricus terrestris survival and gut microbiota

    Rudi, Knut; Strætkvern, Knut Olav

    2012-01-01

    Background: The interplay between diet, gut bacteria and health still remain enigmatic. Here, we addressed this issue through the investigation of the effect of crystalline cellulose on the earthworm Lumbricus terrestris gut microbiota composition and survival. Methods: Earthworm gut contents were analyzed after 14 days of feeding using a mixed 16S rRNA gene sequencing approach, in addition to direct measurements of cellulase activity. The survival of earthworms was followed each week for 17 ...

  7. Alien terrestrial crustaceans (Isopods and Amphipods). Chapter 7.1

    Pierre-Olivier Cochard; Ferenc Vilisics; Emmanuel Sechet

    2010-01-01

    A total of 17 terrestrial crustacean species aliens to Europe of which 13 isopods (woodlice) and 4 amphipods (lawn shrimps) have established on the continent. In addition, 21 species native to Europe were introduced in a European region to which they are not native. The establishment of alien crustacean species in Europe slowly increased during the 20th century without any marked changes during the recent decades. Almost all species alien to Europe originate from sub-tropical or tropical ar...

  8. Nuclear waste dump no threat, says NAS

    This article is a review of the National Academy of Sciences report on the efforts to site a low-level waste repository in the Mohave Desert. This report states that there would be little threat to ground water or the Colorado River, but critics charge that the advisory group, with close ties to the nuclear industry, set forth some findings that support arguments against the project. Leakage pathways from the containers to the Colorado River are reviewed, and it is concluded that even if all the leakage of plutonium reached the river, the impact would be minimal

  9. Asteroids: Their composition and impact threat

    Burbine T H

    2002-01-01

    Impacts by near-Earth asteroids are serious threats to life as we know it. The energy of the impact will be a function of the mass of the asteroid and its impact velocity. The mass of an asteroid is very difficult to determine from Earth. One way to derive a near-Earth object's mass is by estimating the object's density from its surface composition. Reflectance spectra are the best way to determine an object's composition since many minerals (e.g. olivine, pyroxene, hydrated silicates) have c...

  10. Rethinking climate change as a security threat

    Schoch, Corinne

    2011-10-15

    Once upon a time climate change was a strictly environment and development issue. Today it has become a matter of national and international security. Efforts to link climate change with violent conflict may not be based on solid evidence, but they have certainly captured the attention of governments. They have played a vital role in raising the much-needed awareness of climate change as an issue that deserves global action. But at what cost? Focusing on climate change as a security threat alone risks devolving humanitarian responsibilities to the military, ignoring key challenges and losing sight of those climate-vulnerable communities that stand most in need of protection.

  11. Cybersecurity Public Sector Threats and Responses

    Andreasson, Kim J

    2011-01-01

    The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the form of e-government. But with a rapidly growing user base globally and an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. An accessible primer, Cybersecurity: Public Sector Threats and Responses focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It identifies the challenges you need to be aware of and examines emerging trends and strategies from around

  12. Assessing the global threat from Zika virus.

    Lessler, Justin; Chaisson, Lelia H; Kucirka, Lauren M; Bi, Qifang; Grantz, Kyra; Salje, Henrik; Carcelen, Andrea C; Ott, Cassandra T; Sheffield, Jeanne S; Ferguson, Neil M; Cummings, Derek A T; Metcalf, C Jessica E; Rodriguez-Barraquer, Isabel

    2016-08-12

    First discovered in 1947, Zika virus (ZIKV) infection remained a little-known tropical disease until 2015, when its apparent association with a considerable increase in the incidence of microcephaly in Brazil raised alarms worldwide. There is limited information on the key factors that determine the extent of the global threat from ZIKV infection and resulting complications. Here, we review what is known about the epidemiology, natural history, and public health effects of ZIKV infection, the empirical basis for this knowledge, and the critical knowledge gaps that need to be filled. PMID:27417495

  13. Threat Model Design for new GNSS signals

    Pagot, Jean-Baptiste; Thevenon, Paul; Julien, Olivier; Amarillo-Fernández, Francisco; Maillard, Denis

    2016-01-01

    This paper proposes threat models (TM) for Galileo E1C, the pilot component of the E1 Open Service signal, (CBOC(6,1,111⁄) modulation) and Galileo E5a (BPSK(10) modulation) signals, as they are the Galileo signals that will be used by civil aviation airborne receivers for pseudorange computation. The advent of new GNSS signals requests new definitions for prospective signal distortions. Indeed, new signals and/or new tracking methods change the conception of hazardous signal distortion. The p...

  14. Lyssaviruses and Bats: Emergence and Zoonotic Threat

    Ashley C. Banyard

    2014-08-01

    Full Text Available The continued detection of zoonotic viral infections in bats has led to the microbial fauna of these mammals being studied at a greater level than ever before. Whilst numerous pathogens have been discovered in bat species, infection with lyssaviruses is of particular significance from a zoonotic perspective as, where human infection has been reported, it is invariably fatal. Here we review the detection of lyssaviruses within different bat species and overview what is understood regarding their maintenance and transmission following both experimental and natural infection. We discuss the relevance of these pathogens as zoonotic agents and the threat of newly discovered viruses to human populations.

  15. Tackling the Threats of Internet Worms

    Al-Sakib Khan Pathan

    2012-01-01

    Computer Worm is a kind of malicious program that self-replicates automatically within a computer network. Again, Internet is defined as a network of networks. This is the reason why computer worms do not reside only within one computer or a single network but rather get spread all over the Internet whenever it is possible during computer-to-computer communications. The reality of today’s Internet is that the worms pose a major threat to the Internet infrastructure security. This is also unde...

  16. Village Level Tsunami Threat Maps for Tamil Nadu, SE Coast of India: Numerical Modeling Technique

    MP, J.; Kulangara Madham Subrahmanian, D.; V, R. M.

    2014-12-01

    The Indian Ocean tsunami (IOT) devastated several countries of North Indian Ocean. India is one of the worst affected countries after Indonesia and Sri Lanka. In India, Tamil Nadu suffered maximum with fatalities exceeding 8,000 people. Historical records show that tsunami has invaded the shores of Tamil Nadu in the past and has made people realize that the tsunami threat looms over Tamil Nadu and it is necessary to evolve strategies for tsunami threat management. The IOT has brought to light that tsunami inundation and runup varied within short distances and for the disaster management for tsunami, large scale maps showing areas that are likely to be affected by future tsunami are identified. Therefore threat assessment for six villages including Mamallapuram (also called Mahabalipuram) which is famous for its rock-cut temples, from the northern part of Tamil Nadu state of India has been carried out and threat maps categorizing the coast into areas of different degree of threat are prepared. The threat was assessed by numerical modeling using TUNAMI N2 code considering different tsunamigenic sources along the Andaman - Sumatra trench. While GEBCO and C-Map data was used for bathymetry and for land elevation data was generated by RTK - GPS survey for a distance of 1 km from shore and SRTM for the inland areas. The model results show that in addition to the Sumatra source which generated the IOT in 2004, earthquakes originating in Car Nicobar and North Andaman can inflict more damage. The North Andaman source can generate a massive tsunami and an earthquake of magnitude more than Mw 9 can not only affect Tamil Nadu but also entire south east coast of India. The runup water level is used to demarcate the tsunami threat zones in the villages using GIS.

  17. Threat model framework and methodology for personal networks (PNs)

    Prasad, Neeli R.

    2007-01-01

    To be able to build a secure network, it is essential to model the threats to the network. A methodology for building a threat model has been proposed in the paper. Several existing threat models and methodologies will be compared to the proposed methodology. The aim of the proposed methodology i...... have been used. Also risk assessment methods will be discussed. Threat profiles and vulnerability profiles have been presented.......To be able to build a secure network, it is essential to model the threats to the network. A methodology for building a threat model has been proposed in the paper. Several existing threat models and methodologies will be compared to the proposed methodology. The aim of the proposed methodology is...

  18. Moon and Terrestrial Planets: Unresolved Questions

    Schmitt, H. H.

    2002-12-01

    . Additional unresolved questions raised by lunar exploration and study include 1) the effect of chondritic proto-cores on the timing of core formation in the terrestrial planets, 2) the number of extremely large basin-forming events (lunar diameters >2000 km) and the potential for proto-continents being formed by the differentiation of their melt sheets on water-rich planets, 3) effect of clays produced by the weathering of the debris and glass produced by pervasive asteroid and cometary impacts, 4) the many details of the differentiation of magma oceans, and 5) the processes governing the evolution of the lunar regolith. Finally, there is the question of when humans shall return to the Moon. On the one hand, the use of this unique and accessible planetary body as a scientific resource has barely begun. On the other hand, the Helium-3 fusion energy resources and deep space travel consumables that remain untapped in the lunar regolith hardly can be ignored in the face of human and environmental challenges on Earth and the species' desire to go to Mars. On both hands, it is time we took another walk on the Moon. 30 years going on 40 is long enough to think about what once was possible.

  19. Possible climates on terrestrial exoplanets

    Forget, Francois

    2013-01-01

    What kind of environment may exist on terrestrial planets around other stars? In spite of the lack of direct observations, it may not be premature to speculate on exoplanetary climates, for instance to optimize future telescopic observations, or to assess the probability of habitable worlds. To first order, climate primarily depends on 1) The atmospheric composition and the volatile inventory; 2) The incident stellar flux; 3) The tidal evolution of the planetary spin, which can notably lock a planet with a permanent night side. The atmospheric composition and mass depends on complex processes which are difficult to model: origins of volatile, atmospheric escape, geochemistry, photochemistry. We discuss physical constraints which can help us to speculate on the possible type of atmosphere, depending on the planet size, its final distance for its star and the star type. Assuming that the atmosphere is known, the possible climates can be explored using Global Climate Models analogous to the ones developed to sim...

  20. Phytopharmacological overview of Tribulus terrestris.

    Chhatre, Saurabh; Nesari, Tanuja; Somani, Gauresh; Kanchan, Divya; Sathaye, Sadhana

    2014-01-01

    Tribulus terrestris (family Zygophyllaceae), commonly known as Gokshur or Gokharu or puncture vine, has been used for a long time in both the Indian and Chinese systems of medicine for treatment of various kinds of diseases. Its various parts contain a variety of chemical constituents which are medicinally important, such as flavonoids, flavonol glycosides, steroidal saponins, and alkaloids. It has diuretic, aphrodisiac, antiurolithic, immunomodulatory, antidiabetic, absorption enhancing, hypolipidemic, cardiotonic, central nervous system, hepatoprotective, anti-inflammatory, analgesic, antispasmodic, anticancer, antibacterial, anthelmintic, larvicidal, and anticariogenic activities. For the last few decades or so, extensive research work has been done to prove its biological activities and the pharmacology of its extracts. The aim of this review is to create a database for further investigations of the discovered phytochemical and pharmacological properties of this plant to promote research. This will help in confirmation of its traditional use along with its value-added utility, eventually leading to higher revenues from the plant. PMID:24600195

  1. Phytopharmacological overview of Tribulus terrestris

    Saurabh Chhatre

    2014-01-01

    Full Text Available Tribulus terrestris (family Zygophyllaceae, commonly known as Gokshur or Gokharu or puncture vine, has been used for a long time in both the Indian and Chinese systems of medicine for treatment of various kinds of diseases. Its various parts contain a variety of chemical constituents which are medicinally important, such as flavonoids, flavonol glycosides, steroidal saponins, and alkaloids. It has diuretic, aphrodisiac, antiurolithic, immunomodulatory, antidiabetic, absorption enhancing, hypolipidemic, cardiotonic, central nervous system, hepatoprotective, anti-inflammatory, analgesic, antispasmodic, anticancer, antibacterial, anthelmintic, larvicidal, and anticariogenic activities. For the last few decades or so, extensive research work has been done to prove its biological activities and the pharmacology of its extracts. The aim of this review is to create a database for further investigations of the discovered phytochemical and pharmacological properties of this plant to promote research. This will help in confirmation of its traditional use along with its value-added utility, eventually leading to higher revenues from the plant.

  2. Solar-Terrestrial Ontology Development

    McGuinness, D.; Fox, P.; Middleton, D.; Garcia, J.; Cinquni, L.; West, P.; Darnell, J. A.; Benedict, J.

    2005-12-01

    The development of an interdisciplinary virtual observatory (the Virtual Solar-Terrestrial Observatory; VSTO) as a scalable environment for searching, integrating, and analyzing databases distributed over the Internet requires a higher level of semantic interoperability than here-to-fore required by most (if not all) distributed data systems or discipline specific virtual observatories. The formalization of semantics using ontologies and their encodings for the internet (e.g. OWL - the Web Ontology Language), as well as the use of accompanying tools, such as reasoning, inference and explanation, open up both a substantial leap in options for interoperability and in the need for formal development principles to guide ontology development and use within modern, multi-tiered network data environments. In this presentation, we outline the formal methodologies we utilize in the VSTO project, the currently developed use-cases, ontologies and their relation to existing ontologies (such as SWEET).

  3. Terrestrial atmosphere, water and astrobiology

    Coradini M.

    2010-12-01

    Full Text Available Primitive life, defined as a chemical system capable to transfer its molecular information via self-replication and also capable to evolve, originated about 4 billion years ago from the processing of organic molecules by liquid water. Terrestrial atmosphere played a key role in the process by allowing the permanent presence of liquid water and by participating in the production of carbon-based molecules. Water molecules exhibit specific properties mainly due to a dense network of hydrogen bonds. The carbon-based molecules were either home made in the atmosphere and/or in submarine hydrothermal systems or delivered by meteorites and micrometeorites. The search for possible places beyond the earth where the trilogy atmosphere/water/life could exist is the main objective of astrobiology. Within the Solar System, exploration missions are dedicated to Mars, Europa, Titan and the icy bodies. The discovery of several hundreds of extrasolar planets opens the quest to the whole Milky Way.

  4. Chaos in Terrestrial Planet Formation

    Hoffmann, Volker; Moore, Ben; Stadel, Joachim

    2015-01-01

    Terrestrial planets are thought to be the result of a vast number of gravitational interactions and collisions between smaller bodies. We use numerical simulations to show that practically identical initial conditions result in a wide array of final planetary configurations. This highly chaotic behaviour questions the predictability of different scenarios for the formation and evolution of our solar system and planetary systems in general. However, multiple realisations of the same initial conditions can be used to predict certain global statistics. We present two sets of numerical experiments that quantify this behaviour. Firstly, we demonstrate that simulations with slightly displaced particles are completely divergent after ~500 years, irrespective of initial displacement, particle number, and code accuracy. If a single planetesimal is moved by less than one millimetre, then a different set of planets results -- this timescale for chaotic divergence decreases with increasing particle number. Secondly, we s...

  5. A Spherical Aerial Terrestrial Robot

    Dudley, Christopher J.

    This thesis focuses on the design of a novel, ultra-lightweight spherical aerial terrestrial robot (ATR). The ATR has the ability to fly through the air or roll on the ground, for applications that include search and rescue, mapping, surveillance, environmental sensing, and entertainment. The design centers around a micro-quadcopter encased in a lightweight spherical exoskeleton that can rotate about the quadcopter. The spherical exoskeleton offers agile ground locomotion while maintaining characteristics of a basic aerial robot in flying mode. A model of the system dynamics for both modes of locomotion is presented and utilized in simulations to generate potential trajectories for aerial and terrestrial locomotion. Details of the quadcopter and exoskeleton design and fabrication are discussed, including the robot's turning characteristic over ground and the spring-steel exoskeleton with carbon fiber axle. The capabilities of the ATR are experimentally tested and are in good agreement with model-simulated performance. An energy analysis is presented to validate the overall efficiency of the robot in both modes of locomotion. Experimentally-supported estimates show that the ATR can roll along the ground for over 12 minutes and cover the distance of 1.7 km, or it can fly for 4.82 minutes and travel 469 m, on a single 350 mAh battery. Compared to a traditional flying-only robot, the ATR traveling over the same distance in rolling mode is 2.63-times more efficient, and in flying mode the system is only 39 percent less efficient. Experimental results also demonstrate the ATR's transition from rolling to flying mode.

  6. Global threat reduction initiative's reactor conversion programs cooperation methodologies and approaches

    The Global Threat Reduction Initiative's (GTRI) Reactor Conversion program is a global effort whose prime objective is to reduce. and ultimately eliminate. The use of highly enriched uranium (HEU minimization) within civilian programs around the world. This GTRI program works in partnership with foreign countries and international organizations to develop replacement LEU technologies and obtain necessary regulatory approvals to support the implementation of HEU minimization programs. To implement the Reactor Conversion program. GTRI employs a variety of international agreements, memoranda of understanding and contractual vehicles through bilateral and multilateral efforts. The recent successes of the GTRI Reactor Conversion program will be used to promote additional nuclear threat reduction activities in member states. This presentation will present opportunities for developing new approaches to broaden international support for and participation in this nuclear threat reduction effort while at the same time ensuring the viability and sustainability of important civilian nuclear research and development programs of those facilities undergoing conversion. (author)

  7. Assessing the integrity of local area network materials accountability systems against insider threats

    DOE facilities rely increasingly on computerized systems to manage nuclear materials accountability data and to protect against diversion of nuclear materials or other malevolent acts (e.g., hoax due to falsified data) by insider threats. Aspects of modern computerized material accountability (MA) systems including powerful personal computers and applications on networks, mixed security environments, and more users with increased knowledge, skills and abilities help heighten the concern about insider threats to the integrity of the system. In this paper, we describe a methodology for assessing MA applications to help decision makers identify ways of and compare options for preventing or mitigating possible additional risks from the insider threat. We illustrate insights from applying the methodology to local area network materials accountability systems

  8. Beyond the amygdala: Linguistic threat modulates peri-sylvian semantic access cortices.

    Weisholtz, Daniel S; Root, James C; Butler, Tracy; Tüscher, Oliver; Epstein, Jane; Pan, Hong; Protopopescu, Xenia; Goldstein, Martin; Isenberg, Nancy; Brendel, Gary; LeDoux, Joseph; Silbersweig, David A; Stern, Emily

    2015-12-01

    In this study, healthy volunteers were scanned using functional magnetic resonance imaging (fMRI) to investigate the neural systems involved in processing the threatening content conveyed via visually presented "threat words." The neural responses elicited by these words were compared to those elicited by matched neutral control words. The results demonstrate that linguistic threat, when presented in written form, can selectively engage areas of lateral temporal and inferior frontal cortex, distinct from the core language areas implicated in aphasia. Additionally, linguistic threat modulates neural activity in visceral/emotional systems (amygdala, parahippocampal gyrus and periaqueductal gray), and at earlier stages of the visual-linguistic processing stream involved in visual word form representations (ventral occipitotemporal cortex). We propose a model whereby limbic activation modulates activity at multiple nodes along the visual-linguistic-semantic processing stream, including a perisylvian "semantic access network" involved in decoding word meaning, suggesting a dynamic interplay between feedforward and feedback processes. PMID:26575986

  9. The Risk of Risk Analysis And its Relation to the Economics of Insider Threats

    Probst, Christian W.; Hunker, Jeffrey

    Insider threats to organizational information security are widely viewed as an important concern, but little is understood as to the pattern of their occurrence. We outline an argument for explaining what originally surprised us: that many practitioners report that their organizations take basic steps to prevent insider attacks, but do not attempt to address more serious attacks. We suggest that an understanding of the true cost of additional policies to control insider threats, and the dynamic nature of potential insider threats together help explain why this observed behavior is economically rational. This conclusion also suggests that further work needs to be done to understand how better to change underlying motivations of insiders, rather than simply focus on controlling and monitoring their behavior.

  10. Are modern technologies a threat to fundamental rights

    Discussion of the problem whether nuclear technology represents a more serious threat to fundamental rights (such as the right to live and to be protected from bodily harm) than other technical developments. Stating that nuclear facilities as an object of possible assaults by terrorist groups cannot be regarded as an additional menace to the existance of our free and democratic society. Science and technology on the whole, together with their impact on our every-day life might, under the specific conditions of our industrial society based on division of labour, entail an undue infringement of fundamental rights unless the consequences of the technical development are evaluated in due time by the competent authorities in government, industry and society on the basis of the standard of value set by the Basic Law for the Fed. Republic of Germany. (orig./HP) 891 HP/orig.- 892 MBE

  11. Portable Wireless Device Threat Assessment for Aircraft Navigation Radios

    Nguyen, Truong X.; Koppen, Sandra V.; Ely, Jay J.; Williams, Reuben A.; Smith, Laura J.; Salud, Maria Theresa P.

    2004-01-01

    This paper addresses the concern for Wireless Local Area Network devices and two-way radios to cause electromagnetic interference to aircraft navigation radio systems. Spurious radiated emissions from various IEEE 802.11a, 802.11b, and Bluetooth devices are characterized using reverberation chambers. The results are compared with baseline emissions from standard laptop computer and personal digital assistants (PDAs) that are currently allowed for use on aircraft. The results indicate that the WLAN devices tested are not more of a threat to aircraft navigation radios than standard laptop computers and PDAs in most aircraft bands. In addition, spurious radiated emission data from seven pairs of two-way radios are provided. These two-way radios emit at much higher levels in the bands considered. A description of the measurement process, device modes of operation and the measurement results are reported.

  12. Orbital Debris: the Growing Threat to Space Operations

    Johnson, Nicholas L.

    2010-01-01

    For nearly 50 years the amount of man-made debris in Earth orbit steadily grew, accounting for about 95% of all cataloged space objects over the past few decades. The Chinese anti-satellite test in January 2007 and the accidental collision of two spacecraft in February 2009 created more than 4000 new cataloged debris, representing an increase of 40% of the official U.S. Satellite Catalog. The frequency of collision avoidance maneuvers for both human space flight and robotic operations is increasing along with the orbital debris population. However, the principal threat to space operations is driven by the smaller and much more numerous uncataloged debris. Although the U.S. and the international aerospace communities have made significant progress in recognizing the hazards of orbital debris and in reducing or eliminating the potential for the creation of new debris, the future environment is expected to worsen without additional corrective measures.

  13. Terrorism and global security: The nuclear threat

    In the seven years since this book was first published, the threat of nuclear terrorism has increased dramatically. The enormous destructive potential of nuclear technology inevitably raises the specter of the use of nuclear explosives or radioactivity by insurgent groups. The author explores the political bases of terrorism by considering the factors that might foster nuclear terrorism, the forms it could take, and the probable consequences of such acts. New to this edition is the author's examination of the essential distinctions between lawful insurgencies and terrorism, as well as his analysis of the impact of recent U.S. foreign policy. The author explores the United State's all-consuming rivalry with the Soviet Union, arguing that it has created an atmosphere ripe for anti-U.S. terrorism and that the only viable option for the super-powers is cooperation in an effort to control terrorist activities. He also discusses the ''Reagan doctrine,'' which he believes has increased the long-term threat of nuclear terrorism against the U.S. by its continuing support of authoritarian regimes and by its active opposition to Marxist regimes such as those in Nicaragua and Angola. The book concludes by presenting the first coherent strategy for countering nuclear terrorism-embracing both technological and behavioral measures. The proposal includes policies for deterrence and situation management on national and international scales and emphasizes the logic of a major reshaping of world order

  14. Ongoing Threats to Emerging Financial Entities

    Bryce Alexander LYNCH

    2016-06-01

    Full Text Available In the twenty-first century the pace of technological advancement shows no signs of stopping. Old technologies are being discarded as obsolete or are transformed in ways that nobody could have foreseen even a half-decade ago. Along with these radical changes come vulnerabilities and threats to infrastructure, including informational and financial which must be considered and protected. This is not to say that basic security measures must continue to be neglected in favor of rapid development and deployment to provide a Minimum Viable Product to customers; basic security protocols become all the more important under these circumstances. Improving faster are attacks against the new infrastructure; technique and technology tend to change along generally accepted sets of rules while attackers follow no rules or guidelines. This fundamental asymmetry leaves defenders at a distinct advantage in several ways, including ethical concerns (“There are some lines we will not cross” versus “By any means necessary”, monetary considerations (“Return on investment” versus “The resources aren’t ours to begin with, so who cares” and pragmatism (“We exist to make money to improve shareholder value” versus “Because it’s there”. That said, measurable, repeatable, and effective countermeasures exist which can be deployed on an enterprise-wide basis to help level the playing field by deterring attackers. This paper will discuss these threats along with active and passive countermeasures for same.

  15. Religion, group threat and sacred values

    Hammad Sheikh

    2012-03-01

    Full Text Available Sacred or protected values have important influences on decision making, particularly in the context of intergroup disputes. Thus far, we know little about the process of a value becoming sacred or why one person may be more likely than another to hold a sacred value. We present evidence that participation in religious ritual and perceived threat to the group lead people to be more likely to consider preferences as protected or sacred values. Specifically, three studies carried out with Americans and Palestinians show: (a that the more people participate in religious ritual the more likely they are to report a preference to be a sacred value (Studies 1--3; (b that people claim more sacred values when they are reminded of religious ritual (Study 2; and (c that the effect of religious ritual on the likelihood of holding a sacred value is amplified by the perception of high threat to the in-group (Study 3. We discuss implications of these findings for understanding intergroup conflicts, and suggest avenues for future research into the emergence and spread of sacred values.

  16. Insider threat vulnerability analysis - MAIT update

    A computer-based method for security system evaluation and improvement called Matrix Analysis for the Insider Threat (MAIT) was developed and reported on previously by Science Applications International Corporation (SAIC). MAIT is a sophisticated method for the analysis of safeguards or security systems that determines if single or multiple insiders can covertly sabotage a facility or system or can covertly divert a resource that is present in the facility or system. The MAIT code was initially developed for application to theft from fuel cycle facilities. The MAIT method provides a detailed, organized way to exhaustively examine the safeguards or security system against these covert threats. An evaluation of this broad scope is beyond the reasonable capability of an analyst working without computer assistance. The MAIT analysis is conducted by first manually collecting detailed facility design data and access and control information for each individual safeguard measure. With this information, the MAIT computer code synthesizes every possible situation and returns data to the analyst concerning those particular events that are not adequately projected

  17. Prefrontal control of attention to threat.

    Peers, Polly V; Simons, Jon S; Lawrence, Andrew D

    2013-01-01

    Attentional control refers to the regulatory processes that ensure that our actions are in accordance with our goals. Dual-system accounts view temperament as consisting of both individual variation in emotionality (e.g., trait anxiety) and variation in regulatory attentional mechanisms that act to modulate emotionality. Increasing evidence links trait variation in attentional control to clinical mood and anxiety disorder symptoms, independent of trait emotionality. Attentional biases to threat have been robustly linked to mood and anxiety disorders. However, the role of variation in attentional control in influencing such biases, and the neural underpinnings of trait variation in attentional control, are unknown. Here, we show that individual differences in trait attentional control, even when accounting for trait and state anxiety, are related to the magnitude of an attentional blink (AB) following threat-related targets. Moreover, we demonstrate that activity in dorso-lateral prefrontal cortex (DLPFC), is observed specifically in relation to control of attention over threatening stimuli, in line with neural theories of attentional control, such as guided activation theory. These results have key implications for neurocognitive theories of attentional bias and emotional resilience. PMID:23386824

  18. Unattended sensors for nuclear threat detection

    This paper discusses the ongoing development of a compact, unattended, and low-power radiation detection system designed for deployment to the front lines of nuclear proliferation. Current countermeasure deployments aim to detect nuclear threats by screening cargo containers abroad or at ports of entry, but the defensive nature of these systems means that they face the immense challenge of detecting intentionally-concealed materials. A complementary strategy places countermeasures closer to the source of nuclear proliferation, but deployments to these regions often must operate autonomously and in the absence of infrastructure. This application motivates our development of a low-power system capable of detecting gamma-ray and neutron emissions while operating autonomously for extended periods of time. Many challenges are present when developing radiation-detection systems for this application, and this paper describes work focused on two of them: the development of compact, low-power electronics for gamma-ray-spectrometer and 3He- tube signal processing, and analysis algorithms capable of distinguishing threats from benign sources in mid-resolution gamma-ray spectrometers. We discuss our development efforts on these fronts and present results based on implementation in a proof-of-principle system comprised of two 5 cm x 10 cm x 41 cm NaI(Tl) crystals and eight 40-cm 3He tubes

  19. Unattended sensors for nuclear threat detection

    Runkle, Robert C.; Myjak, Mitchell J.; Batdorf, Michael T.; Bowler, Ryan S.; Kiff, Scott D.; Morris, Scott J.; Mullen, Crystal A.; Rohrer, John S.; Todd, Lindsay C.

    2008-06-30

    This paper discusses the ongoing development of a compact, unattended, and low-power radiation detection system designed for deployment to the front lines of nuclear proliferation. Current countermeasure deployments aim to detect nuclear threats by screening cargo containers abroad or at ports of entry, but the defensive nature of these systems means that they face the immense challenge of detecting intentionally-concealed materials. A complementary strategy places countermeasures closer to the source of nuclear proliferation, but deployments to these regions often must operate autonomously and in the absence of infrastructure. This application motivates our development of a low-power system capable of detecting gamma-ray and neutron emissions while operating autonomously for extended periods of time. Many challenges are present when developing radiation-detection systems for this application, and this paper describes work focused on two of them: the development of compact, low-power electronics for gamma-ray-spectrometer and 3He- tube signal processing, and analysis algorithms capable of distinguishing threats from benign sources in mid-resolution gamma-ray spectrometers. We discuss our development efforts on these fronts and present results based on implementation in a proof-of-principle system comprised of two 5 cm x 10 cm x 41 cm NaI(Tl) crystals and eight 40-cm 3He tubes.

  20. Threats to the consumer market of region

    Gavriil Aleksandrovich Agarkov

    2012-09-01

    Full Text Available This papers reviews the main threats to the today's consumer market and offers a historic tour of their existence. The results of a comprehensive diagnostics technique of economic safety of the consumer market in the region taking into account the impact of threats are presented. In the basis of the procedure is an indicative method of analysis, in which diagnosis is carried out on a set of criterial parameters. Along with a comprehensive assessment, the paper offers a detailed analysis of one of the method's modules - evaluation of consumer protection as the most vulnerable category of participants in the consumer market. A classification of prejudice of consumers in accordance with international studies is considered. The conducted study showed that, in general, there is a positive trend of economic safety of the consumer market in the region for the period from 2003 to 2010, but, according to some modules (evaluation of consumer protection, the situation has worsened for the majority of the subjects discussed during the reviewed period. The results of economic safety diagnostics of the consumer market actors can be used in the formation of program-target events to neutralize the negative trends in the consumer market

  1. Prefrontal control of attention to threat

    Polly V Peers

    2013-02-01

    Full Text Available Attentional control refers to the regulatory processes that ensure that our actions are in accordance with our goals. Dual-system accounts view temperament as consisting of both individual variation in emotionality (e.g. trait anxiety and variation in regulatory attentional mechanisms that act to modulate emotionality. Increasing evidence links trait variation in attentional control to clinical mood and anxiety disorder symptoms, independent of trait emotionality. Attentional biases to threat have been robustly linked to mood and anxiety disorders. However, the role of variation in attentional control in influencing such biases, and the neural underpinnings of trait variation in attentional control, are unknown. Here, we show, that individual differences in trait attentional control, even when accounting for trait and state anxiety, are related to the magnitude of an attentional blink following threat-related targets. Moreover, we demonstrate that activity in dorsolateral prefrontal cortex, is observed specifically in relation to control of attention over threatening stimuli, in line with neural theories of attentional control, such as guided activation theory. These results have key implications for neurocognitive theories of attentional bias and emotional resilience.

  2. Stereotype threat and racial differences in citizens' experiences of police encounters.

    Najdowski, Cynthia J; Bottoms, Bette L; Goff, Phillip Atiba

    2015-10-01

    We conducted 2 studies to investigate how cultural stereotypes that depict Blacks as criminals affect the way Blacks experience encounters with police officers, expecting that such encounters induce Blacks to feel stereotype threat (i.e., concern about being judged and treated unfairly by police because of the stereotype). In Study 1, we asked Black and White participants to report how they feel when interacting with police officers in general. As predicted, Blacks, but not Whites, reported concern that police officers stereotype them as criminals simply because of their race. In addition, this effect was found for Black men but not Black women. In Study 2, we asked Black and White men to imagine a specific police encounter and assessed potential downstream consequences of stereotype threat. Consistent with Study 1, Black but not White men anticipated feeling stereotype threat in the hypothetical police encounter. Further, racial differences in anticipated threat translated into racial differences in anticipated anxiety, self-regulatory efforts, and behavior that is commonly perceived as suspicious by police officers. By demonstrating that Blacks might expect to be judged and treated unfairly by police because of the negative stereotype of Black criminality, this research extends stereotype threat theory to the new domain of criminal justice encounters. It also has practical implications for understanding how the stereotype could ironically contribute to bias-based policing and racial disparities in the justice system. PMID:26030449

  3. Measuring and mapping threats to forests: issues and opportunities with an empirical study from Bangladesh

    Mukul, S. A.; Herbohn, J.

    2015-12-01

    Spatially explicit tools for prioritizing conservation and land-use in human dominated landscapes are becoming common in recent years. Such efforts are also efficient in minimizing management costs and to provide future possible scenarios to aid management decisions. We propose and develop a spatially explicit framework and novel tool - Future Forest - for simulating scenarios for future forest management actions. We integrate both forest/vegetation characteristics, selected ecosystem services provided by corresponding forest/vegetation and nineteen possible threats and/or disturbances to forests that are either anthropogenic or occurring naturally, and may influence forest/vegetation characteristics and expected outcomes from forests. Our modelling framework provides options for necessary future actions either from conservation or from production forestry perspectives, and to ensure sustainable forest management in an area. In addition to that our threat assessment and mapping tool are useful in indentifying vulnerable zone of forests to specific anthropogenic, natural or other threats, and to take precautionary actions against each identified threats. We applied our modelling framework and spatial tool for measuring and mapping threats to a Bangladesh forest, with recommended actions to ensure sustainable forest management and to spatially prioritize zones for special management needs. We finally discuss issues and opportunities that our spatially explicit framework and novel tool may offer.

  4. Aerospace Power Technology for Potential Terrestrial Applications

    Lyons, Valerie J.

    2012-01-01

    Aerospace technology that is being developed for space and aeronautical applications has great potential for providing technical advances for terrestrial power systems. Some recent accomplishments arising from activities being pursued at the National Aeronautics and Space Administration (NASA) Centers is described in this paper. Possible terrestrial applications of the new aerospace technology are also discussed.

  5. Abundance of Terrestrial Planets by Microlensing

    Yock, Philip

    2000-01-01

    Terrestrial planets may be detected using the gravitational microlensing technique. This was demonstrated in the high magnification event MACHO-98-BLG-35. Observing strategies aimed at measuring the abundance of terrestrial planets are discussed, using both existing telescopes and planned telescopes.

  6. A Lesson Not to Be Learned? Understanding Stereotype Threat Does Not Protect Women from Stereotype Threat

    Tomasetto, Carlo; Appoloni, Sara

    2013-01-01

    This research examines whether reading a text presenting scientific evidence concerning the phenomenon of stereotype threat improves or disrupts women's performance in a subsequent math task. In two experimental conditions participants (N=118 ) read a text summarizing an experiment in which stereotypes, and not biological differences, were shown…

  7. The circumpolar biodiversity monitoring program - Terrestrial plan

    Christensen, Tom; Payne, J.; Doyle, M.;

    The Circumpolar Biodiversity Monitoring Program, CBMP, Terrestrial Plan, www.caff.is/terrestrial, is a framework to focus and coordinate monitoring of terrestrial biodiversity across the Arctic. The goal of the plan is to improve the collective ability of Arctic traditional knowledge (TK) holders......, northern communities, and scientists to detect, understand and report on long-term change in Arctic terrestrial ecosystems and biodiversity. This presentation will outline the key management questions the plan aims to address and the proposed nested, multi-scaled approach linking targeted, research based...... monitoring with survey-based monitoring and remotely sensed data. The CBMP Terrestrial Plan intends to build upon and expand existing monitoring networks, engaging participants across a range of capacity and interests. The presentation will summarize the recommended focal soil ecosystem components and...

  8. Insignificant solar-terrestrial triggering of earthquakes

    Love, Jeffrey J.; Thomas, Jeremy N.

    2013-01-01

    We examine the claim that solar-terrestrial interaction, as measured by sunspots, solar wind velocity, and geomagnetic activity, might play a role in triggering earthquakes. We count the number of earthquakes having magnitudes that exceed chosen thresholds in calendar years, months, and days, and we order these counts by the corresponding rank of annual, monthly, and daily averages of the solar-terrestrial variables. We measure the statistical significance of the difference between the earthquake-number distributions below and above the median of the solar-terrestrial averages by χ2 and Student's t tests. Across a range of earthquake magnitude thresholds, we find no consistent and statistically significant distributional differences. We also introduce time lags between the solar-terrestrial variables and the number of earthquakes, but again no statistically significant distributional difference is found. We cannot reject the null hypothesis of no solar-terrestrial triggering of earthquakes.

  9. Global threats from invasive alien species in the twenty-first century and national response capacities.

    Early, Regan; Bradley, Bethany A; Dukes, Jeffrey S; Lawler, Joshua J; Olden, Julian D; Blumenthal, Dana M; Gonzalez, Patrick; Grosholz, Edwin D; Ibañez, Ines; Miller, Luke P; Sorte, Cascade J B; Tatem, Andrew J

    2016-01-01

    Invasive alien species (IAS) threaten human livelihoods and biodiversity globally. Increasing globalization facilitates IAS arrival, and environmental changes, including climate change, facilitate IAS establishment. Here we provide the first global, spatial analysis of the terrestrial threat from IAS in light of twenty-first century globalization and environmental change, and evaluate national capacities to prevent and manage species invasions. We find that one-sixth of the global land surface is highly vulnerable to invasion, including substantial areas in developing economies and biodiversity hotspots. The dominant invasion vectors differ between high-income countries (imports, particularly of plants and pets) and low-income countries (air travel). Uniting data on the causes of introduction and establishment can improve early-warning and eradication schemes. Most countries have limited capacity to act against invasions. In particular, we reveal a clear need for proactive invasion strategies in areas with high poverty levels, high biodiversity and low historical levels of invasion. PMID:27549569

  10. Estimating Exposure of Terrestrial Wildlife to Contaminants

    Sample, B.E.

    1994-01-01

    This report presents a general model for exposure of terrestrial wildlife to contaminants (Sect. 2), methods for estimating parameters of the model (Sect. 3), species specific parameters for endpoint species on the Oak Ridge Reservation (ORR) (Sect. 4), and a sample application (Sect. 5). Exposure can be defined as the coincidence in both space and time of a receptor and a stressor, such that the receptor and stressor come into contact and interact (Risk Assessment Forum 1992). In the context of ecological risk assessment, receptors include all endpoint species or communities identified for a site [see Suter (1989) and Suter et al. (1994) for discussions of ecological endpoints for waste sites]. In the context of waste site assessments, stressors are chemical contaminations, and the contact and interaction are uptake of the contaminant by the receptor. Without sufficient exposure of the receptor to the contaminants, there is no ecological risk. Unlike some other endpoint assemblages, terrestrial wildlife are significantly exposed to contaminants in multiple media. They may drink or swim in contaminated water, ingest contaminated food and soil, and breath contaminated air. In addition, because most wildlife are mobile, moving among and within habitats, exposure is not restricted to a single location. They may integrate contamination from several spatially discrete sources. Therefore, exposure models for terrestrial wildlife must include multiple media. This document provides models and parameters for estimating exposure of birds and mammals. Reptiles and amphibians are not considered because few data exist with which to assess exposure to these organisms. In addition, because toxicological data are scarce for both classes, evaluation of the significance of exposure estimates is problematic. However, the general exposure estimation procedure developed herein for birds and mammals is applicable to reptiles and amphibians. Exposure models must be appropriate to the

  11. Global Threat Reduction Initiative Domestic Security Program

    The Global Threat Reduction Initiative (GTRI) is part of the Department of Energy’s National Nuclear Security Administration (DOE/NNSA). One of GTRI’s primary missions is to work throughout the United States to enhance security for radiological materials located at civilian sites such as hospitals and universities that could be potentially used in a radiological dispersal device (RDD). In partnership with other federal organizations such as the Nuclear Regulatory Commission (NRC), the Federal Bureau of Investigation (FBI), and the Department of Homeland Security (DHS), GTRI has assisted sites in enhancing security for thousands of radioactive sources located throughout the U.S. This paper provides an overview of GTRI’s partnership with the NRC, the FBI, DHS, and host sites to enhance the security of radioactive sources

  12. Threats from space: 20 years of progress

    Remo, J L

    2014-01-01

    It has been 20 years since planning began for the 1995 United Nations International Conference on Near-Earth Objects. The conference proceedings established the scientific basis for an international organizational framework to support research and collective actions to mitigate a potential near-Earth object (NEO) threat to the planet. Since that time, researchers have conducted telescope surveys that should, within the coming decade, answer many questions about the size, number, and Earth impact probability of these objects. Space explorations to asteroids and comets have been successfully carried out, including sample recovery. Laboratory experiments and computer simulations at Sandia National Laboratories have analyzed the effects of soft X-ray radiation on meteorites - which might help researchers develop a way to redirect an incoming asteroid by vaporizing a thin layer of its surface. An Action Team on NEOs, established in 2001 in response to recommendations of the Third United Nations Conference on the E...

  13. Bluetooth Security Threats And Solutions: A Survey

    Nateq Be-Nazir Ibn Minar

    2012-02-01

    Full Text Available Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the privacy of a user’s personal information. The security issues of Bluetooth have been an active area of research for the last few years. This paper presents the vulnerabilities in the security protocols of this technology along with some past security threats and possible countermeasures as reported in the literatures which have been surveyed and summarized in this paper. It also presents some tips that end-users can implement immediately to become more cautious about their private information.Finally, the paper concludes with some recommendations for future security enhancements that can be implemented in the Bluetooth standard.

  14. Biophysics and the Challenges of Emerging Threats

    Puglisi, Joseph D

    2009-01-01

    This volume is a collection of articles from the proceedings of the International School of Structural Biology and Magnetic Resonance 8th Course: Biophysics and the Challenges of Emerging Threats. This NATO Advance Study Institute (ASI) was held in Erice at the Ettore Majorana Foundation and Centre for Scientific Culture on 19 through 30 June 2007. The ASI brought together a diverse group of experts who bridged the fields of virology and biology, biophysics, chemistry and physics. Prominent lecturers and students from around the world representant a total of 24 countries participated in the NATO ASI organized by Professors Joseph Puglisi (Stanford University, USA) and Alexander Arseniev (Moscow, RU). The central hypothesis underlying this ASI was that interdisciplinary research, merging principles of physics, chemistry and biology, can drive new discovery in detecting and fighting bioterrorism agents, lead to cleaner environments, and help propel development in NATO partner countries. The ASI merged the relat...

  15. Zika Virus: Old Rival, New Threat

    Huanyu Wang

    2016-04-01

    Full Text Available Zika virus (ZIKV, originally isolated in 1947, caused a worldwide epidemic between January 2014 and February 2016 in which a total of 39 countries have reported autochthonous circulation (33 or indirect evidence of local transmission (6. The total area affected by ZIKV infection is expanding steadily. ZIKV has become a new threat to public health, and the recent cluster of microcephaly and other neurologic disorders suspected to be due to ZIKV has lead the World Health Organization to announce that it is a Public Health Emergency of International Concern. Because of its current importance, this review summarizes the currently available data on the etiology, epidemiology, clinical features, laboratory diagnosis, and transmission of ZIKV and its related diseases.

  16. The expectancy of threat and peritraumatic dissociation

    Pamela McDonald

    2013-12-01

    Full Text Available Background: Peritraumatic dissociation is one of the most critical acute responses to a traumatic experience, partly because it predicts subsequent posttraumatic stress disorder. Despite this, there is little understanding about the factors that influence peritraumatic dissociation. This study investigated the extent to which peritraumatic dissociation is predicted by the amount of perceived warning that participants had of the impact of the trauma. Method: Randomized eligible admissions to four major trauma hospitals (N =243 were assessed during hospital admission with the Peritraumatic Dissociation Experiences Questionnaire (PDEQ and the perceived warning that participants had before the trauma impact occurred. Results: Whereas female gender predicted both Awareness and Derealization subscale scores on the PDEQ, perceived warning also predicted scores on the Derealization subscale. Conclusions: This finding suggests that the degree of anticipated threat may contribute to peritraumatic dissociation.

  17. Consequences of a changing CBRN threat

    The OPCW now counts 186 member States. Member States that possessed chemical weapons (CW) are destroying those weapons, albeit at a slow pace. In the coming decade most, if not all, of the 100.000 + tons of CW from the previous century will have been destroyed. Of the 12± States, not part of the OPCW, four of them potentially have CW but their quantities are restricted to less than 1000 tons. About one kg of the more potent nerve agent or Mustard gas is required to produce on average one casualty amongst unprotected troops, 1000 tons potentially can produce 1 million casualties. Protection, passive chemical defense, is therefore mandatory. However, once a detection and protection system is in place, with a protection factor of say one thousand, the amount required to produce one casualty amongst troops in a military scenario becomes prohibitive. Furthermore, available CW quantities will have been reduced by pre-emptive airstrikes and the aggressor will have little chance to fully deploy his CW capability. The threat from massive CW with units facing several attacks per week has changed to incidental attacks on a smaller scale and with far lower frequency. This should have consequences for the chemical defense posture of the forces, Detection and protection are still required but the protection can have a lower capacity, less spares per individual. Because the number of incidents will be far lower it might be more cost effective to abandon contaminated equipment than to decontaminate it. As the number of CW casualties entering the military medical system will be small it might be better to find cures for diseases from biological weapons than to spent money on improved therapies for nerve agent or mustard. Although research in CW medical over the last 50 years was great, it has not produced a therapy for mustard or a significant improvement over the old therapy for nerve agent poisoning. With a declining CW threat the BW threat is on the rise, making a passive

  18. Security Threats in Wireless Sensor Networks

    Giannetsos, Athanasios

    2011-01-01

    Over the last few years, technological advances in the design of processors, memory, and radio communications have propelled an active interest in the area of distributed sensor networking, in which a number of independent, self-sustainable nodes collaborate to perform a large sensing task....... Security and privacy are rapidly replacing performance as the first and foremost concern in many sensor networking scenarios. While security prevention is important, it cannot guarantee that attacks will not be launched and that, once launched, they will not be successful. Therefore, detection of malicious...... of the most severe routing attacks against sensor networks, namely the sinkhole and wormhole attacks, and we emphasize on strategies that an attacker can follow to successfully launch them. Then we propose novel localized countermeasures that can make legitimate nodes become aware of the threat, while...

  19. The CBRNE Threat Needs New Dedicated Analysers

    Introduction: After the 9-11 attack by terrorists several governments realized their vulnerability towards creative asymmetric attacks. Due to increasing complexity of our society we create more vulnerability towards terror attacks. More chemical substances than we realize can be misused to destabilize our modern society. Recently aircraft passengers were confronted with new regulations, which limit the amount of fluid, which a passenger can bring on board with hand luggage. How far should we go limiting the allowance to bring liquids and substances on board? It indicates that we need new analytic instruments for screening the safety of luggage in all types of transport. Study Design: An inventory was made of the present demand for safe transport and its vulnerability to terror attacks. Also the safety and safety awareness in public buildings, offices and industrial complexes was assessed. Knowing the demand for a certain safety level, an inventory was made to identify analytical equipment, which can be used to check passengers and luggage on possible threats. The same can be used for protecting public areas, offices and industrial complexes. Results And Discussion: It is amazing how some governments, financially driven, underestimate the consequences of CBRNE incidences and disasters. Both threats due to release of dangerous substances just by accident and deliberate abuse of chemicals and/or biologicals by terror organizations is underestimated. Financial rationales are often the cause that the preparedness is less that technically could be possible. Still some commercial companies realize the importance of safety and preparedness towards terror attacks and take their precautions. Several detection systems are now under development and a new market of safety devices comes into existence. Conclusion: Key question is how far we would like to go with defending us with technical devices against potential terror attacks. Also the design of buildings, transport

  20. A molecular palaeobiological exploration of arthropod terrestrialization

    Carton, Robert; Edgecombe, Gregory D.

    2016-01-01

    Understanding animal terrestrialization, the process through which animals colonized the land, is crucial to clarify extant biodiversity and biological adaptation. Arthropoda (insects, spiders, centipedes and their allies) represent the largest majority of terrestrial biodiversity. Here we implemented a molecular palaeobiological approach, merging molecular and fossil evidence, to elucidate the deepest history of the terrestrial arthropods. We focused on the three independent, Palaeozoic arthropod terrestrialization events (those of Myriapoda, Hexapoda and Arachnida) and showed that a marine route to the colonization of land is the most likely scenario. Molecular clock analyses confirmed an origin for the three terrestrial lineages bracketed between the Cambrian and the Silurian. While molecular divergence times for Arachnida are consistent with the fossil record, Myriapoda are inferred to have colonized land earlier, substantially predating trace or body fossil evidence. An estimated origin of myriapods by the Early Cambrian precedes the appearance of embryophytes and perhaps even terrestrial fungi, raising the possibility that terrestrialization had independent origins in crown-group myriapod lineages, consistent with morphological arguments for convergence in tracheal systems. This article is part of the themed issue ‘Dating species divergences using rocks and clocks’. PMID:27325830

  1. The Reliability to Predict Threat in Social Networks

    Aleksandrs Larionovs

    2014-11-01

    Full Text Available During the analysis and study it will be possible to create and describe information damping mechanism for transition of threats from one user group to another (within the parameters of portraits, which is the main cause of the massively spreading threat on social networks. Threat predictability in social networks is associated with an adequate scrutiny of system and user portrait, which has a direct correlation.

  2. Mediators of Stereotype Threat among Black College Students

    Massey, Douglas S.; Owens, Jayanti

    2013-01-01

    We hypothesize that the manner in which stereotype threat affects college grade achievement is mediated by institutional context as well as individual characteristics. Drawing on a sample of black students from the National Longitudinal Survey of Freshmen we find weak and inconsistent evidence that institutional characteristics influence the operation of stereotype threat. We find more consistent evidence to indicate that the effect of stereotype threat is conditioned by individual factors su...

  3. CYBER THREATS TRENDS IN THE WORLD INFORMATION SPACE

    Cherniak, Oleg R.; Fedulov, Oleg V.

    2015-01-01

    To protect informational systems against cyber threats (attacks) risks must be constantly evaluated and assessed their existence in the global information space affect the confidentiality, integrity and availability of information resources. Upon the analysis and identification of the trends major development of cyber threats in the global information space made, it is possible to draw the conclusion about the trends progress of cyber threats and mechanisms of their proliferation become more ...

  4. New Frontiers of Network Security: The Threat Within

    Sanyal, Sugata; Shelat, Ajit; Gupta, Amit

    2010-01-01

    Nearly 70% of information security threats originate from inside an organization. Opportunities for insider threats have been increasing at an alarming rate with the latest trends of mobility (portable devices like Laptop, smart phones etc.), ubiquitous connectivity (wireless or through 3G connectivity) and this trend increases as more and more web-based applications are made available over the Internet. Insider threats are generally caused by current or ex-employees, contractors or partners,...

  5. The effects of takeover threats of shareholders and firm value

    Haan, Marco; Riyanto, Yohanes

    2000-01-01

    We study the role of takeover threats as a corporate control mechanism using Aghion and Tirole's (1997) model of formal and real authority. Shareholders do not monitor the manager's actions, since ownership is widely dispersed. A corporate raider may monitor, and steps in if a profit opportunity exists. In our model, a takeover threat decreases the manager's effort and does not benefit shareholders. The effect of a takeover threat on the expected value of the firm is ambiguous. It is in the i...

  6. On the relationship between social distance and threat

    Astrid C. Buba; de Hoog, Natascha

    2009-01-01

    We investigated the dependence of threat perception and reaction on social distance estimation. Social identity threat was imposed within a 2x2 between subjects design, with N=163 students reading a criticising comment about their ingroup assigned to originate from one of two possible outgroups. The participants completed parts of the scale Overlap of self, ingroup and outgroup (OSIO, Schubert and Otten, 2002) as a measure of social distance either before or after the threat manipulation. Res...

  7. Protected Areas in Tropical Africa : Assessing Threats and Conservation Activities

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèlle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin; Davenport, Tim; Dunn, Andrew

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover...

  8. Attention Training and the Threat Bias: An ERP Study

    O’Toole, Laura; Dennis, Tracy A.

    2011-01-01

    Anxiety is characterized by exaggerated attention to threat. Several studies suggest that this threat bias plays a causal role in the development and maintenance of anxiety disorders. Furthermore, although the threat bias can be reduced in anxious individuals and induced in non-anxious individual, the attentional mechanisms underlying these changes remain unclear. To address this issue, 49 non-anxious adults were randomly assigned to either attentional training toward or training away from th...

  9. Steroidal saponins from Tribulus terrestris.

    Kang, Li-Ping; Wu, Ke-Lei; Yu, He-Shui; Pang, Xu; Liu, Jie; Han, Li-Feng; Zhang, Jie; Zhao, Yang; Xiong, Cheng-Qi; Song, Xin-Bo; Liu, Chao; Cong, Yu-Wen; Ma, Bai-Ping

    2014-11-01

    Sixteen steroidal saponins, including seven previously unreported compounds, were isolated from Tribulus terrestris. The structures of the saponins were established using 1D and 2D NMR spectroscopy, mass spectrometry, and chemical methods. They were identified as: 26-O-β-d-glucopyranosyl-(25R)-furost-4-en-2α,3β,22α,26-tetrol-12-one (terrestrinin C), 26-O-β-d-glucopyranosyl-(25R)-furost-4-en-22α,26-diol-3,12-dione (terrestrinin D), 26-O-β-d-glucopyranosyl-(25S)-furost-4-en-22α,26-diol-3,6,12-trione (terrestrinin E), 26-O-β-d-glucopyranosyl-(25R)-5α-furostan-3β,22α,26-triol-12-one (terrestrinin F), 26-O-β-d-glucopyranosyl-(25R)-furost-4-en-12β,22α,26-triol-3-one (terrestrinin G), 26-O-β-d-glucopyranosyl-(1→6)-β-d-glucopyranosyl-(25R)-furost-4-en-22α,26-diol-3,12-dione (terrestrinin H), and 24-O-β-d-glucopyranosyl-(25S)-5α-spirostan-3β,24β-diol-12-one-3-O-β-d-glucopyranosyl-(1→4)-β-d-galactopyranoside (terrestrinin I). The isolated compounds were evaluated for their platelet aggregation activities. Three of the known saponins exhibited strong effects on the induction of platelet aggregation. PMID:25172515

  10. Terrestrial Energy Storage SPS Systems

    Brandhorst, Henry W., Jr.

    1998-01-01

    Terrestrial energy storage systems for the SSP system were evaluated that could maintain the 1.2 GW power level during periods of brief outages from the solar powered satellite (SPS). Short-term outages of ten minutes and long-term outages up to four hours have been identified as "typical" cases where the ground-based energy storage system would be required to supply power to the grid. These brief interruptions in transmission could result from performing maintenance on the solar power satellite or from safety considerations necessitating the power beam be turned off. For example, one situation would be to allow for the safe passage of airplanes through the space occupied by the beam. Under these conditions, the energy storage system needs to be capable of storing 200 MW-hrs and 4.8 GW-hrs, respectively. The types of energy storage systems to be considered include compressed air energy storage, inertial energy storage, electrochemical energy storage, superconducting magnetic energy storage, and pumped hydro energy storage. For each of these technologies, the state-of-the-art in terms of energy and power densities were identified as well as the potential for scaling to the size systems required by the SSP system. Other issues addressed included the performance, life expectancy, cost, and necessary infrastructure and site locations for the various storage technologies.

  11. Earth and Terrestrial Planet Formation

    Jacobson, Seth A

    2015-01-01

    The growth and composition of Earth is a direct consequence of planet formation throughout the Solar System. We discuss the known history of the Solar System, the proposed stages of growth and how the early stages of planet formation may be dominated by pebble growth processes. Pebbles are small bodies whose strong interactions with the nebula gas lead to remarkable new accretion mechanisms for the formation of planetesimals and the growth of planetary embryos. Many of the popular models for the later stages of planet formation are presented. The classical models with the giant planets on fixed orbits are not consistent with the known history of the Solar System, fail to create a high Earth/Mars mass ratio, and, in many cases, are also internally inconsistent. The successful Grand Tack model creates a small Mars, a wet Earth, a realistic asteroid belt and the mass-orbit structure of the terrestrial planets. In the Grand Tack scenario, growth curves for Earth most closely match a Weibull model. The feeding zon...

  12. Terrestrial cooling and solar variability

    Agee, E. M.

    1982-01-01

    Observational evidence from surface temperature records is presented and discussed which suggests a significant cooling trend over the Northern Hemisphere from 1940 to the present. This cooling trend is associated with an increase of the latitudinal gradient of temperature and the lapse rate, as predicted by climate models with decreased solar input and feedback mechanisms. Evidence suggests that four of these 80- to 100-year cycles of global surface temperature fluctuation may have occurred, and in succession, from 1600 to the present. Interpretation of sunspot activity were used to infer a direct thermal response of terrestrial temperature to solar variability on the time scale of the Gleissberg cycle (90 years, an amplitude of the 11-year cycles). A physical link between the sunspot activity and the solar parameter is hypothesized. Observations of sensible heat flux by stationary planetary waves and transient eddies, as well as general circulation modeling results of these processes, were examined from the viewpoint of the hypothesis of cooling due to reduced insolation.

  13. Transplant rejection in terrestrial molluscs

    E Furuta

    2011-01-01

    Full Text Available To know whether or not molluscs are capable of recognizing tissue allo-antigens, dorsal skin-allografts were exchanged between adult terrestrial slug, Incilaria fruhstorferi. We succeeded for the first time in orthotopic transplantation of allografts and observed chronic rejection of allografts. Cellular changes in the rejection process continued over for 40 days. Two functional types of “effector” cells were recognized at the rejection site, but they were observed to be macrophages possessing perforin granules and phagocytosing damaged cells of the allograft. Three days after transplantation, the perforin-positive cells were recognized only in the recipient tissue surrounding the allograft. Five days after transplantation, these cells started to appear in the graft, while they disappeared from the host tissue. However, TUNEL-positive cells (apoptotic cells were not observed throughout the graft-rejection process. Electron microscopic examination of the graft tissue revealed autophagic degeneration of epithelial cells, mucous cells, pigment cells, fibroblasts, and muscle cells. These observations suggest that the slugs have the capability to recognize differences in cell-surface molecules between the allogeneic and recipient tissue, and that an allograft is chronically rejected due to a type of immunocyte (macrophage that can induce perforin-dependent cell death

  14. Wetland Preservation in Australia: The Administrative and Policital Threats

    Mark Yaolin Wang

    2008-01-01

    The wetlands in Australia are of great physical, chemical and biological variety due to the continent's age, geological history and climate. The traditional physical and biological threats remain as the main challenges for wetland preservation in Australia. However, it has been increasingly recognized that the immediate survival of wetlands are being affected by more subtle threats, such as administrative and political threats. This paper identifies these non-physical threats and discusses how and why they have become the major barriers for sustainable wetland preservation in Australia. Finally, this paper calls for more practical policies and solutions to be implemented for sustainable wetland preservation in Australia.

  15. Stereotype Threat Alters the Subjective Experience of Memory.

    Mazerolle, Marie; Régner, Isabelle; Rigalleau, François; Huguet, Pascal

    2015-01-01

    There is now evidence that negative age-related stereotypes about memory reduce older adults' memory performance, and inflate age differences in this domain. Here, we examine whether stereotype threat may also influence the basic feeling that one is more or less able to remember. Using the Remember/Know paradigm, we demonstrated that stereotype threat conducted older adults to a greater feeling of familiarity with events, while failing to retrieve any contextual detail. This finding indicates that stereotype threat alters older adults' subjective experience of memory, and strengthens our understanding of the mechanisms underlying stereotype threat effects. PMID:27120561

  16. Stereotype threat in salary negotiations is mediated by reservation salary.

    Tellhed, Una; Björklund, Fredrik

    2011-04-01

    Women are stereotypically perceived as worse negotiators than men, which may make them ask for less salary than men when under stereotype threat (Kray et al., 2001). However, the mechanisms of stereotype threat are not yet properly understood. The current study investigated whether stereotype threat effects in salary negotiations can be explained by motivational factors. A total of 116 business students negotiated salary with a confederate and were either told that this was diagnostic of negotiating ability (threat manipulation) or not. Measures of minimum (reservation) and ideal (aspiration) salary goals and regulatory focus were collected. The finding (Kray et al., 2001) that women make lower salary requests than men when under stereotype threat was replicated. Women in the threat condition further reported lower aspiration salary, marginally significantly lower reservation salary and less eagerness/more vigilance than men. Reservation salary mediated the stereotype threat effect, and there was a trend for regulatory focus to mediate the effect. Thus, reservation salary partly explains why women ask for less salary than men under stereotype threat. Female negotiators may benefit from learning that stereotype threat causes sex-differences in motivation. PMID:21077905

  17. Solar-terrestrial models and application software

    Bilitza, D.

    1992-01-01

    The empirical models related to solar-terrestrial sciences are listed and described which are available in the form of computer programs. Also included are programs that use one or more of these models for application specific purposes. The entries are grouped according to the region of their solar-terrestrial environment to which they belong and according to the parameter which they describe. Regions considered include the ionosphere, atmosphere, magnetosphere, planets, interplanetary space, and heliosphere. Also provided is the information on the accessibility for solar-terrestrial models to specify the magnetic and solar activity conditions.

  18. Thermoluminescence of meteorites and their terrestrial ages

    Melcher, C. L.

    1981-05-01

    A technique for determining chondritic meteorite terrestrial ages based on the measurement of a normalized thermoluminescence (TL) is presented and applied to samples of 11 recently discovered Antarctic meteorites. Measurements of TL levels normalized to individual meteorite TL sensitivities are presented for 45 chondrites of known terrestrial ages and shown to increase with decreasing terrestrial age. Differences in TL levels in meteorites of the same terrestrial ages are attributed to differences in orbital temperatures. TL levels determined in initial rise experiments for the Antarctic meteorites are found to indicate ages which show a rough correlation with those deduced from C-14, Al-26 and Cl-36 studies. Due to the rapidity and low material requirements of TL measurements, it is proposed that TL determinations be used as screening process to select the most interesting samples for further study by other, more exact, techniques.

  19. The Circumpolar Biodiversity Monitoring Program Terrestrial Plan

    Christensen, Tom; Payne, J.; Doyle, M.;

    The Conservation of Arctic Flora and Fauna (CAFF), the biodiversity working group of the Arctic Council, established the Circumpolar Biodiversity Monitoring Program (CBMP) to address the need for coordinated and standardized monitoring of Arctic environments in terrestrial, marine, freshwater and...... coastal environments. The CBMP Terrestrial Plan is a framework to focus and coordinate monitoring of terrestrial biodiversity across the Arctic. The goal of the plan is to improve the collective ability of Arctic traditional knowledge (TK) holders, northern communities, and scientists to detect......, understand and report on long-term change in Arctic terrestrial ecosystems and biodiversity, and to identify knowledge gaps and priorities. This poster will outline the key management questions the plan aims to address and the proposed nested, multi-scaled approach linking targeted, research based monitoring...

  20. Terrestrial Ecosystems of the Conterminous United States

    U.S. Geological Survey, Department of the Interior — The U.S. Geological Survey (USGS) modeled the distribution of terrestrial ecosystems for the contiguous United States using a standardized, deductive approach to...

  1. Possible climates on terrestrial exoplanets.

    Forget, F; Leconte, J

    2014-04-28

    What kind of environment may exist on terrestrial planets around other stars? In spite of the lack of direct observations, it may not be premature to speculate on exoplanetary climates, for instance, to optimize future telescopic observations or to assess the probability of habitable worlds. To begin with, climate primarily depends on (i) the atmospheric composition and the volatile inventory; (ii) the incident stellar flux; and (iii) the tidal evolution of the planetary spin, which can notably lock a planet with a permanent night side. The atmospheric composition and mass depends on complex processes, which are difficult to model: origins of volatiles, atmospheric escape, geochemistry, photochemistry, etc. We discuss physical constraints, which can help us to speculate on the possible type of atmosphere, depending on the planet size, its final distance for its star and the star type. Assuming that the atmosphere is known, the possible climates can be explored using global climate models analogous to the ones developed to simulate the Earth as well as the other telluric atmospheres in the solar system. Our experience with Mars, Titan and Venus suggests that realistic climate simulators can be developed by combining components, such as a 'dynamical core', a radiative transfer solver, a parametrization of subgrid-scale turbulence and convection, a thermal ground model and a volatile phase change code. On this basis, we can aspire to build reliable climate predictors for exoplanets. However, whatever the accuracy of the models, predicting the actual climate regime on a specific planet will remain challenging because climate systems are affected by strong positive feedbacks. They can drive planets with very similar forcing and volatile inventory to completely different states. For instance, the coupling among temperature, volatile phase changes and radiative properties results in instabilities, such as runaway glaciations and runaway greenhouse effect. PMID:24664919

  2. Terrestrial teleconnections link global rivers

    O'Loughlin, F.; Howden, N. J.; Woods, R. A.; Bates, P. D.

    2013-12-01

    . Aside from these practical applications, the results also suggest teleconnections exist between terrestrial, as well as ocean and atmospheric water systems.

  3. Norwegian assessment of nuclear and radiological threats

    Full text: There has previously been a series of severe accidents and other events around the world, which has lead to health effects and severe consequences to the environment as a result of ionising radiation. Some of the most severe accidents have been related to explosions or fires in nuclear installations and high dose levels due to orphan sources. Even though the Norwegian nuclear industry is limited, it has since the Chernobyl accident in 1986 been Norwegian policy to have a particular emergency preparedness towards nuclear or radiological events. In order to maintain an effective emergency preparedness with limited resources, it is necessary to have a good understanding of possible scenarios and related consequences. Norwegian authorities are therefore continuously assessing nuclear and radiological threats. Norwegian emergency preparedness has to a large extent been directed towards scenarios where an accident at a foreign nuclear installation leads to radioactive volumes of air passing over Norway, causing considerable deposition over large geographical areas. Norway is neighbouring the Kola Peninsula, where there was a considerable nuclear development during the cold war. Due to their close vicinity to the Norwegian border and poor conditions at some of the sites, possible accidents at nuclear installations on the Kola Peninsula in Russia have been emphasised in Norwegian emergency preparedness. However, Norwegian and international efforts have contributed to improve the conditions at several sites on the Kola Peninsula. Improved safety and physical protection at these sites have reduced the risk for cross-border contamination. Furthermore, extensive decommissioning and dismantlement of aged nuclear submarines have reduced the number of nuclear objects of particular concern. Meanwhile, the latest changes in the international security environment have made one consider a new set of scenarios, involving e.g. massive attacks on nuclear installations. Aging

  4. The Diversity of Extrasolar Terrestrial Planets

    Bond, J. C.; Lauretta, D. S.; O'Brien, D P

    2010-01-01

    Extrasolar planetary host stars are enriched in key planet-building elements. These enrichments have the potential to drastically alter the building blocks available for terrestrial planet formation. Here we report on the combination of dynamical models of late-stage terrestrial planet formation within known extrasolar planetary systems with chemical equilibrium models of the composition of solid material within the disk. This allows us to constrain the bulk elemental composition of extrasola...

  5. The NASA-Lewis terrestrial photovoltaics program

    Bernatowicz, D. T.

    1974-01-01

    Those parts of the present NASA-Lewis research and technology effort on solar cells and arrays having relevance to terrestrial uses are outlined. These include raising cell efficiency, developing the FEP-covered module concept, and exploring low-cost cell concepts. Solar cell-battery power systems for remote weather stations have been built to demonstrate the capabilities of solar cells for terrestrial applications.

  6. Solar- Terrestrial Physics: A Space Age Birth

    Schunk, R. W.

    1986-01-01

    Solar- Terrestrial Physics, in its broadest sense, is concerned with the transport of energy, particles, and fields from the sun to the earth and their consequent effect on the terrestrial environment. Most of the solar energy eventually deposited in our atmosphere, at a rate of approximately a trillion megawatts, arrives in the form of visible light. The study of how this energy affects our environment falls within the purview of meteorology, a discipline that has experienced an independent ...

  7. The Use of Mineral Facies Models of Terrestrial Saline Lakes as Potential Guides to the Origin of Martian Phyllosilicates

    Bristow, T. F.; Milliken, R. E.

    2011-03-01

    Physiochemical controls on the spatial and stratigraphic trends of clay minerals in terrestrial saline lakes are presented with the aim of providing additional criteria for determining the origins of martian phyllosilicates.

  8. Relative importance of multiple factors on terrestrial loading of DOC to Arctic river networks

    Kicklighter, David W. [Ecosystem Center, The; Hayes, Daniel J [ORNL; Mcclelland, James W [University of Texas; Peterson, Bruce [Marine Biological Laboratory; Mcguire, David [University of Alaska; Melillo, Jerry [Marine Biological Laboratory

    2014-01-01

    Terrestrial carbon dynamics influence the contribution of dissolved organic carbon (DOC) to river networks in addition to controlling carbon fluxes between the land surface and the atmosphere. In this study, we use a biogeochemical process model to simulate the lateral transfer of DOC from land to the Arctic Ocean via riverine transport. We estimate that the pan-arctic watershed has contributed, on average, 32 Tg C/yr of DOC to the Arctic Ocean over the 20th century with most coming from the extensive area of boreal deciduous needle-leaved forests and forested wetlands in Eurasian watersheds. We also estimate that the rate of terrestrial DOC loading has been increasing by 0.037 Tg C/yr2 over the 20th century primarily as a result of increases in air temperatures and precipitation. These increases have been partially compensated by decreases in terrestrial DOC loading caused by wildfires. Other environmental factors (CO2 fertilization, ozone pollution, atmospheric nitrogen deposition, timber harvest, agriculture) are estimated to have relatively small effects on terrestrial DOC loading to arctic rivers. The effects of the various environmental factors on terrestrial carbon dynamics have both compensated and enhanced concurrent effects on hydrology to influence terrestrial DOC loading. Future increases in riverine DOC concentrations and export may occur from warming-induced increases in terrestrial DOC production associated with enhanced microbial metabolism and the exposure of additional organic matter from permafrost degradation along with decreases in water yield associated with warming-induced increases in evapotranspiration. Improvements in simulating terrestrial DOC loading to pan-arctic rivers in the future will require better information on the spatial distribution of precipitation and its temporal trends, carbon dynamics of larch-dominated ecosystems in eastern Siberia, and the role of industrial organic effluents on carbon budgets of rivers in western

  9. Synergistic Antimicrobial Effect of Tribulus terrestris and Bitter Almond Extracts

    Hamid Abtahi

    2014-12-01

    Full Text Available Background: The antimicrobial effects of the extracts of different kinds of plants have been demonstrated in several studies. However, no study has been conducted so far on the synergistic effects of two herbal extracts on their germicidal effects. In this study, in addition to antibacterial effects of the aqueous, methanol or ethanol extracts of Tribulus terrestris and bitter almond on some bacteria, the synergistic effects of the extracts of these two plants were also evaluated. Materials and Methods: In this experimental study, water, methanol and ethanol extracts of seeds were screened against some bacterial strains. Seeds were extracted by percolation method. Aliquots of the extracts at variable concentrations were then incubated with different bacterial strains, and the antimicrobial activities of the extracts from seeds were determined by MIC. Three antibiotics were used as reference compounds for antibacterial activities. Seeds extract inhibited significantly the growth of the tested bacterial strains. Results: The greatest synergistic effect of T. terrestris and bitter almond extracts is detected in methanol and aqueous extracts. Among the bacterial strains tested, Staphylococcus aureus was most susceptibility. Conclusion: The results showed the highest antibacterial effect in the combination of methanol extract of T. terrestris and the aqueous extract of the bitter almond.

  10. Accelerated Sequestration of Terrestrial Plant Biomass in the Deep Ocean

    Strand, S. E.

    2010-12-01

    One of the most efficient uses of aboveground agricultural residues to reduce atmospheric CO2 is burial in sites removed from contact with the atmosphere and in which degradation of lignocellulose is inhibited (Strand and Benford 2009). Similarly by burying forest residues greater benefits for atmospheric carbon accrue compared to incineration or bioethanol production. Accessible planetary sites that are most removed from contact with the atmosphere are primarily the deep ocean sediments. Many deep ocean sediment ecologies are acclimated to massive inputs of terrestrial plant biomass. Nonetheless, marine degradation rates of lignocellulose are slower than terrestrial rates (Keil et al. 2010). Additionally, anaerobic conditions are easily achieved in many deep ocean sediments, inhibiting lignocellulose degradation further, while the dominance of sulfate in the water column as electron acceptor prevents the release of methane from methanogenesis to the atmosphere. The potential benefit of massive removal of excess terrestrial biomass to the deep ocean will be estimated and compared to other uses including biochar and BECS. The impact of the biomass on the marine environment will be discussed and potential sequestration sites in the Gulf of Mexico and the Atlantic compared. Keil, R. G., J. M. Nuwer, et al. (2010). "Burial of agricultural byproducts in the deep sea as a form of carbon sequestration: A preliminary experiment." Marine Chemistry (In Press, online 6 August 2010). Strand, S. E. and G. Benford (2009). "Ocean sequestration of crop residue carbon: recycling fossil fuel carbon back to deep sediments." Environ. Sci. Technol. 43(4): 1000-1007.

  11. Characterizing Earth-like Planets with Terrestrial Planet Finder

    Seager, S; Turner, E L

    2002-01-01

    For the first time in human history the possibility of detecting and studying Earth-like planets is on the horizon. Terrestrial Planet Finder (TPF), with a launch date in the 2015 timeframe, is being planned by NASA to find and characterize planets in the habitable zones of nearby stars. The mission Darwin from ESA has similar goals. The motivation for both of these space missions is the detection and spectroscopic characterization of extrasolar terrestrial planet atmospheres. Of special interest are atmospheric biomarkers--such as O2, O3, H2O, CO and CH4--which are either indicative of life as we know it, essential to life, or can provide clues to a planet's habitability. A mission capable of measuring these spectral features would also obtain sufficient signal-to-noise to characterize other terrestrial planet properties. For example, physical characteristics such as temperature and planetary radius can be constrained from low- resolution spectra. In addition, planet characteristics such as weather, rotation...

  12. A Probabilistic Analysis Framework for Malicious Insider Threats

    Chen, Taolue; Kammuller, Florian; Nemli, Ibrahim;

    2015-01-01

    Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining behaviour exist, but there is little work to relate them to formal approaches to insider threat detection. In this work we present a general formal framework to perform analysis for malicious insider...

  13. Personality, threat and affective responses to cultural diversity

    Van der Zee, Karen; Van der Gang, Ineke

    2007-01-01

    The present study tried to reconcile assumptions from Terror Management Theory that individual differences in openness to diversity are enhanced by existential threat with own recent findings suggesting that individual differences are diminished by threat. A model was supported assuming that it is t

  14. A Stereotype Threat Account of Boys' Academic Underachievement

    Hartley, Bonny L.; Sutton, Robbie M.

    2013-01-01

    Three studies examined the role of stereotype threat in boys' academic underachievement. Study 1 (children aged 4-10, n = 238) showed that girls from age 4 years and boys from age 7 years believed, and thought adults believed, that boys are academically inferior to girls. Study 2 manipulated stereotype threat, informing children aged…

  15. An examination of stereotype threat effects on girls' mathematics performance.

    Ganley, Colleen M; Mingle, Leigh A; Ryan, Allison M; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-10-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In a series of 3 studies, with a total sample of 931 students, we investigated stereotype threat effects during childhood and adolescence. Three activation methods were used, ranging from implicit to explicit. Across studies, we found no evidence that the mathematics performance of school-age girls was impacted by stereotype threat. In 2 of the studies, there were gender differences on the mathematics assessment regardless of whether stereotype threat was activated. Potential reasons for these findings are discussed, including the possibility that stereotype threat effects only occur in very specific circumstances or that they are in fact occurring all the time. We also address the possibility that the literature regarding stereotype threat in children is subject to publication bias. PMID:23356523

  16. An Integrated Process Model of Stereotype Threat Effects on Performance

    Schmader, Toni; Johns, Michael; Forbes, Chad

    2008-01-01

    Research showing that activation of negative stereotypes can impair the performance of stigmatized individuals on a wide variety of tasks has proliferated. However, a complete understanding of the processes underlying these stereotype threat effects on behavior is still lacking. The authors examine stereotype threat in the context of research on…

  17. Lack of Stereotype Threat at a Liberal Arts College

    Rivardo, Mark G.; Rhodes, Michael E.; Klein, Brandi

    2008-01-01

    Stereotype threat has been demonstrated to reduce the performance of stereotyped individuals in the threatened domain (Steele & Aronson, 1995). This study attempted to replicate the finding that stereotype threat instruction can erase the performance deficit women experience in math performance (Johns, Schmader, & Martens, 2005) and to further…

  18. Does Manipulating Stereotype Threat Condition Change Performance Goal State

    Simmons, Cecil Max

    2010-01-01

    This study tested whether the Stereotype Threat effect is mediated by achievement goals, in particular performance-avoidance goals. Threat level was altered before a difficult math test to observe how the endorsement by females of various achievement goal dimensions was affected. 222 people (96 females) in a pre-calculus class at a Mid-Western…

  19. Threat Level High (School): Curriculum Reform with Violence in Mind

    Hawkes, T. Elijah; Twemlow, Stuart W.

    2015-01-01

    When school communities are troubled by violence, or threats of violence, at the hands of young people, educators have an opportunity to learn about aggression and adolescent identity development. A disturbing threat incident provides the point of departure for this principal's reflection on how high school curriculum can better meet the identity…

  20. Protected Areas in Tropical Africa: Assessing Threats and Conservation Activities

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M.; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A.; Davenport, Tim R. B.; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A.; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C.; Holbech, Lars H.; Huijbregts, Bas; Kühl, Hjalmar S.; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K.; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G.; Petre, Charles-Albert; Rainey, Hugo J.; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M.; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration. PMID:25469888

  1. Superior Detection of Threat-Relevant Stimuli in Infancy

    LoBue, Vanessa; DeLoache, Judy S.

    2010-01-01

    The ability to quickly detect potential threat is an important survival mechanism for humans and other animals. Past research has established that adults have an attentional bias for the detection of threat-relevant stimuli, including snakes and spiders as well as angry human faces. Recent studies have documented that preschool children also…

  2. Protected areas in tropical Africa: assessing threats and conservation activities.

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A; Davenport, Tim R B; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C; Holbech, Lars H; Huijbregts, Bas; Kühl, Hjalmar S; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G; Petre, Charles-Albert; Rainey, Hugo J; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration. PMID:25469888

  3. Protected areas in tropical Africa: assessing threats and conservation activities.

    Sandra Tranquilli

    Full Text Available Numerous protected areas (PAs have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  4. Threat-Related Attentional Bias in Anxious Youth: A Review

    Puliafico, Anthony C.; Kendall, Philip C.

    2006-01-01

    The research literature suggests that children and adolescents suffering from anxiety disorders experience cognitive distortions that magnify their perceived level of threat in the environment. Of these distortions, an attentional bias toward threat-related information has received the most theoretical and empirical consideration. A large volume…

  5. Anxiety and threat perception abnormalities in normal children.

    P. Muris; M. Kindt; S. Boegels; H. Merckelbach; B, Gadet; V. Moulaert

    2000-01-01

    Examined the relationship between childhood anxiety and threat perception abnormalities. 105 children (aged 8-13 yrs) were exposed to stories reflecting 3 types of anxiety: social anxiety, separation anxiety, and generalized anxiety. From children's reactions to the stories, a number of threat perce

  6. Threat Detection in Tweets with Trigger Patterns and Contextual Cues

    Spitters, M.M.; Eendebak, P.T.; Worm, D.T.H.; Bouma, H.

    2014-01-01

    Many threats in the real world can be related to activities in open sources on the internet. Early detection of threats based on internet information could assist in the prevention of incidents. However, the amount of data in social media, blogs and forums rapidly increases and it is time consuming

  7. 78 FR 46782 - Federal Acquisition Regulation; Iran Threat Reduction

    2013-08-01

    ... RIN 9000-AM44 Federal Acquisition Regulation; Iran Threat Reduction AGENCIES: Department of Defense... Revolutionary Guard Corps, as contained in titles II and III of the Iran Threat Reduction and Syria Human Rights... Federal Register at 77 FR 73516, on December 10, 2012, to implement sections of titles II and III of...

  8. 75 FR 60430 - Federal Advisory Committee; Threat Reduction Advisory Committee

    2010-09-30

    ... of the Secretary Federal Advisory Committee; Threat Reduction Advisory Committee AGENCY: Office of... announces a meeting of the Threat Reduction Advisory Committee (hereafter referred to as ``the Committee..., October 21, 2010, from 9 a.m. to 5 p.m. ADDRESSES: The meeting will be held at the Heritage...

  9. Combating threats of bankruptcy to large energy consumers

    In spite of the outstanding advantages pointed out in the early privatization period in Croatia, the course of development taken by liberalized energy markets in Europe poses a number of threats of bankruptcy to large energy consumers. The paper presents several ways of combating these threats.(author)

  10. Superluminous supernovae: No threat from Eta Carinae

    Thomas, Brian C; Fields, Brian D; Anthony-Twarog, Barbara J

    2007-01-01

    Recently Supernova 2006gy was noted as the most luminous ever recorded, with a total radiated energy of ~10^44 Joules. It was proposed that the progenitor may have been a massive evolved star similar to Eta Carinae, which resides in our own galaxy at a (poorly determined) distance of ~2.5 kpc. Eta Carinae appears ready to detonate, and in fact had an outburst in 1843. Although it is too distant to pose a serious threat as a normal supernova, and given its rotation axis is unlikely to produce a Gamma Ray Burst oriented toward the Earth, Eta Carinae is about 30,000 times nearer than 2006gy, and we re-evaluate it as a potential superluminous supernova. We find that given the large ratio of emission in the optical to the X-ray, atmospheric effects are negligible. Ionization of the atmosphere and concomitant ozone depletion are unlikely to be important. Any cosmic ray effects should be spread out over ~10^4 y, and similarly unlikely to produce any serious perturbation to the biosphere. We also discuss a new possib...

  11. Gonococcal endocarditis: an ever-present threat

    Kawabata, Vitor Sérgio; Bittencourt, Márcio Sommer; Lovisolo, Silvana Maria; Felipe-Silva, Aloísio; de Lemos, Ana Paula Silva

    2016-01-01

    The incidence of severe complications of the Neisseria gonorrhoeae infection has presented variations over recent decades since the advent of penicillin. Gonococcal endocarditis (GE) still remains an ever-present threat afflicting the society’s poor and sexually active young population. This entity frequently requires surgical intervention and usually exhibits a poor outcome. The interval between the onset of symptoms and the diagnosis does not usually exceed 4 weeks. One of the characteristics of GE is a proclivity for aortic valve involvement with large vegetation and valve ring abscess formation. The authors report the case of a young man with a 2-week history of fever, malaise, weakness, and progressive heart failure symptoms, who had no previous history of genital complaints or cardiopathy. The physical examination was consistent with acute aortic insufficiency, which was most probably of an infectious origin. The echocardiogram showed thickened aortic cusps and valve insufficiency. After hospital admission, the patient’s clinical status worsened rapidly and he died on the second day. The autopsy findings disclosed aortic valve destruction with vegetation and a ring abscess besides signs of septic shock, such as diffuse alveolar damage, acute tubular necrosis, and zone 3 hepatocellular necrosis. The blood culture isolated N. gonorrhoeae resistant to penicillin and ciprofloxacin. The authors call attention to the pathogen of this particular infectious endocarditis, and the need for early diagnosis and evaluation by a cardiac surgery team. PMID:27547739

  12. Gonococcal endocarditis: an ever-present threat.

    de Campos, Fernando Peixoto Ferraz; Kawabata, Vitor Sérgio; Bittencourt, Márcio Sommer; Lovisolo, Silvana Maria; Felipe-Silva, Aloísio; de Lemos, Ana Paula Silva

    2016-01-01

    The incidence of severe complications of the Neisseria gonorrhoeae infection has presented variations over recent decades since the advent of penicillin. Gonococcal endocarditis (GE) still remains an ever-present threat afflicting the society's poor and sexually active young population. This entity frequently requires surgical intervention and usually exhibits a poor outcome. The interval between the onset of symptoms and the diagnosis does not usually exceed 4 weeks. One of the characteristics of GE is a proclivity for aortic valve involvement with large vegetation and valve ring abscess formation. The authors report the case of a young man with a 2-week history of fever, malaise, weakness, and progressive heart failure symptoms, who had no previous history of genital complaints or cardiopathy. The physical examination was consistent with acute aortic insufficiency, which was most probably of an infectious origin. The echocardiogram showed thickened aortic cusps and valve insufficiency. After hospital admission, the patient's clinical status worsened rapidly and he died on the second day. The autopsy findings disclosed aortic valve destruction with vegetation and a ring abscess besides signs of septic shock, such as diffuse alveolar damage, acute tubular necrosis, and zone 3 hepatocellular necrosis. The blood culture isolated N. gonorrhoeae resistant to penicillin and ciprofloxacin. The authors call attention to the pathogen of this particular infectious endocarditis, and the need for early diagnosis and evaluation by a cardiac surgery team. PMID:27547739

  13. Nuclear weapons: new threats, new challenges

    After a brief history of the Iranian nuclear crisis since 2003, the author discusses the four aspects of this crisis which make it a textbook case: a country which wants to control the whole nuclear process and therefore may reach the capacity to produce military-grade uranium (this raises the question of the relationship between nuclear energy and disarmament), the validity and efficiency of international controls is at stake, divergence may appear on the ways to have international treaties respected (different approaches between Europe and the USA), a country which is looking for nuclear weapon for matters of regional security and power (this raises the issue of a new approach to security). Then, the author describes the new nuclear threats: proliferating states, terrorist groups, and states with nuclear weapons (attitude of the USA, China, Russia, France and the United Kingdom, perspective of a nuclear disarmament of Europe). He gives an overview of the current status of disarmament and of treaties (START, NPT), and discusses the opportunities to save the non proliferation treaty from collapsing in 2005

  14. Calculating the new global nuclear terrorism threat

    Experts from around the world are meeting at the IAEA on 29 October to 2 November at an international symposium on nuclear safeguards, verification, and security. A special session on 2 November focuses on the issue of combating nuclear terrorism. Although terrorists have never used a nuclear weapon, reports that some terrorist groups, particularly al-Qaeda, have attempted to acquire nuclear material is a cause of great concern. According to the IAEA, since 1993, there have been 175 cases of trafficking in nuclear material and 201 cases of trafficking in other radioactive sources (medical, industrial). However, only 18 of these cases have actually involved small amounts of highly enriched uranium or plutonium, the material needed to produce a nuclear bomb. IAEA experts judge the quantities involved to be insufficient to construct a nuclear explosive device. The IAEA experts have evaluated the risks for nuclear terrorism in these three categories: Nuclear facilities; Nuclear Material; Radioactive Sources. The IAEA is proposing a number of new initiatives, including strengthening border monitoring, helping States search for and dispose of orphan sources and strengthening the capabilities of the IAEA Emergency Response Centre to react to radiological emergencies following a terrorist attack. In the short term, the IAEA estimates that at least $30-$50 million annually will be needed to strengthen and expand its programs to meet this terrorist threat

  15. Nuclear threat. A clear and present danger

    It was disappointed at the discussion in the review conference of the NPT held in 2005. The fact may be caused by the estrangement between the international urgent issues related to the non-proliferation and the effectiveness of archaic measures through the NPT. However, it should not be recognized that the international obligation and worth of NPT has been gone. The NPT referred the typical international situation under the cold war era. Although several permanent issues of the nuclear non-proliferation exist in current discussions, the activities relevant to the NPT may not be effect against newly unstable situations after the September 11th of 2001. Urgent challenges to be taken are that we must strictly analyze the interventions between 'the clear and present danger' of our world and the nuclear herms, and must take appropriate actions toward them without influences from previous international situations that might be subsisted in current international treaties and agreements. This paper identified the features of nuclear threats based on the four categories and examined the possibilities of nuclear terrorism from previous facts with the inductive inference. The results identified the possibility of nuclear facility attack and of radioactive materials theft by the Polico-Religious Groups and others are stood out. The authors would suggest the important of urgent recognition to establish the certain security system against nuclear terrorism. (author)

  16. The nuclear threat; La menace nucleaire

    Tertrais, Bruno

    2011-01-26

    For a long time, a small group of big powers has been the only holder of nuclear weapons (US, USSR, Great Britain, France and China). Since then, new weapons have come out on the geopolitical scene: Israel, India, Pakistan, and some others remain uncertain and generate a worrying atmosphere (North Korea, Iran..). But what is the real risk with nuclear proliferation? Should we dread about it? Is nuclear terrorism a real threat? What are the political stakes of nuclear weapons? Is disarmament a real solution? These are some of the questions that the author answers in a precise and clear manner in this book. Contents: 1 - from monopoly to proliferation: who owns nuclear weapons today, why is it so coveted, is it easy to make one?; 2 - the newcomers: what do we really know about the Iranian nuclear programme, Iran and North Korea: between negotiation and confrontation; 3 - international control and regulation: do we have reliable information, how do we know what we know, Iraq: was there a 'lie' somewhere, who are the states who have renounced nuclear weapons?; 4 - the future: is there still a nuclear warfare risk, what if Pakistani weapons fall into islamic hands, is nuclear terrorism a fantasy or a real risk?

  17. [Chikungunya fever - A new global threat].

    Montero, Antonio

    2015-08-01

    The recent onset of epidemics caused by viruses such as Ebola, Marburg, Nipah, Lassa, coronavirus, West-Nile encephalitis, Saint Louis encephalitis, human immunodeficiency virus, dengue, yellow fever and Venezuelan hemorrhagic fever alerts about the risk these agents represent for the global health. Chikungunya virus represents a new threat. Surged from remote African regions, this virus has become endemic in the Indic ocean basin, the Indian subcontinent and the southeast of Asia, causing serious epidemics in Africa, Indic Ocean Islands, Asia and Europe. Due to their epidemiological and biological features and the global presence of their vectors, chikungunya represents a serious menace and could become endemic in the Americas. Although chikungunya infection has a low mortality rate, its high attack ratio may collapse the health system during epidemics affecting a sensitive population. In this paper, we review the clinical and epidemiological features of chikungunya fever as well as the risk of its introduction into the Americas. We remark the importance of the epidemiological control and mosquitoes fighting in order to prevent this disease from being introduced into the Americas. PMID:25087211

  18. Fructose; a Hidden Threat for Chronic Diseases

    Ahmet Korkmaz

    2008-08-01

    Full Text Available Incremental usage of the fructose derived from corn by processed-food manufacturers has become a crucial threat in terms of human health. Although it is known as fruit sugar, the most important source of dietary fructose is now, processed-food prepared by using high-fructose corn syrup. Basically, fructose is metabolized within liver and its energy load is equal to glucose. Nevertheless, it does not make up satiety and fullness. Therefore, fructose-rich foods and beverages can be consumed in large amount because the absence of satiety. Studies performed recently unveil a connection between amount of fructose consumed and metabolic disorders such as cardiovascular diseases, type 2 diabetes, hypertension and obesity. The incidence of metabolic diseases which are already affecting more than half of the adults has been increasing among children. Moreover, these types of foods are generally consumed by children. Therefore, in order to reduce the frequency of metabolic disorders in all ages, the amount of fructose in processed-foods and beverages should also be taken into consideration. [TAF Prev Med Bull 2008; 7(4.000: 343-346

  19. Weapons of mass destruction - current security threat

    This publication brings a complex and comprehensive view of the weapons of mass destruction phenomenon in the context of present military and political situation. It emphasizes the threat posed by proliferation of these destructive devices and their carriers as well as the threat present in their possession by unpredictable totalitarian regimes or terrorist groups. The publication is structured into four basic parts: Introduction Into The Topic, Nuclear Weapons, Chemical Weapons and Biological Weapons. The Introduction reflects the latest developments on the field of military technologies, which lead to the development of new destructive devices with characteristics comparable to basic types of WMDs - nuclear, chemical and biological. Based on the definition of WMD as 'weapon systems with enormous impact causing mass destruction, population, equipment and material losses', the modern mass destruction devices are assorted here, such as ecological, radiological and beam weapons, aerosol and container intelligent ammunition, the outburst of dangerous chemical substances from infrastructure, non-conventional weapons and military devices. The Nuclear Weapons part depicts the most destructive device of mass destruction mankind ever invented in close detail. It maps the history of most significant discoveries in nuclear physics, development and construction of the first nuclear weapons, accumulation of nuclear warheads and their carriers in the Cold war era, attempts of nuclear disarmament and reducing the number of nuclear weapons in possession of superpowers and their proliferation in the world's crisis regions including North Korea and Iran. The chapters devoted to theoretical grounds and physical principles of nuclear and thermonuclear weapons' functioning, the main categories and types, as well as destructive effects and consequences of use contain an adequate mathematical apparatus. This chapter's conclusion brings the overview of nuclear armament of states that

  20. Environmental degradation and environmental threats in China.

    Wang, Ying

    2004-01-01

    The article presents a review of environmental degradation and its threats in China. Air pollution, water pollution, deforestation, soil degradation, sand depositing in dams, decaying urban infrastructure, and more and more hazards such as floods, landslides and soil erosion are major consequences of environmental degradation and are making tremendous loss both in life and property. Through investigation, the author found that poor air quality in the large cities; water pollution in the downstream of many rivers; the multiple problems of many mining areas; lack of access to fresh water; decaying sewage systems; and the disastrous impact of these environmental degradations on public health and agricultural products in many provinces is rather serious. Relationship of environmental degradation and natural hazards is close; more attention should be put in environmental degradation that may surpass economy progress if the trend continues. It is therefore imperative that Chinese government undertake a series of prudent actions now that will enable to be in the best possible position when the current environmental crisis ultimately passes. PMID:15887370

  1. Instantaneous threat escape and differentiated refuge demand among zooplankton taxa.

    Hansson, Lars-Anders; Bianco, Giuseppe; Ekvall, Mikael; Heuschele, Jan; Hylander, Samuel; Yang, Xi

    2016-02-01

    Most animals, including aquatic crustacean zooplankton, perform strong avoidance movements when exposed to a threat, such as ultraviolet radiation (UVR). We here show that the genera Daphnia and Bosmina instantly adjust their vertical position in the water in accordance with the present UVR threat, i.e., seek refuge in deeper waters, whereas other taxa show less response to the threat. Moreover, Daphnia repeatedly respond to UVR pulses, suggesting that they spend more energy on movement than more stationary taxa, for example, during days with fluctuating cloud cover, illustrating nonlethal effects in avoiding UVR threat. Accordingly, we also show that the taxa with the most contrasting behavioral responses differ considerably in photoprotection, suggesting different morphological and behavioral strategies in handling the UVR threat. In a broader context, our studies on individual and taxa specific responses to UVR provide insights into observed spatial and temporal distribution in natural ecosystems. PMID:27145603

  2. Solar Terrestrial Relations Observatory (STEREO)

    Davila, Joseph M.; Rust, David M.; Pizzo, Victor J.; Liewer, Paulett C.

    1996-11-01

    The solar output changes on a variety of timescales, from minutes, to years, to tens of years and even to hundreds of years. The dominant timescale of variation is, of course, the 11-year solar cycle. Observational evidence shows that the physics of solar output variation is strongly tied to changes in the magnetic field, and perhaps the most dramatic manifestation of a constantly changing magnetic field is the Coronal Mass Ejection (CME). On August 5 - 6, 1996 the Second Workshop to discuss missions to observe these phenomena from new vantage points, organized by the authors, was held in Boulder, Colorado at the NOAA Space Environmental Center. The workshop was attended by approximately 20 scientists representing 13 institutions from the United States and Europe. The purpose of the Workshop was to discuss the different concepts for multi- spacecraft observation of the Sun which have been proposed, to develop a list of scientific objectives, and to arrive at a consensus description of a mission to observe the Sun from new vantage points. The fundamental goal of STEREO is to discover how coronal mass ejections start at the Sun and propagate in interplanetary space. The workshop started with the propositions that coronal mass ejections are fundamental manifestations of rapid large-scale change in the global magnetic structure of the Sun, that CME's are a major driver of coronal evolution, and that they may play a major role in the solar dynamo. Workshop participants developed a mission concept that will lead to a comprehensive characterization of CME disturbances through build-up, initiation, launch, and propagation to Earth. It will also build a clear picture of long-term evolution of the corona. Participants in the workshop recommended that STEREO be a joint mission with the European scientific community and that it consist of four spacecraft: `East' at 1 AU near L4, 60 deg from EArth to detect active regions 5 days before they can be seen by terrestrial telescopes

  3. Groundwater and Terrestrial Water Storage

    Rodell, Matthew; Chambers, Don P.; Famiglietti, James S.

    2011-01-01

    Most people think of groundwater as a resource, but it is also a useful indicator of climate variability and human impacts on the environment. Groundwater storage varies slowly relative to other non-frozen components of the water cycle, encapsulating long period variations and trends in surface meteorology. On seasonal to interannual timescales, groundwater is as dynamic as soil moisture, and it has been shown that groundwater storage changes have contributed to sea level variations. Groundwater monitoring well measurements are too sporadic and poorly assembled outside of the United States and a few other nations to permit direct global assessment of groundwater variability. However, observational estimates of terrestrial water storage (TWS) variations from the GRACE satellites largely represent groundwater storage variations on an interannual basis, save for high latitude/altitude (dominated by snow and ice) and wet tropical (surface water) regions. A figure maps changes in mean annual TWS from 2009 to 2010, based on GRACE, reflecting hydroclimatic conditions in 2010. Severe droughts impacted Russia and the Amazon, and drier than normal weather also affected the Indochinese peninsula, parts of central and southern Africa, and western Australia. Groundwater depletion continued in northern India, while heavy rains in California helped to replenish aquifers that have been depleted by drought and withdrawals for irrigation, though they are still below normal levels. Droughts in northern Argentina and western China similarly abated. Wet weather raised aquifer levels broadly across western Europe. Rains in eastern Australia caused flooding to the north and helped to mitigate a decade long drought in the south. Significant reductions in TWS seen in the coast of Alaska and the Patagonian Andes represent ongoing glacier melt, not groundwater depletion. Figures plot time series of zonal mean and global GRACE derived non-seasonal TWS anomalies (deviation from the mean of

  4. Identifying key conservation threats to Alpine birds through expert knowledge.

    Chamberlain, Dan E; Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  5. Terrestrial biomarker records in Seomjin Estuary in the South Sea of Korea: Implication for terrestrial flux and environmental changes

    kim, Songyi; hyun, Sangmin; Kim, Wonnyon; Hyeong, Kiseong

    2016-04-01

    High-resolution records of terrestrial biomarkers, n-alkane compounds, were investigated in two gravity cores (SJP-2 and SJP-4) to evaluate variations in terrestrial organic matter influx. Based on 14C dating, sediments in both cores were deposited during the mid-Holocene; the ages of the bottom sediments of SJP-2 and SJP-4 reached 5,500 Cal yr BP and 5,000 Cal yr BP, respectively. High concentrations of total n-alkanes (nC25-35) in the two cores showed an increasing tendency from 4,500 yr to ca. 2,000 yr. The composition changed at the boundary of 2,500 yr in both cores, suggesting a variation in terrestrial biomarker influx at this time. Several indices including average chain length (ACL), carbon preference index (ICP), and paleo-vegetation index (Paq) showed coincident variations in both cores; ACL exhibited a narrow range of variations with a slight shift at 2,500 yr, CPI showed a decreasing tendency from 4,000 yr to 2,500 yr, and Paq increased during these intervals. Furthermore, the ratios of C23/C31 and C25/C31, indicate a relative abundance of epicuticular wax from vascular plants with coincident variations in both cores, and this also marched well with Paq. CPI excursions suggested that the total n-alkane proxy of the two cores might not only be linked to local climatic variability but also to local oceanographic conditions due to the different sedimentation rates. Variations in paleovegetation and paleoclimate around the study area might be strongly associated with the influx of terrestrial organic compounds derived from vascular plants. Additional 14C dating and isotope study of individual n-alkane biomarkers will provide detailed information on paleoclimatic and paleovegetation changes.

  6. A knowledge-based approach to estimating the magnitude and spatial patterns of potential threats to soil biodiversity.

    Orgiazzi, Alberto; Panagos, Panos; Yigini, Yusuf; Dunbar, Martha B; Gardi, Ciro; Montanarella, Luca; Ballabio, Cristiano

    2016-03-01

    Because of the increasing pressures exerted on soil, below-ground life is under threat. Knowledge-based rankings of potential threats to different components of soil biodiversity were developed in order to assess the spatial distribution of threats on a European scale. A list of 13 potential threats to soil biodiversity was proposed to experts with different backgrounds in order to assess the potential for three major components of soil biodiversity: soil microorganisms, fauna, and biological functions. This approach allowed us to obtain knowledge-based rankings of threats. These classifications formed the basis for the development of indices through an additive aggregation model that, along with ad-hoc proxies for each pressure, allowed us to preliminarily assess the spatial patterns of potential threats. Intensive exploitation was identified as the highest pressure. In contrast, the use of genetically modified organisms in agriculture was considered as the threat with least potential. The potential impact of climate change showed the highest uncertainty. Fourteen out of the 27 considered countries have more than 40% of their soils with moderate-high to high potential risk for all three components of soil biodiversity. Arable soils are the most exposed to pressures. Soils within the boreal biogeographic region showed the lowest risk potential. The majority of soils at risk are outside the boundaries of protected areas. First maps of risks to three components of soil biodiversity based on the current scientific knowledge were developed. Despite the intrinsic limits of knowledge-based assessments, a remarkable potential risk to soil biodiversity was observed. Guidelines to preliminarily identify and circumscribe soils potentially at risk are provided. This approach may be used in future research to assess threat at both local and global scale and identify areas of possible risk and, subsequently, design appropriate strategies for monitoring and protection of soil

  7. Crossing the species barrier: the threat of an avian influenza pandemic

    Riedel, Stefan

    2006-01-01

    Avian influenza (H5N1) has recently been recognized as a new emerging infectious disease that may pose a threat to international public health. Most recent developments lead to the belief that H5N1 could become the cause of the next influenza pandemic. This review discusses the characteristics of H5N1 avian influenza virus as an emerging infectious disease with the potential for pandemic development. In addition, the current pandemic influenza alert status and guidelines for pandemic prepared...

  8. Biological control of the terrestrial carbon sink

    E.-D. Schulze

    2006-01-01

    Full Text Available This lecture reviews the past (since 1964 when the International Biological Program began and the future of our understanding of terrestrial carbon fluxes with focus on photosynthesis, respiration, primary-, ecosystem-, and biome-productivity. Photosynthetic capacity is related to the nitrogen concentration of leaves, but the capacity is only rarely reached under field conditions. Average rates of photosynthesis and stomatal conductance are closely correlated and operate near 50% of their maximal rate, with light being the limiting factor in humid regions and air humidity and soil water the limiting factor in arid climates. Leaf area is the main factor to extrapolate from leaves to canopies, with maximum surface conductance being dependent on leaf level stomatal conductance. Additionally, gas exchange depends also on rooting depth which determines the water and nutrient availability and on mycorrhizae which regulate the nutrient status. An important anthropogenic disturbance is the nitrogen uptake from air pollutants, which is not balanced by cation uptake from roots and this may lead to damage and breakdown of the plant cover. Photosynthesis is the main carbon input into ecosystems, but it alone does not represent the ecosystem carbon balance, which is determined by respiration of various kinds. Plant respiration and photosynthesis determine growth (net primary production and microbial respiration balances the net ecosystem flux. In a spruce forest, 30% of the assimilatory carbon gain is used for respiration of needles, 20% is used for respiration in stems. Soil respiration is about 50% the carbon gain, half of which is root respiration, half is microbial respiration. In addition, disturbances lead to carbon losses, where fire, harvest and grazing bypass the chain of respiration. In total, the carbon balance at the biome level is only about 1% of the photosynthetic carbon input, or may indeed become negative. The recent observed increase in

  9. Threat from Rubble-Pile Asteroids

    Schultz, P. H.

    2015-12-01

    While chondrites are the most common meteoroids to enter our atmosphere, they represent a small fraction of recovered falls. Most stony meteorites disrupt during entry, consumed by ablation or lost by weathering; in contrast, small iron meteorites (entry at altitude; (c) no accessory meteorite falls; (d) "explosion" (not low-speed compression) crater; (e) infrasound/seismic data indicating a high-speed entry/collision; and (f) petrologic evidence for shock deformation/melting in breccias indicative of speeds >4 km/s. Although a monolithic chondrite (~ 10 m across) might allow surviving entry, most objects of this size contain multiple flaws, ensuring atmospheric disruption. Hence, an alternative "needle model" was proposed wherein a small rubble-pile object gradually re-shaped itself during entry [Schultz, 2008], a process that minimizes drag, thermal signatures of entry, and catastrophic disruption. First proposed to account for smaller than expected craters on Venus [Schultz, 1992], such a process resembles subsequent Shoemaker-Levy entry models [Boslough and Crawford, 1997] that predicted much deeper entry than standard models. Laboratory experiments at the NASA Ames Vertical Gun Range simulated this process by breaking-up hypervelocity projectiles into a cloud of debris and tracking its path at near-full atmospheric pressure. The resulting cloud of fragments exhibited less deceleration than a solid sphere at the same speed. Moreover, shadowgraphs revealed constituent fragments "surfing" the pressure jump within the mach cone/column. Previous models proposed that crater-forming impacts must be >50-100 m in diameter in order to survive entry [Bland and Artemieva, 2004]. The "needle model" for the Carancas meteorite entry, however, raises questions about this lower limit for threats by rubble-pile asteroids, e.g., Itokawa. Consequently, we modeled the fate of a rubble-pile entering earth's atmosphere using GEODYN, an Eulerian code with adaptive mesh refinement

  10. Terrestrial gamma radiation levels outdoors in Cantabria, Spain

    Quindos, L.S.; Fernandez, P.L.; Soto, J.; Rodenas, C. (Cantabria Univ., Santander (Spain). Faculty of Medicine and Sciences)

    1991-06-01

    Terrestrial gamma-ray dose rates have been measured outdoors throughout the region of Cantabria, located in the north of Spain. Results obtained are shown in tabular and cartographical form and are related to the nature of the ground and other influencing factors. The mean absorbed dose rate in air outdoors is 35.46 nGy h{sup -1}. The mean annual effective dose equivalent, when the duration of outdoor exposure and distribution of the population are considered, is about 32 {mu}Sv. This dose is in addition to those doses received from other sources of natural radiation, principally from the presence of radon gas indoors. (author).

  11. Stereotype threat can both enhance and impair older adults' memory.

    Barber, Sarah J; Mather, Mara

    2013-12-01

    Negative stereotypes about aging can impair older adults' memory via stereotype threat; however, the mechanisms underlying this phenomenon are unclear. In two experiments, we tested competing predictions derived from two theoretical accounts of stereotype threat: executive-control interference and regulatory fit. Older adults completed a working memory test either under stereotype threat about age-related memory declines or not under such threat. Monetary incentives were manipulated such that recall led to gains or forgetting led to losses. The executive-control-interference account predicts that stereotype threat decreases the availability of executive-control resources and hence should impair working memory performance. The regulatory-fit account predicts that threat induces a prevention focus, which should impair performance when gains are emphasized but improve performance when losses are emphasized. Results were consistent only with the regulatory-fit account. Although stereotype threat significantly impaired older adults' working memory performance when remembering led to gains, it significantly improved performance when forgetting led to losses. PMID:24150969

  12. Information fusion: telling the story (or threat narrative)

    Fenstermacher, Laurie

    2014-06-01

    Today's operators face a "double whammy" - the need to process increasing amounts of information, including "Twitter-INT"1 (social information such as Facebook, You-Tube videos, blogs, Twitter) as well as the need to discern threat signatures in new security environments, including those in which the airspace is contested. To do this will require the Air Force to "fuse and leverage its vast capabilities in new ways."2 For starters, the integration of quantitative and qualitative information must be done in a way that preserves important contextual information since the goal increasingly is to identify and mitigate violence before it occurs. To do so requires a more nuanced understanding of the environment being sensed, including the human environment, ideally from the "emic" perspective; that is, from the perspective of that individual or group. This requires not only data and information that informs the understanding of how the individuals and/or groups see themselves and others (social identity) but also information on how that identity filters information in their environment which, in turn, shapes their behaviors.3 The goal is to piece together the individual and/or collective narratives regarding threat, the threat narrative, from various sources of information. Is there a threat? If so, what is it? What is motivating the threat? What is the intent of those who pose the threat and what are their capabilities and their vulnerabilities?4 This paper will describe preliminary investigations regarding the application of prototype hybrid information fusion method based on the threat narrative framework.

  13. Insights and issues with simulating terrestrial DOC loading of Arctic river networks.

    Kicklighter, David W; Hayes, Daniel J; McClelland, James W; Peterson, Bruce J; McGuire, A David; Melillo, Jerry M

    2013-12-01

    Terrestrial carbon dynamics influence the contribution of dissolved organic carbon (DOC) to river networks in addition to hydrology. In this study, we use a biogeochemical process model to simulate the lateral transfer of DOC from land to the Arctic Ocean via riverine transport. We estimate that, over the 20th century, the pan-Arctic watershed has contributed, on average, 32 Tg C/yr of DOC to river networks emptying into the Arctic Ocean with most of the DOC coming from the extensive area of boreal deciduous needle-leaved forests and forested wetlands in Eurasian watersheds. We also estimate that the rate of terrestrial DOC loading has been increasing by 0.037 Tg C/yr2 over the 20th century primarily as a result of climate-induced increases in water yield. These increases have been offset by decreases in terrestrial DOC loading caused by wildfires. Other environmental factors (CO2 fertilization, ozone pollution, atmospheric nitrogen deposition, timber harvest, agriculture) are estimated to have relatively small effects on terrestrial DOC loading to Arctic rivers. The effects of the various environmental factors on terrestrial carbon dynamics have both offset and enhanced concurrent effects on hydrology to influence terrestrial DOC loading and may be changing the relative importance of terrestrial carbon dynamics on this carbon flux. Improvements in simulating terrestrial DOC loading to pan-Arctic rivers in the future will require better information on the production and consumption of DOC within the soil profile, the transfer of DOC from land to headwater streams, the spatial distribution of precipitation and its temporal trends, carbon dynamics of larch-dominated ecosystems in eastern Siberia, and the role of industrial organic effluents on carbon budgets of rivers in western Russia. PMID:24555311

  14. Comparative analyses of olfactory systems in terrestrial crabs (Brachyura): evidence for aerial olfaction?

    Krieger, Jakob; Braun, Philipp; Rivera, Nicole T; Schubart, Christoph D; Müller, Carsten H G; Harzsch, Steffen

    2015-01-01

    Adaptations to a terrestrial lifestyle occurred convergently multiple times during the evolution of the arthropods. This holds also true for the "true crabs" (Brachyura), a taxon that includes several lineages that invaded land independently. During an evolutionary transition from sea to land, animals have to develop a variety of physiological and anatomical adaptations to a terrestrial life style related to respiration, reproduction, development, circulation, ion and water balance. In addition, sensory systems that function in air instead of in water are essential for an animal's life on land. Besides vision and mechanosensory systems, on land, the chemical senses have to be modified substantially in comparison to their function in water. Among arthropods, insects are the most successful ones to evolve aerial olfaction. Various aspects of terrestrial adaptation have also been analyzed in those crustacean lineages that evolved terrestrial representatives including the taxa Anomala, Brachyura, Amphipoda, and Isopoda. We are interested in how the chemical senses of terrestrial crustaceans are modified to function in air. Therefore, in this study, we analyzed the brains and more specifically the structure of the olfactory system of representatives of brachyuran crabs that display different degrees of terrestriality, from exclusively marine to mainly terrestrial. The methods we used included immunohistochemistry, detection of autofluorescence- and confocal microscopy, as well as three-dimensional reconstruction and morphometry. Our comparative approach shows that both the peripheral and central olfactory pathways are reduced in terrestrial members in comparison to their marine relatives, suggesting a limited function of their olfactory system on land. We conclude that for arthropod lineages that invaded land, evolving aerial olfaction is no trivial task. PMID:26713228

  15. Terrestrial biogeochemical feedbacks in the climate system

    Arneth, A.; Harrison, S. P.; Zaehle, S.; Tsigaridis, K.; Menon, S.; Bartlein, P. J.; Feichter, J.; Korhola, A.; Kulmala, M.; O'Donnell, D.; Schurgers, G.; Sorvari, S.; Vesala, T.

    2010-08-01

    The terrestrial biosphere is a key regulator of atmospheric chemistry and climate. During past periods of climate change, vegetation cover and interactions between the terrestrial biosphere and atmosphere changed within decades. Modern observations show a similar responsiveness of terrestrial biogeochemistry to anthropogenically forced climate change and air pollution. Although interactions between the carbon cycle and climate have been a central focus, other biogeochemical feedbacks could be as important in modulating future climate change. Total positive radiative forcings resulting from feedbacks between the terrestrial biosphere and the atmosphere are estimated to reach up to 0.9 or 1.5 W m-2 K-1 towards the end of the twenty-first century, depending on the extent to which interactions with the nitrogen cycle stimulate or limit carbon sequestration. This substantially reduces and potentially even eliminates the cooling effect owing to carbon dioxide fertilization of the terrestrial biota. The overall magnitude of the biogeochemical feedbacks could potentially be similar to that of feedbacks in the physical climate system, but there are large uncertainties in the magnitude of individual estimates and in accounting for synergies between these effects.

  16. Terrestrial planets across space and time

    Zackrisson, E; Gonzalez, J; Benson, A; Johansen, A; Janson, M

    2016-01-01

    The study of cosmology, galaxy formation and exoplanetary systems has now advanced to a stage where a cosmic inventory of terrestrial planets may be attempted. By coupling semi-analytic models of galaxy formation to a recipe that relates the occurrence of planets to the mass and metallicity of their host stars, we trace the population of terrestrial planets around both solar-mass (FGK type) and lower-mass (M dwarf) stars throughout all of cosmic history. We find that the mean age of terrestrial planets in the local Universe is $8\\pm1$ Gyr and that the typical planet of this type is located in a spheroid-dominated galaxy with total stellar mass about twice that of the Milky Way. We estimate that hot Jupiters have depleted the population of terrestrial planets around FGK stars at redshift $z=0$ by no more than $\\approx 10\\%$, and predict that $\\approx 1/3$ of the terrestrial planets in the local Universe are orbiting stars in a metallicity range for which such planets have yet to be been detected. When looking ...

  17. Numerical simulations for terrestrial planets formation

    Ji J.

    2011-07-01

    Full Text Available We investigate the formation of terrestrial planets in the late stage of planetary formation using two-planet model. At that time, the protostar has formed for about 3 Myr and the gas disk has dissipated. In the model, the perturbations from Jupiter and Saturn are considered. We also consider variations of the mass of outer planet, and the initial eccentricities and inclinations of embryos and planetesimals. Our results show that, terrestrial planets are formed in 50 Myr, and the accretion rate is about 60%–80%. In each simulation, 3–4 terrestrial planets are formed inside “Jupiter” with masses of 0.15–3.6 M⊕. In the 0.5–4 AU, when the eccentricities of planetesimals are excited, planetesimals are able to accrete material from wide radial direction. The plenty of water material of the terrestrial planet in the Habitable Zone may be transferred from the farther places by this mechanism. Accretion may also happen a few times between two giant planets only if the outer planet has a moderate mass and the small terrestrial planet could survive at some resonances over time scale of 108 yr.

  18. The effect of job insecurity on employee health complaints: A within-person analysis of the explanatory role of threats to the manifest and latent benefits of work.

    Vander Elst, Tinne; Näswall, Katharina; Bernhard-Oettel, Claudia; De Witte, Hans; Sverke, Magnus

    2016-01-01

    The current study contributes to the literature on job insecurity by highlighting threat to the benefits of work as an explanation of the effect of job insecurity on health complaints. Building on the latent deprivation model, we predicted that threats to both manifest (i.e., financial income) and latent benefits of work (i.e., collective purpose, social contacts, status, time structure, activity) mediate the relationships from job insecurity to subsequent mental and physical health complaints. In addition, in line with the conservation of resources theory, we proposed that financial resources buffer the indirect effect of job insecurity on health complaints through threat to the manifest benefit. Hypotheses were tested using a multilevel design, in which 3 measurements (time lag of 6 months between subsequent measurements) were clustered within 1,994 employees (in Flanders, Belgium). This allowed for the investigation of within-person processes, while controlling for variance at the between-person level. The results demonstrate that job insecurity was related to subsequent threats to both manifest and latent benefits, and that these threats in turn were related to subsequent health complaints (with an exception for threat to the manifest benefit that did not predict mental health complaints). Three significant indirect effects were found: threat to the latent benefits mediated the relationships between job insecurity and both mental and physical health complaints, and threat to the manifest benefit mediated the relationship between job insecurity and physical health complaints. Unexpectedly, the latter indirect effect was exacerbated by financial resources. PMID:25894197

  19. Identifying key conservation threats to Alpine birds through expert knowledge

    Chamberlain, Dan E.; Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, ...

  20. Assessing Database and Network Threats in Traditional and Cloud Computing

    Katerina Lourida

    2015-05-01

    Full Text Available Cloud Computing is currently one of the most widely-spoken terms in IT. While it offers a range of technological and financial benefits, its wide acceptance by organizations is not yet wide spread. Security concerns are a main reason for this and this paper studies the data and network threats posed in both traditional and cloud paradigms in an effort to assert in which areas cloud computing addresses security issues and where it does introduce new ones. This evaluation is based on Microsoft’s STRIDE threat model and discusses the stakeholders, the impact and recommendations for tackling each threat.

  1. Can one say ethanol is a real threat to gasoline?

    Ethanol use in Brazil as a motor fuel has been largely promoted since the two oil shocks of the 1970s, either as a gasoline additive (anhydrous ethanol) or as a gasoline substitute (hydrated ethanol). As of today, the uncertainties in the international oil markets, the methyl tertiary butyl ether (MTBE) ban in the US and the growing concerns with global climate change, all justify the quest for a new role to be played by ethanol worldwide. The current prevailing view sees ethanol as a real threat to gasoline and, eventually, to oil itself. This paper examines this issue and concludes that by replacing mainly MTBE and not allowing the use of improved Otto engines, E10 (gasohol blend) does not pose any serious treat to the oil industry, nor do flexfuel vehicles using fairly typical gasoline engines and, in the lack of ethanol supply, running on gasoline. On the other hand, if Otto engines at compression ratios found in diesel engines are promoted, then E30 could become a suitable strategy for spreading the use of ethanol fuel in large volumes and also for saving gasoline. This paper proposes coupling policies of blending ethanol with gasoline, with policies aiming at saving fuel use in light duty vehicles (LDV). (author)

  2. Can one say ethanol is a real threat to gasoline?

    Ethanol use in Brazil as a motor fuel has been largely promoted since the two oil shocks of the 1970s, either as a gasoline additive (anhydrous ethanol) or as a gasoline substitute (hydrated ethanol). As of today, the uncertainties in the international oil markets, the methyl tertiary butyl ether (MTBE) ban in the US and the growing concerns with global climate change, all justify the quest for a new role to be played by ethanol worldwide. The current prevailing view sees ethanol as a real threat to gasoline and, eventually, to oil itself. This paper examines this issue and concludes that by replacing mainly MTBE and not allowing the use of improved Otto engines, E10 (gasohol blend) does not pose any serious treat to the oil industry, nor do flexfuel vehicles using fairly typical gasoline engines and, in the lack of ethanol supply, running on gasoline. On the other hand, if Otto engines at compression ratios found in diesel engines are promoted, then E30 could become a suitable strategy for spreading the use of ethanol fuel in large volumes and also for saving gasoline. This paper proposes coupling policies of blending ethanol with gasoline, with policies aiming at saving fuel use in light duty vehicles (LDV)

  3. Threat to the New York City water supply - plutonium

    The mayor of the City of New York received an anonymous letter on April 1st 1985 threatening to contaminate the water supply with plutonium unless all criminal charges against Mr Bernhard Goetz, the suspect in a dramatic subway shooting incident, were dismissed by April 11th 1985. The Environmental Measurements Laboratory, EML, was requested to analyse a composite, large volume (∼ 175 litres) drinking water sample collected on April 16th 1985. The concentration measured was 21 fCi/l which was a factor of 100 greater than previously observed results in the EML data base, and the mass isotopic content of the plutonium was very unusual. Additional samples were collected one to three months later at various distribution points in the water supply system. The plutonium concentrations were much lower and comparable to EML's earlier data. Mass isotopic analysis of these samples provided more reasonable compositions but with high uncertainties due to very low plutonium concentration. Due to the inability to confirm the elevated plutonium concentration value for the composite sample, it is impossible to conclude whether the threat to contaminate the New York City water supply was actually carried out or whether the sample was contaminated prior to receipt at EML. 5 refs.; 1 figure; 5 tabs

  4. A Physicist Looks at the Terrorist Threat

    Muller, Richard

    2009-05-01

    Many people fear a terrorist nuclear device, smuggled into the United States, as the one weapon that could surpass the destruction and impact of 9-11. I'll review the design of nuclear weapons, with emphasis on the kinds that can be developed by rogue nations, terrorist groups, and high-school students. Saddam, prior to the first gulf war, was developing a uranium bomb, similar to the one that destroyed Hiroshima. His calutrons (named after my university) were destroyed by the United Nations. The North Korean nuclear weapon was, like the U.S. bomb used on Nagasaki, based on plutonium. Its test released the energy equivalent of about 400 tons of TNT. Although some people have speculated that they were attempting to build a small bomb, it is far more likely that this weapon was a fizzle, with less than 1 percent of the plutonium exploded. In contrast, the energy released from burning jet fuel at the 9-11 World Trade Center attack was the equivalent of 900 tons of TNT for each plane -- over twice that of the North Korean Nuke. The damage came from the fact that gasoline delivers 10 kilocalories per gram, about 15 times the energy of an equal weight of TNT. It is this huge energy per gram that also accounts for our addiction to gasoline; per gram, high performance lithium-ion computer batteries carry only 1 percent as much energy. A dirty bomb (radiological weapon) is also unattractive to terrorists because of the threhold effect: doses less than 100 rem produce no radiation illness and will leave no dead bodies at the scene. That may be why al Qaeda instructed Jose Padilla to abandon his plans for a dirty bomb attack in Chicago, and to try a fossil fuel attack (natural gas) instead. I will argue that the biggest terrorist threat is the conventional low-tech one, such as an airplane attack on a crowded stadium using the explosive fuel that they can legally buy at the corner station.

  5. The meaning of collective terrorist threat: understanding the subjective causes of terrorism reduces its negative psychological impact.

    Fischer, Peter; Postmes, Tom; Koeppl, Julia; Conway, Lianne; Fredriksson, Tom

    2011-05-01

    This article hypothesized that the possibility to construct intellectual meaning of a terrorist attack (i.e., whether participants can cognitively understand why the perpetrators did their crime) reduces the negative psychological consequences typically associated with increased terrorist threat. Concretely, the authors investigated the effect of intellectual meaning (induced by providing additional information about potential economic, cultural, and historical reasons for the terrorist attack) on perceived terrorist threat and associated emotional well-being. Study 1 revealed that pictures of terrorist attacks elicited less experienced terrorist threat when they were presented with background information about the terrorists' motives (meaning provided) rather than without additional background information (no meaning provided). Study 2 replicated this effect with a different manipulation of terrorist threat (i.e., newspaper article) and clarified the underlying psychological process: Participants in the high terror salience condition with meaning provided experienced less terrorist threat and thus more emotional well-being in the face of crisis than participants in the high terror salience condition without meaning provided. Theoretical and practical implications in the context of psychological health and mass media effects are discussed. PMID:20587476

  6. Obliquity evolution of extrasolar terrestrial planets

    Atobe, K; Atobe, Keiko; Ida, Shigeru

    2006-01-01

    We have investigated the obliquity evolution of terrestrial planets in habitable zones (at ~ 1AU) in extrasolar planetary systems, due to tidal interactions with their satellite and host star with wide varieties of satellite-to-planet mass ratio and initial obliquity, through numerical calculations and analytical arguments. The obliquity, the angle between planetary spin axis and its orbit normal, of a terrestrial planet is one of the key factors in determining the planetary surface environments. A recent scenario of terrestrial planet accretion implies that giant impacts of Mars-sized bodies determine the planetary spin and form satellites. With isotropic giant impacts, tilted spins are more likely to be produced than straight ones and satellites with various mass are formed. However, most of previous studies have focused on a particular case of the Earth-Moon systems or the two-body planar problem. We numerically integrated the evolution of planetary spin and a satellite orbit with various satellite mass an...

  7. Terrestrial age dating of antarctic meteorites

    During the last three antarctic field seasons, US and Japanese teams have collected several thousand meteorites. The terrestrial age of these objects is of interest because such knowledge enables the setting of lower bounds on the lower age of the ice sheet, provides information about ice movement, and aids understanding of the accumulation mechanism of the meteorites. Terrestrial ages can be established by measuring the decay of radioactive species produced by bombardment of cosmic rays while the objects are in space. After entering the Earth's atmosphere the meteorites essentially are completely shielded from cosmic rays. The radioactive products that exist at saturation values in space then decay exponentially toward zero activity. By the end of 1980, data will be established on 150 to 200 selected samples. With that large a data base we should have a fairly clear picture of the terrestrial age distribution of antarctic meteorites

  8. The biodiversity of the Mediterranean Sea: estimates, patterns, and threats.

    Marta Coll

    Full Text Available The Mediterranean Sea is a marine biodiversity hot spot. Here we combined an extensive literature analysis with expert opinions to update publicly available estimates of major taxa in this marine ecosystem and to revise and update several species lists. We also assessed overall spatial and temporal patterns of species diversity and identified major changes and threats. Our results listed approximately 17,000 marine species occurring in the Mediterranean Sea. However, our estimates of marine diversity are still incomplete as yet-undescribed species will be added in the future. Diversity for microbes is substantially underestimated, and the deep-sea areas and portions of the southern and eastern region are still poorly known. In addition, the invasion of alien species is a crucial factor that will continue to change the biodiversity of the Mediterranean, mainly in its eastern basin that can spread rapidly northwards and westwards due to the warming of the Mediterranean Sea. Spatial patterns showed a general decrease in biodiversity from northwestern to southeastern regions following a gradient of production, with some exceptions and caution due to gaps in our knowledge of the biota along the southern and eastern rims. Biodiversity was also generally higher in coastal areas and continental shelves, and decreases with depth. Temporal trends indicated that overexploitation and habitat loss have been the main human drivers of historical changes in biodiversity. At present, habitat loss and degradation, followed by fishing impacts, pollution, climate change, eutrophication, and the establishment of alien species are the most important threats and affect the greatest number of taxonomic groups. All these impacts are expected to grow in importance in the future, especially climate change and habitat degradation. The spatial identification of hot spots highlighted the ecological importance of most of the western Mediterranean shelves (and in particular

  9. The biodiversity of the Mediterranean Sea: estimates, patterns, and threats.

    Coll, Marta; Piroddi, Chiara; Steenbeek, Jeroen; Kaschner, Kristin; Ben Rais Lasram, Frida; Aguzzi, Jacopo; Ballesteros, Enric; Bianchi, Carlo Nike; Corbera, Jordi; Dailianis, Thanos; Danovaro, Roberto; Estrada, Marta; Froglia, Carlo; Galil, Bella S; Gasol, Josep M; Gertwagen, Ruthy; Gil, João; Guilhaumon, François; Kesner-Reyes, Kathleen; Kitsos, Miltiadis-Spyridon; Koukouras, Athanasios; Lampadariou, Nikolaos; Laxamana, Elijah; López-Fé de la Cuadra, Carlos M; Lotze, Heike K; Martin, Daniel; Mouillot, David; Oro, Daniel; Raicevich, Sasa; Rius-Barile, Josephine; Saiz-Salinas, Jose Ignacio; San Vicente, Carles; Somot, Samuel; Templado, José; Turon, Xavier; Vafidis, Dimitris; Villanueva, Roger; Voultsiadou, Eleni

    2010-01-01

    The Mediterranean Sea is a marine biodiversity hot spot. Here we combined an extensive literature analysis with expert opinions to update publicly available estimates of major taxa in this marine ecosystem and to revise and update several species lists. We also assessed overall spatial and temporal patterns of species diversity and identified major changes and threats. Our results listed approximately 17,000 marine species occurring in the Mediterranean Sea. However, our estimates of marine diversity are still incomplete as yet-undescribed species will be added in the future. Diversity for microbes is substantially underestimated, and the deep-sea areas and portions of the southern and eastern region are still poorly known. In addition, the invasion of alien species is a crucial factor that will continue to change the biodiversity of the Mediterranean, mainly in its eastern basin that can spread rapidly northwards and westwards due to the warming of the Mediterranean Sea. Spatial patterns showed a general decrease in biodiversity from northwestern to southeastern regions following a gradient of production, with some exceptions and caution due to gaps in our knowledge of the biota along the southern and eastern rims. Biodiversity was also generally higher in coastal areas and continental shelves, and decreases with depth. Temporal trends indicated that overexploitation and habitat loss have been the main human drivers of historical changes in biodiversity. At present, habitat loss and degradation, followed by fishing impacts, pollution, climate change, eutrophication, and the establishment of alien species are the most important threats and affect the greatest number of taxonomic groups. All these impacts are expected to grow in importance in the future, especially climate change and habitat degradation. The spatial identification of hot spots highlighted the ecological importance of most of the western Mediterranean shelves (and in particular, the Strait of

  10. Standalone Terrestrial Laser Scanning for Efficiently Capturing Aec Buildings for As-Built Bim

    Bassier, M.; Vergauwen, M.; Van Genechten, B.

    2016-06-01

    With the increasing popularity of as-built building models for the architectural, engineering and construction (AEC) industry, the demand for highly accurate and dense point cloud data is rising. The current data acquisition methods are labour intensive and time consuming. In order to compete with indoor mobile mapping systems (IMMS), surveyors are now opting to use terrestrial laser scanning as a standalone solution. However, there is uncertainty about the accuracy of this approach. The emphasis of this paper is to determine the scope for which terrestrial laser scanners can be used without additional control. Multiple real life test cases are evaluated in order to identify the boundaries of this technique. Furthermore, this research presents a mathematical prediction model that provides an indication of the data accuracy given the project dimensions. This will enable surveyors to make informed discussions about the employability of terrestrial laser scanning without additional control in mid to large-scale projects.

  11. Numerical simulations for terrestrial planets formation

    Ji J; Zhang N.

    2011-01-01

    We investigate the formation of terrestrial planets in the late stage of planetary formation using two-planet model. At that time, the protostar has formed for about 3 Myr and the gas disk has dissipated. In the model, the perturbations from Jupiter and Saturn are considered. We also consider variations of the mass of outer planet, and the initial eccentricities and inclinations of embryos and planetesimals. Our results show that, terrestrial planets are formed in 50 Myr, and the accretion ra...

  12. Terrestrial propagation of long electromagnetic waves

    Galejs, Janis; Fock, V A

    2013-01-01

    Terrestrial Propagation of Long Electromagnetic Waves deals with the propagation of long electromagnetic waves confined principally to the shell between the earth and the ionosphere, known as the terrestrial waveguide. The discussion is limited to steady-state solutions in a waveguide that is uniform in the direction of propagation. Wave propagation is characterized almost exclusively by mode theory. The mathematics are developed only for sources at the ground surface or within the waveguide, including artificial sources as well as lightning discharges. This volume is comprised of nine chapte

  13. Reducing the nuclear threat in the 21st century

    The focus of this paper is related to rising public concern - the threat of terrorism and the threat from poorly protected nuclear weapons materials. Governments, the press, and the public need to understand that the IAEA is responsible for monitoring more than 900 facilities to make sure no nuclear materials at those facilities are diverted to military use. They need to know that during 15 years of zero real growth in the IAEA's safeguards budget, the number of states who are part of the nonproliferation regime, the number of safeguarded facilities in those states, and the amount of plutonium and HEU requiring safeguards have all increased dramatically. The IAEA's safeguards system is facing a 'quiet crisis'. There is already a gap between the nuclear threat and our global response. Zero growth budgets at IAEA widen the gap. This total budget is less than ten percent of the cost of building a single nuclear power plant - and a tiny fraction of the economic cost of the non-nuclear terrorist strikes of September 11. The time has come, for member states to agree to a substantial real increase in the IAEA's regular safeguards budget. The discovery in Iraq in 1991 of a substantial covert nuclear weapons program led to the establishment, for the first time, of an Additional Protocol, with wide-ranging new inspection authorities and information access that will give the IAEA what it needs to conclude that there are no covert nuclear activities in states subject to the protocol. The adoption of this Additional Protocol is a great advance in nuclear security, but Governments, the press and public need to understand that the Board has approved Additional Protocols for only 58 member states, and only 22 of those have entered into force or are being provisionally applied. A decade after the Iraq discovery of the weakness in its safeguards regime, the IAEA does not yet have the full authority it needs to detect and expose any covert nuclear programs that may be underway around

  14. 76 FR 22878 - Closed Meeting of the Threat Reduction Advisory Committee

    2011-04-25

    ... of the Secretary Closed Meeting of the Threat Reduction Advisory Committee AGENCY: Office of the... Defense announces the following Federal advisory committee meeting of the Threat Reduction Advisory... 22206. ] FOR FURTHER INFORMATION CONTACT: Contact Mr. William Hostyn, Defense Threat Reduction...

  15. Cognitive and physiological antecedents of threat and challenge appraisal.

    Tomaka, J; Blascovich, J; Kibler, J; Ernst, J M

    1997-07-01

    Cognitive appraisal theories of stress and emotion propose that cognitive appraisals precede physiological responses, whereas peripheralist theories propose that physiological arousal precedes cognitive processes. Three studies examined this issue regarding threat and challenge responses to potential stress. Study 1 supported cognitive appraisal theory by demonstrating that threat and challenge cognitive appraisals and physiological responses could be elicited experimentally by manipulating instructional set. Studies 2 and 3, in contrast, found that manipulations of physiological response patterns consistent with challenge and threat did not result in corresponding changes in cognitive appraisal. Appraisals in Study 3, however, were related to subjective pain independent of the physiological manipulation. These studies suggest a central role for cognitive appraisal processes in elicitation of threat and challenge responses to potentially stressful situations. PMID:9216079

  16. Mediators of Stereotype Threat among Black College Students.

    Massey, Douglas S; Owens, Jayanti

    2014-04-01

    We hypothesize that the manner in which stereotype threat affects college grade achievement is mediated by institutional context as well as individual characteristics. Drawing on a sample of black students from the National Longitudinal Survey of Freshmen we find weak and inconsistent evidence that institutional characteristics influence the operation of stereotype threat. We find more consistent evidence to indicate that the effect of stereotype threat is conditioned by individual factors such as skin color, multiracial origins, and an integrated upbringing. Most of the effect on grade achievement occurs through the internalization pathway, in which the internalization of negative stereotypes leads to disinvestment manifested by a reduction in academic effort. The reduction in work effort, in turn, lowers grades. We also find evidence that immigrant origin confers protection from the negative effects of stereotype threat through both internalization and externalization mechanisms, though the ultimate effect of grade achievement is rather small. PMID:24860201

  17. Little Threat of Zika Spread from Rio Olympics

    ... gov/news/fullstory_160051.html Little Threat of Zika Spread From Rio Olympics: Study Because it's winter ... in Brazil are not likely to contract the Zika virus during their stay or bring it back ...

  18. Insider Threats in Comparative Perspective: Lessons Learned from Past Mistakes

    This paper identifies six mistakes that security-conscious organizations have made that exacerbated insider threat problems and created dangerous incidents: (1) Assuming that serious insider problems are NIMO (Not In My Organization); (2) Focusing only on malicious insider threats; (3) Forgetting that insiders can know about insider threat protection methods and therefore work around them; (4) Assuming that security rules are followed (or forgetting there are rules about when it is okay to break rules); (5) Using “Red Team” exercises, but forgetting that red teams and protection forces have insiders too; and (6) Assuming that Red Flags will be read properly. The diversity and complexity of insider threat causes warns us to avoid “the myth of absolute security.” Serious prevention efforts should therefore always be supplemented with equally serious emergency response and mitigation efforts. (author)

  19. Assessment of Containment Structures Against Missile Impact Threats

    LI Q M

    2006-01-01

    In order to ensure the highest safety requirements,nuclear power plant structures (the containment structures,the fuel storages and transportation systems) should be assessed against all possible internal and external impact threats.The internal impact threats include kinetic missiles generated by the failure of high pressure vessels and pipes,the failure of high speed rotating machineries and accidental drops.The external impact threats may come from airborne missiles,aircraft impact,explosion blast and fragments.The impact effects of these threats on concrete and steel structures in a nuclear power plant are discussed.Methods and procedures for the impact assessment of nuclear power plants are introduced.Recent studies on penetration and perforation mechanics as well as progresses on dynamic properties of concrete-like materials are presented to increase the understanding of the impact effects on concrete containment structures.

  20. Racial Threat Theory: Assessing the Evidence, Requesting Redesign

    Cindy Brooks Dollar

    2014-01-01

    Full Text Available Racial threat theory was developed as a way to explain how population composition influences discriminatory social control practices and has become one of the most acknowledged frameworks for explaining racial disparity in criminal justice outcomes. This paper provides a thorough review of racial threat theory and empirical assessments of the theory and demonstrates that while scholars often cite inconsistent support for the theory, empirical discrepancies may be due to insufficient attention to the conceptual complexity of racial threat. I organize and present the following review around 4 forms of state-sanctioned control mechanisms: police expenditures, arrests, sentencing, and capital punishment. Arguing that the pervasiveness of racialization in state controls warrants continued inquiry, I provide suggestions for future scholarship that will help us develop enhanced understanding of how racial threat may be operating.

  1. USVI Land-Based Threat to Benthic Habitats

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set describes the potential threat of sediment delivery and land-based sources of pollution to benthic habitats. This dataset is derived from NOAA's...

  2. Antibiotic Resistance Threats in the U.S.

    ... What's this? Submit Button Past Emails CDC Features Antibiotic Resistance Threats in the US Recommend on Facebook Tweet Share Compartir Antibiotics are powerful tools for fighting illness and disease, ...

  3. New Frontiers of Network Security: The Threat Within

    Sanyal, Sugata; Gupta, Amit

    2010-01-01

    Nearly 70% of information security threats originate from inside an organization. Opportunities for insider threats have been increasing at an alarming rate with the latest trends of mobility (portable devices like Laptop, smart phones etc.), ubiquitous connectivity (wireless or through 3G connectivity) and this trend increases as more and more web-based applications are made available over the Internet. Insider threats are generally caused by current or ex-employees, contractors or partners, who have authorized access to the organization's network and servers. Theft of confidential information is often for either material gain or for willful damage. Easy availability of hacking tools on the Internet, USB devices and wireless connectivity provide for easy break-ins. The net result is losses worth millions of dollars in terms of IP theft, leakage of customer / individual information, etc. This paper presents an understanding of Insider threats, attackers and their motives and suggests mitigation techniques at ...

  4. Puerto Rico Land-Based Threat to Benthic Habitats

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set describes the potential threat of sediment delivery and land-based sources of pollution to benthic habitats. This dataset is derived from NOAA's...

  5. Champ or chump? Challenge and threat states during pressurized competition.

    Moore, Lee J; Wilson, Mark R; Vine, Samuel J; Coussens, Adam H; Freeman, Paul

    2013-12-01

    The present research examined the immediate impact of challenge and threat states on golf performance in both real competition and a laboratory-based task. In Study 1, 199 experienced golfers reported their evaluations of competition demands and personal coping resources before a golf competition. Evaluating the competition as a challenge (i.e., sufficient resources to cope with demands) was associated with superior performance. In Study 2, 60 experienced golfers randomly received challenge or threat manipulation instructions and then performed a competitive golf-putting task. Challenge and threat states were successfully manipulated and the challenge group outperformed the threat group. Furthermore, the challenge group reported less anxiety, more facilitative interpretations of anxiety, less conscious processing, and displayed longer quiet eye durations. However, these variables failed to mediate the group-performance relationship. These studies demonstrate the importance of considering preperformance psychophysiological states when examining the influence of competitive pressure on motor performance. PMID:24334317

  6. THE SOCIAL-CULTURAL ENVIRONMENT: THREATS, OPPORTUNITIES AND RESPONSES

    Буряк Наталья Юрьевна

    2015-01-01

    In this article the author turns to the problems of social-cultural environment: threats, opportunities, responses, and cultural values (primary and secondary). The examples of both primary and secondary cultural values are given in the article as well.

  7. Wireless Security Threats, Vulnerabilities and Their Defense Mechanisms

    Ankur Bawiskar

    2013-01-01

    Full Text Available In today’s world means of communications has changed rapidly and the main focus is on wireless communications. Communication in wireless mode has many threats. This paper discusses a brief overview of various threats to wireless networks at various layers and also presents a survey of the defense mechanisms. The main aim is to discuss attacks on MANET and their defense mechanisms. Communication in wireless mode is more challenging as compared to wired mode because of dynamically changing network topology. Wireless networks are mostly used in military applications and commercial applications. This paper also discusses internal threats and external threats. It also gives an overview of routing protocols being used in wireless networks and various attacks that take place against these routing protocols and their counter measures.

  8. Comparison of high resolution terrestrial laser scanning and terrestrial photogrammetry for modeling applications

    Özdemir, Samed; Bayrak, Temel

    2016-04-01

    3D documentation of cultural heritage and engineering projects is an important matter. These documentation applications, requires highest possible accuracy and detail to represent the actual surface correctly. Terrestrial photogrammetric method which is employed to produce 3D models to day, now can obtain dense point clouds thanks to advancements in computer technology. Terrestrial laser scanners gained popularity in the last decade because of their high capacity and today they are being widely used in many applications. However every application has its own requirements that depend on the type of application, modeling environment, accuracy and budget limitations. This means, for every application highest accuracy instruments are not always best, considering the facts that mentioned before. In this study, laser scanner and terrestrial photogrammetric methods' spatial and model accuracies investigated under various conditions which include measuring targets at different instrument to object distances then investigating the accuracy of these measurements, modeling an irregular shaped surface to compare two surfaces volume and surface areas, at last comparing dimensions of known geometrical shaped small objects. Also terrestrial laser scanners and terrestrial photogrammetric methods most suitable application conditions investigated in terms of cost, time, mobility and accuracy. Terrestrial laser scanner has the ability to, measure distances under cm accuracy and directly measuring 3D world but there is also some drawbacks like sensitive, bulky and expensive equipment. When it comes to terrestrial photogrammetry, it has above cm accuracy, comparatively fast (considering the image acquisition stage), inexpensive but it can be affected by the coarse geometry, surface texture and the environmental lighting. Key Words: Accuracy, Comparison, Model, Terrestrial Photogrammetry, Terrestrial Laser Scanning,.

  9. Computer viruses: The threat today and the expected future

    Li, Xin

    2003-01-01

    This Master’s Thesis within the area computer security concerns ”Computer viruses: The threat today and the expected future”. Firstly, the definitions of computer virus and the related threats are presented; Secondly, current situation of computer viruses are discussed, the working and spreading mechanisms of computer viruses are reviewed in details, simplistic attitude of computer world in computer virus defence is analyzed; Thirdly, today’s influencing factors for near future computer viru...

  10. An Integrated Process Model of Stereotype Threat Effects on Performance

    Schmader, Toni; Johns, Michael; Forbes, Chad

    2008-01-01

    Research showing that activation of negative stereotypes can impair the performance of stigmatized individuals on a wide variety of tasks has proliferated. However, a complete understanding of the processes underlying these stereotype threat effects on behavior is still lacking. The authors examine stereotype threat in the context of research on stress arousal, vigilance, working memory, and self-regulation to develop a process model of how negative stereotypes impair performance on cognitive...

  11. Emotion blocks the path to learning under stereotype threat

    Mangels, Jennifer A.; Good, Catherine; Whiteman, Ronald C.; Maniscalco, Brian; Dweck, Carol S.

    2011-01-01

    Gender-based stereotypes undermine females’ performance on challenging math tests, but how do they influence their ability to learn from the errors they make? Females under stereotype threat or non-threat were presented with accuracy feedback after each problem on a GRE-like math test, followed by an optional interactive tutorial that provided step-wise problem-solving instruction. Event-related potentials tracked the initial detection of the negative feedback following errors [feedback relat...

  12. Stereotype Threat and College Academic Performance: A Latent Variables Approach*

    Owens, Jayanti; Massey, Douglas S.

    2011-01-01

    Stereotype threat theory has gained experimental and survey-based support in helping explain the academic underperformance of minority students at selective colleges and universities. Stereotype threat theory states that minority students underperform because of pressures created by negative stereotypes about their racial group. Past survey-based studies, however, are characterized by methodological inefficiencies and potential biases: key theoretical constructs have only been measured using ...

  13. Task Demands Moderate Stereotype Threat Effects on Memory Performance

    Hess, Thomas M.; Emery, Lisa; Queen, Tara L.

    2009-01-01

    Previous research has demonstrated that older adults’ memory performance is adversely affected by the explicit activation of negative stereotypes about aging. In this study, we examined the impact of stereotype threat on recognition memory, with specific interest in (a) the generalizability of previously observed effects, (b) the subjective experience of memory, and (c) the moderating effects of task demands. Older participants subjected to threat performed worse than did those in a nonthreat...

  14. Survey of threat studies related to the nuclear power industry

    A considerable effort has been directed toward the determination of threat characteristics, resulting in a voluminous collection of documents. This report summarizes several of the major studies in order to make the information more accessible. This summary includes only studies involving attacks on nuclear material, plus those incidents which because of their objectives, resources, or motivations may lend insight into potential threat against nuclear facilities or material

  15. Physician Office Readiness for Managing Internet Security Threats

    Keshavjee, K; Pairaudeau, N; Bhanji, A

    2006-01-01

    Internet security threats are evolving toward more targeted and focused attacks. Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus...

  16. Costa Rica - An Army-less Nation Facing External Threats

    Dall, Nana; Hammer Holm, Lasse; Kaas-Claesson, Kristina; McCay Martinez, Eamonn

    2013-01-01

    This project aims to explain how Costa Rica deal with external threats. Having abolished their military in 1948, the small state of Costa Rica situated in the conflict-ridden region of Central America, is internationally portrayed as an inspirational nation upholding peace and high morality. This has raised questions in regards to how Costa Rica upholds security in the event of threat. The project applies the International Relations theories of neo-liberalism and neo-realism to two cases: the...

  17. Staff Turnover as a Possible Threat to Knowledge Loss

    Linhartová Lucie; Urbancová Hana

    2011-01-01

    The article focuses on labour turnover as a potential threat to knowledge loss. Labour turnover results in an organizations inability to ensure knowledge continuity. In this study, induction was used to identify factors within organizations that determine employees’ exit from organizations. The verifiability of these factors was tested by means of correlation and regression. Subsequently, the presented causes of employee turnover were specified as potential threat to knowledge loss. In the cu...

  18. Terror threat perception and its consequences in contemporary Britain

    Goodwin, R; Wilson, M; Gaines, SO

    2005-01-01

    The terrorist attacks of 9/11, and subsequent terrorist acts around the world, have alerted social psychologists to the need to examine the antecedents and consequences of terrorist threat perception. In these two studies we examined the predictive power of demographic factors (age, sex, location), individual values and normative influences on threat perception and the consequences of this perception for behavioural change and close relationships. In study 1 (N = 100) gender, benevolence valu...

  19. Prejudice towards Muslims in The Netherlands: Testing integrated threat theory

    Velasco González, Karina; Verkuyten, Maykel; Weesie, Jeroen; Poppe, Edwin

    2008-01-01

    This study uses integrated threat theory to examine Dutch adolescents’ (N ¼ 1; 187) prejudice towards Muslim minorities. One out of two participants was found to have negative feelings towards Muslims. Perceived symbolic and realistic threat and negative stereotypes were examined as mediators between antecedent factors (in-group identification, intergroup contact, and the endorsement of multiculturalism) and prejudice. Based on structural equation modelling, it was found that stereotypes and ...

  20. Measuring Attentional Biases for Threat in Children and Adults

    Lobue, Vanessa

    2014-01-01

    Investigators have long been interested in the human propensity for the rapid detection of threatening stimuli. However, until recently, research in this domain has focused almost exclusively on adult participants, completely ignoring the topic of threat detection over the course of development. One of the biggest reasons for the lack of developmental work in this area is likely the absence of a reliable paradigm that can measure perceptual biases for threat in children. To address this issue...

  1. Multiagency security contingency planning: Mutual support against the high threat

    It is the author's objective to suggest a process that can materially enhance a critical facility's capacity for detecting, deterring, or if need be, defeating attacks from the higher end of the threat spectrum. This process systematically identifies those proactive and reactive measures required to address threat scenarios beyond the capabilities of in situ security resources. It then establishes implementing procedures which optimally utilize and integrate the considerable array of total onsite and offsite security, intelligence, and tactical response forces available

  2. Criteria and methods for assessing the threat status of ecosystem

    Guoke Chen; Keping Ma

    2012-01-01

    Assessing the threat status of ecosystems is a useful tool for understanding biodiversity loss on Earth. In 2008, the International Union for Conservation of Nature (IUCN) established a working group at the fourth World Conservation Congress to develop quantitative categories and criteria for assessing ecosystem threat status. These categories and criteria were similar to those used to assess extinction risk for species. This working group strove to establish red lists of ecosystems by applyi...

  3. Understanding and managing human threats to the coastal marine environment.

    Crain, Caitlin M; Halpern, Benjamin S; Beck, Mike W; Kappel, Carrie V

    2009-04-01

    Coastal marine habitats at the interface of land and sea are subject to threats from human activities in both realms. Researchers have attempted to quantify how these various threats impact different coastal ecosystems, and more recently have focused on understanding the cumulative impact from multiple threats. Here, the top threats to coastal marine ecosystems and recent efforts to understand their relative importance, ecosystem-level impacts, cumulative effects, and how they can best be managed and mitigated, are briefly reviewed. Results of threat analysis and rankings will differ depending on the conservation target (e.g., vulnerable species, pristine ecosystems, mitigatable threats), scale of interest (local, regional, or global), whether externalities are considered, and the types of management tools available (e.g., marine-protected areas versus ecosystem-based management). Considering the cumulative effect of multiple threats has only just begun and depends on spatial analysis to predict overlapping threats and a better understanding of multiple-stressor effects and interactions. Emerging conservation practices that hold substantial promise for protecting coastal marine systems include multisector approaches, such as ecosystem-based management (EBM), that account for ecosystem service valuation; comprehensive spatial management, such as ocean zoning; and regulatory mechanisms that encourage or require cross-sector goal setting and evaluation. In all cases, these efforts require a combination of public and private initiatives for success. The state of our ecological understanding, public awareness, and policy initiatives make the time ripe for advancing coastal marine management and improving our stewardship of coastal and marine ecosystems. PMID:19432644

  4. Biological warfare agents as threats to potable water.

    Burrows, W D; Renner, S E

    1999-01-01

    Nearly all known biological warfare agents are intended for aerosol application. Although less effective as potable water threats, many are potentially capable of inflicting heavy casualties when ingested. Significant loss of mission capability can be anticipated even when complete recovery is possible. Properly maintained field army water purification equipment can counter this threat, but personnel responsible for the operation and maintenance of the equipment may be most at risk of exposur...

  5. Current and Future Threats Framework in Smart Grid Domain

    Procopiou, A.; Komninos, N.

    2015-01-01

    Due to smart grid’s complex nature and criticality as an infrastructure, it is important to understand the key actors on each domain in depth so the potential vulnerabilities that can rise are identified. Furthermore, the correct identification of threats affecting the smart grid’s normal functionality must be realised, as well as what impact these threats can have so appropriate countermeasures are implemented. In this paper a list of vulnerabilities that weaken the smart grid is outlined. A...

  6. A Proposed Data Mining Profiler Model to Fight Security Threats in Nigeria

    Jackson AKPOJARO

    2013-01-01

    The growing insecurity challenges in Nigeria are of great concern to everyone and every effort must be employed to combat these security threats. Using the proposed data mining profiler model, our work distinguishes between information related threats and non-information related security threats. Information related threats are essentially attacks on computers and networks. That is, they are threats that damage electronic information. Non-information related terrorist threats include terroris...

  7. Threat perception after the Boston Marathon bombings: The effects of personal relevance and conceptual framing.

    Wormwood, Jolie Baumann; Lynn, Spencer K; Feldman Barrett, Lisa; Quigley, Karen S

    2016-01-01

    We examined how the Boston Marathon bombings affected threat perception in the Boston community. In a threat perception task, participants attempted to "shoot" armed targets and avoid shooting unarmed targets. Participants viewing images of the bombings accompanied by affectively negative music and text (e.g., "Terror Strikes Boston") made more false alarms (i.e., more errors "shooting" unarmed targets) compared to participants viewing the same images accompanied by affectively positive music and text (e.g., "Boston Strong") and participants who did not view bombing images. This difference appears to be driven by decreased sensitivity (i.e., decreased ability to distinguish guns from non-guns) as opposed to a more liberal bias (i.e., favouring the "shoot" response). Additionally, the more strongly affected the participant was by the bombings, the more their sensitivity was reduced in the negatively framed condition, suggesting that this framing was particularly detrimental to the most vulnerable individuals in the affected community. PMID:25707419

  8. Protecting National Critical Infrastructure against Radiological Threat

    responder equipped with a radiation detector or a dosimeter. The main impact of such a radiological attack is the contamination of a large areaxxxii. The size of the contaminated area depends on the type and activity of the radioactive material, on the type and geometry of the dispersion device, on the micro-meteorology conditions and on the cross contamination caused by the movement of people inside the contaminated areaxxxiii. Two experimental programs, Green Fieldxxxiv (GF) and Red Housexxxv (RH) were recently conducted in Israel in order to increase the preparedness for a RDD event. The GF program aimed at evaluating the consequences of an outdoor and an indoor explosion of an RDD device; while the RH program aimed at evaluating the outcome of a silent dispersion of a radioactive material inside a building. Based on the results of these two experimental programs, the consequences of a possible RDD attack or a silent indoor dispersion of a radioactive material will be given and the necessary preventative steps that can be taken in order to secure NCI's against these threats will be specified

  9. Exciting fear in adolescence: Does pubertal development alter threat processing?

    Jeffrey M. Spielberg

    2014-04-01

    Full Text Available Adolescent development encompasses an ostensible paradox in threat processing. Risk taking increases dramatically after the onset of puberty, contributing to a 200% increase in mortality. Yet, pubertal maturation is associated with increased reactivity in threat-avoidance systems. In the first part of this paper we propose a heuristic model of adolescent affective development that may help to reconcile aspects of this paradox, which focuses on hypothesized pubertal increases in the capacity to experience (some fear-evoking experiences as an exciting thrill. In the second part of this paper, we test key features of this model by examining brain activation to threat cues in a longitudinal study that disentangled pubertal and age effects. Pubertal increases in testosterone predicted increased activation to threat cues, not only in regions associated with threat avoidance (i.e., amygdala, but also regions associated with reward pursuit (i.e., nucleus accumbens. These findings are consistent with our hypothesis that puberty is associated with a maturational shift toward more complex processing of threat cues—which may contribute to adolescent tendencies to explore and enjoy some types of risky experiences.

  10. A Bayesian belief network of threat anticipation and terrorist motivations

    Olama, Mohammed M.; Allgood, Glenn O.; Davenport, Kristen M.; Schryver, Jack C.

    2010-04-01

    Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) as well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.

  11. An implementation-independent threat model for group communications

    Hester, Jason; Yurcik, William; Campbell, Roy

    2006-04-01

    The importance of group communications and the need to efficiently and reliably support it across a network is an issue of growing importance for the next decade. New group communication services are emerging such as multimedia conferencing/groupware, distributed interactive simulations, sensor fusion systems, command and control centers, and network-centric military applications. While a succession of point-to-point unicast routes could provide group communications, this approach is inherently inefficient and unlikely to support the increased resource requirements of these new services. There is the lack of a comprehensive process to designing security into group communications schemes. Designing such protection for group communications is best done by utilizing proactive system engineering rather than reacting with ad hoc countermeasures to the latest attack du jour. Threat modeling is the foundation for secure system engineering processes because it organizes system threats and vulnerabilities into general classes so they can be addressed with known protection techniques. Although there has been prior work on threat modeling primarily for software applications, however, to our knowledge this is the first attempt at implementation-independent threat modeling for group communications. We discuss protection challenges unique to group communications and propose a process to create a threat model for group communication systems independent of underlying implementation based on classical security principles (Confidentiality, Integrity, Availability, Authentication, or CIAA). It is our hope that this work will lead to better designs for protection solutions against threats to group communication systems.

  12. Cognitive and affective components of challenge and threat states.

    Meijen, Carla; Jones, Marc V; McCarthy, Paul J; Sheffield, David; Allen, Mark S

    2013-01-01

    We explored the cognitive and affective components of the Theory of Challenge and Threat States in Athletes (TCTSA) using a cross-sectional design. One hundred and seventy-seven collegiate athletes indicated how they typically approached an important competition on measures of self-efficacy, perceived control, achievement goals, emotional states and interpretation of emotional states. Participants also indicated to what extent they typically perceived the important competition as a challenge and/or a threat. The results suggest that a perception of challenge was not predicted by any of the cognitive components. A perception of threat was positively predicted by avoidance goals and negatively predicted by self-efficacy and approach goals. Both challenge and threat had a positive relationship with anxiety. Practical implications of this study are that an avoidance orientation appeared to be related to potentially negative constructs such as anxiety, threat and dejection. The findings may suggest that practitioners and researchers should focus on reducing an avoidance orientation, however the results should be treated with caution in applied settings, as this study did not examine how the combination of constructs exactly influences sport performance. The results provided partial support for the TCTSA with stronger support for proposed relationships with threat rather than challenge states. PMID:23256682

  13. Does stereotype threat affect women in academic medicine?

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists. PMID:22361794

  14. Terrestrial Carbon Cycle Feedback to Climate Warming: Experimental Evidence

    Luo, Y.; Zhou, X.; Sherry, R.

    2006-12-01

    Global climate modeling has demonstrated that climate warming would stimulate respiratory CO2 release from the terrestrial ecosystems to the atmosphere, which in turn leads to more warming in the climate system. This positive feedback between the climate change and the terrestrial carbon cycle can form a vicious cycle that potentially leads to a dangerous threat to ecosystem functioning and service. Some of the key processes underlying this feedback loop, however, have not been carefully examined by experimental studies. Those key processes include temperature sensitivity of ecosystem carbon influx; regulation of carbon processes by warming-induced changes in species composition, and nutrient and water availability; and phenology and timing of ecosystem processes under warming. We have conducted two warming experiments in a Southern Great Plains prairie to examine ecosystem responses to climate warming. We used infrared heaters to elevate soil temperature by approximately 2.0 and 4.0 oC, respectively, during the experimental period. Our results indicate that plant biomass growth increased by approximately 20% in the warmed plots in comparison to that in the control plots. The increased plant productivity likely resulted from extended length of growing seasons since warming advanced phenology of early-flowering species and delayed phenology of late-flowering species, leading to an extension of the growing season. Leaf photosynthesis, however, was not strongly affected by warming. Warming also considerably increased C4 plant biomass and caused slight decreases in growth of C3 plants. Increased C4 biomass and litter production resulted in decreases in quality and decomposition of bulk litter at the ecosystem scale, leading to an increase in litter mass at the soil surface. Soil respiration did not significantly increase in the first two years but increased by 8-10% in the last several years, largely due to increased root respiration and litter pool sizes. We did not

  15. Extraterrestrial amino acids and terrestrial life

    Chyba, Christopher F.

    1996-07-01

    Since the Swedish chemist Baron Jöns Jacob Berzelius first analysed the Alais meteorite for organic molecules' in 1834, attempts to forge a link between extraterrestrial organic materials and terrestrial life have remained alluring, but often deceptive. New studies reported in this and last week's issues hold the promise of important advances in both endeavours. (AIP)

  16. Forest inventory with terrestrial LiDAR

    Bauwens, Sébastien; Bartholomeus, Harm; Calders, Kim; Lejeune, Philippe

    2016-01-01

    The application of static terrestrial laser scanning (TLS) in forest inventories is becoming more effective. Nevertheless, the occlusion effect is still limiting the processing efficiency to extract forest attributes. The use of a mobile laser scanner (MLS) would reduce this occlusion. In this st

  17. Furostanol and Spirostanol Saponins from Tribulus terrestris

    Zhen-Fang Wang; Bing-Bing Wang; Yang Zhao; Fang-Xu Wang; Yan Sun; Rui-Jie Guo; Xin-Bo Song; Hai-Li Xin; Xin-Guang Sun

    2016-01-01

    Twelve new steroidal saponins, including eleven furostanol saponins, terrestrinin J–T (1–11), and one spirostanol saponin, terrestrinin U (12), together with seven known steroidal saponins 13–19 were isolated from T. terrestris. The structures of the new compounds were established on the basis of spectroscopic data, including 1D and 2D NMR and HRESIMS, and comparisons with published data.

  18. Dynamical Models of Terrestrial Planet Formation

    Lunine, Jonathan I; Raymond, Sean N; Morbidelli, Alessandro; Quinn, Thomas; Graps, Amara

    2009-01-01

    We review the problem of the formation of terrestrial planets, with particular emphasis on the interaction of dynamical and geochemical models. The lifetime of gas around stars in the process of formation is limited to a few million years based on astronomical observations, while isotopic dating of meteorites and the Earth-Moon system suggest that perhaps 50-100 million years were required for the assembly of the Earth. Therefore, much of the growth of the terrestrial planets in our own system is presumed to have taken place under largely gas-free conditions, and the physics of terrestrial planet formation is dominated by gravitational interactions and collisions. The earliest phase of terrestrial-planet formation involve the growth of km-sized or larger planetesimals from dust grains, followed by the accumulations of these planetesimals into ~100 lunar- to Mars-mass bodies that are initially gravitationally isolated from one-another in a swarm of smaller planetesimals, but eventually grow to the point of sig...

  19. High efficiency, long life terrestrial solar panel

    Chao, T.; Khemthong, S.; Ling, R.; Olah, S.

    1977-01-01

    The design of a high efficiency, long life terrestrial module was completed. It utilized 256 rectangular, high efficiency solar cells to achieve high packing density and electrical output. Tooling for the fabrication of solar cells was in house and evaluation of the cell performance was begun. Based on the power output analysis, the goal of a 13% efficiency module was achievable.

  20. Understanding changes in terrestrial water storage over West Africa between 2002 and 2014

    Ndehedehe, Christopher; Awange, Joseph; Agutu, Nathan; Kuhn, Michael; Heck, Bernhard

    2016-02-01

    With the vast water resources of West Africa coming under threat due to the impacts of climate variability and human influence, the need to understand its terrestrial water storage (TWS) changes becomes very important. Due to the lack of consistent in-situ hydrological data to assist in the monitoring of changes in TWS, this study takes advantage of the Gravity Recovery and Climate Experiment (GRACE) monthly gravity fields to provide estimates of vertically integrated changes in TWS over the period 2002-2014, in addition to satellite altimetry data for the period 1993-2014. In order to understand TWS variability over West Africa, Principal Component Analysis (PCA), a second order statistical technique, and Multiple Linear Regression Analysis (MLRA) are employed. Results show that dominant patterns of GRACE-derived TWS changes are observed mostly in the West Sahel, Guinea Coast, and Middle Belt regions of West Africa. This is probably caused by high precipitation rates at seasonal and inter-annual time scales induced by ocean circulations, altitude and physiographic features. While the linear trend for the spatially averaged GRACE-derived TWS changes over West Africa for the study period shows an increase of 6.85 ± 1.67 mm/yr, the PCA result indicates a significant increase of 20.2 ± 5.78 mm/yr in Guinea, a region with large inter-annual variability in seasonal rainfall, heavy river discharge, and huge groundwater potentials. The increase in GRACE-derived TWS during this period in Guinea, though inconsistent with the lack of a significant positive linear trend in TRMM based precipitation, is attributed to a large water surplus from prolonged wet seasons and lower evapotranspiration rates, leading to an increase in storage and inundated areas over the Guinea region. This increase in storage, which is also the aftermath of cumulative increase in the volume of water not involved in surface runoff, forms the huge freshwater availability in this region. However, the

  1. Terrestrial vegetation carbon sinks in China, 1981―2000

    FANG; JingYun; GUO; ZhaoDi; PIAO; ShiLong; CHEN; AnPing

    2007-01-01

    Using China's ground observations, e.g., forest inventory, grassland resource, agricultural statistics, climate, and satellite data, we estimate terrestrial vegetation carbon sinks for China's major biomes between 1981 and 2000. The main results are in the following: (1) Forest area and forest biomass carbon (C) stock increased from 116.5×106 ha and 4.3 Pg C (1 Pg C = 1015 g C) in the early 1980s to 142.8×106 ha and 5.9 Pg C in the early 2000s, respectively. Forest biomass carbon density increased form 36.9 Mg C/ha (1 Mg C = 106 g C) to 41.0 Mg C/ha, with an annual carbon sequestration rate of 0.075 Pg C/a. Grassland, shrub, and crop biomass sequestrate carbon at annual rates of 0.007 Pg C/a, 0.014―0.024 Pg C/a, and 0.0125―0.0143 Pg C/a, respectively. (2) The total terrestrial vegetation C sink in China is in a range of 0.096―0.106 Pg C/a between 1981 and 2000, accounting for 14.6%―16.1% of carbon dioxide (CO2) emitted by China's industry in the same period. In addition, soil carbon sink is estimated at 0.04―0.07 Pg C/a. Accordingly, carbon sequestration by China's terrestrial ecosystems (vegetation and soil) offsets 20.8%―26.8% of its industrial CO2 emission for the study period. (3) Considerable uncertainties exist in the present study, especially in the estimation of soil carbon sinks, and need further intensive investigation in the future.

  2. Land use effects on terrestrial carbon sources and sinks

    Josep; G.; Canadell

    2002-01-01

    Current and past land use practices are critical in determining the distribution and size of global terrestrial carbon (C) sources and sinks. Althoughfossil fuel emissions dominate the anthropogenic perturbation of the global C cycle, land use still drives the largest portion of anthropogenic emissions in a number of tropical regions of Asia. The size of the emission flux owing to land use change is still the biggest uncertainty in the global C budget. The Intergovernmental Panel on Climate Change (IPCC) reported a flux term of 1.7 PgC@a-1 for 1990-1995 but more recent estimates suggest the magnitude of this source may be only of 0.96 PgC@a-1 for the 1990s. In addition, current and past land use practices are now thought to contribute to a large degree to the northern hemisphere terrestrial sink, and are the dominant driver for some regional sinks. However, mechanisms other than land use change need to be invoked in order to explain the inferred C sink in the tropics. Potential candidates are the carbon dioxide (CO2) fertilization and climate change; fertilization due to nitrogen (N) deposition is believed to be small or nil. Although the potential for managing C sinks is limited, improved land use management and new land uses such as reforestation and biomass fuel cropping, can further enhance current terrestrial C sinks. Best management practices in agriculture alone could sequester 0.4-0.8 PgC per year in soils if implemented globally. New methodologies to ensure verification and permanency of C sequestration need to be developed.

  3. Phylogeography and spatial structure of the lowland tapir (Tapirus terrestris, Perissodactyla: Tapiridae) in South America.

    Ruiz-García, Manuel; Vásquez, Catalina; Sandoval, Sergio; Kaston, Franz; Luengas-Villamil, Kelly; Shostell, Joseph Mark

    2016-07-01

    We sequenced the mitochondrial cytochrome b gene of 141 lowland tapirs (Tapirus terrestris) - representing the largest geographical distribution sample of this species studied across of South America to date. We compare our new data regard to two previous works on population structure and molecular systematics of T. terrestris. Our data agree with the Thoisy et al.'s work in (1) the Northern Western Amazon basin was the area with the highest gene diversity levels in T. terrestris, being probably the area of initial diversification; (2) there was no clear association between haplogroups and specific geographical areas; (3) there were clear population decreases during the last glacial maximum for the different haplogroups detected, followed by population expansions during the Holocene; and (4) our temporal splits among different T. terrestris haplogroups coincided with the first molecular clock approach carried out by these authors (fossil calibration). Nevertheless, our study disagreed regard to other aspects of the Thoisy et al.'s claims: (1) meanwhile, they detected four relevant clades in their data, we put forward six different relevant clades; (2) the Amazon River was not a strong barrier for haplotype dispersion in T. terrestris; and (3) we found reciprocal monophyly between T. terrestris and T. pinchaque. Additionally, we sequenced 42 individuals (T. terrestris, T. pinchaque, T. bairdii, and the alleged "new species", T. kabomani) for three concatenated mitochondrial genes (Cyt-b, COI, and COII) agreeing quite well with the view of Voss et al., and against of the claims of Cozzuol et al. Tapirus kabomani should be not considered as a full species with the results obtained throughout the mitochondrial sequences. PMID:26000940

  4. Mammalian mesopredators on islands directly impact both terrestrial and marine communities.

    Suraci, Justin P; Clinchy, Michael; Zanette, Liana Y; Currie, Christopher M A; Dill, Lawrence M

    2014-12-01

    Medium-sized mammalian predators (i.e. mesopredators) on islands are known to have devastating effects on the abundance and diversity of terrestrial vertebrates. Mesopredators are often highly omnivorous, and on islands, may have access not only to terrestrial prey, but to marine prey as well, though impacts of mammalian mesopredators on marine communities have rarely been considered. Large apex predators are likely to be extirpated or absent on islands, implying a lack of top-down control of mesopredators that, in combination with high food availability from terrestrial and marine sources, likely exacerbates their impacts on island prey. We exploited a natural experiment--the presence or absence of raccoons (Procyon lotor) on islands in the Gulf Islands, British Columbia, Canada--to investigate the impacts that this key mesopredator has on both terrestrial and marine prey in an island system from which all native apex predators have been extirpated. Long-term monitoring of song sparrow (Melospiza melodia) nests showed raccoons to be the predominant nest predator in the Gulf Islands. To identify their community-level impacts, we surveyed the distribution of raccoons across 44 Gulf Islands, and then compared terrestrial and marine prey abundances on six raccoon-present and six raccoon-absent islands. Our results demonstrate significant negative effects of raccoons on terrestrial, intertidal, and shallow subtidal prey abundance, and point to additional community-level effects through indirect interactions. Our findings show that mammalian mesopredators not only affect terrestrial prey, but that, on islands, their direct impacts extend to the surrounding marine community. PMID:25234377

  5. Digital processing of signals arising from organic liquid scintillators for applications in the mixed-field assessment of nuclear threats

    Aspinall, M. D.; Joyce, M. J.; Mackin, R. O.; Jarrah, Z.; Peyton, A. J.

    2008-10-01

    The nuclear aspect of the CBRN* threat is often divided amongst radiological substances posing no criticality risk, often referred to as 'dirty bomb' scenarios, and fissile threats. The latter have the theoretical potential for criticality excursion, resulting in elevated neutron fluxes in addition to the γ-ray component that is common to dirty bombs. Even in isolation of the highly-unlikely criticality scenario, fissile substances often exhibit radiation fields comprising a significant neutron component which can require considerably different counterterrorism measures and clean-up methodologies. The contrast between these threats can indicate important differences in the relative sophistication of the perpetrators and their organizations. Consequently, the detection and discrimination of nuclear perils in terms of mixed-field content is an important assay in combating terrorist threats. In this paper we report on the design and implementation of a fast digitizer and embedded-processor for onthe- fly signal processing of events from organic liquid scintillators. A digital technique, known as Pulse Gradient Analysis (PGA), has been developed at Lancaster University for the digital discrimination of neutrons and γ rays. PGA has been deployed on bespoke hardware and demonstrates remarkable improvement over analogue methods for the assay of mixed fields and the real-time discrimination of neutrons and γ rays. In this regard the technology constitutes an attractive and affordable means for the discrimination of the radiation fields arising from fissile threats and those from dirty bombs. Data are presented demonstrating this capability with sealed radioactive sources.

  6. Pacific Remote Islands MNM: Initial Survey Instructions for Terrestrial Arthropods

    US Fish and Wildlife Service, Department of the Interior — The purposes of the terrestrial arthropod surveys are to: develop a species list of native and non-native terrestrial arthropods on land portions of the refuge;...

  7. Louisiana ESI: T_MAMMAL (Terrestrial Mammal Polygons)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains sensitive biological resource data for terrestrial mammals in Louisiana. Vector polygons in this data set represent terrestrial mammal...

  8. 77 FR 18271 - Terrestrial Environmental Studies for Nuclear Power Stations

    2012-03-27

    ... COMMISSION Terrestrial Environmental Studies for Nuclear Power Stations AGENCY: Nuclear Regulatory Commission... revision to Regulatory Guide (RG) 4.11, ``Terrestrial Environmental Studies for Nuclear Power Stations... environmental studies and analyses supporting licensing decisions for nuclear power reactors. ADDRESSES:...

  9. Observed Oceanic and Terrestrial Drivers of North African Climate

    Yu, Y.; Notaro, M.; Wang, F.; Mao, J.; Shi, X.; Wei, Y.

    2015-12-01

    Hydrologic variability can pose a serious threat to the poverty-stricken regions of North Africa. Yet, the current understanding of oceanic versus terrestrial drivers of North African droughts/pluvials is largely model-based, with vast disagreement among models. In order to identify the observed drivers of North African climate and develop a benchmark for model evaluations, the multivariate Generalized Equilibrium Feedback Assessment (GEFA) is applied to observations, remotely sensed data, and reanalysis products. The identified primary oceanic drivers of North African rainfall variability are the Atlantic, tropical Indian, and tropical Pacific Oceans and Mediterranean Sea. During the summer monsoon, positive tropical eastern Atlantic sea-surface temperature (SST) anomalies are associated with a southward shift of the Inter-Tropical Convergence Zone, enhanced ocean evaporation, and greater precipitable water across coastal West Africa, leading to increased West African monsoon (WAM) rainfall and decreased Sahel rainfall. During the short rains, positive SST anomalies in the western tropical Indian Ocean and negative anomalies in the eastern tropical Indian Ocean support greater easterly oceanic flow, evaporation over the western ocean, and moisture advection to East Africa, thereby enhancing rainfall. The sign, magnitude, and timing of observed vegetation forcing on rainfall vary across North Africa. The positive feedback of leaf area index (LAI) on rainfall is greatest during DJF for the Horn of Africa, while it peaks in autumn and is weakest during the summer monsoon for the Sahel. Across the WAM region, a positive LAI anomaly supports an earlier monsoon onset, increased rainfall during the pre-monsoon, and decreased rainfall during the wet season. Through unique mechanisms, positive LAI anomalies favor enhanced transpiration, precipitable water, and rainfall across the Sahel and Horn of Africa, and increased roughness, ascent, and rainfall across the WAM region

  10. Threat affects risk preferences in movement decision making

    Megan K. O'Brien

    2015-06-01

    Full Text Available Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching and whole-body leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory. Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the whole-body task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the whole-body movements than in arm-reaching at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects’ inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  11. Ebola Virus ─ A Global Threat

    Mejbah Uddin Ahmed; Sushmita Roy

    2015-01-01

    Ebola virus is a filamentous, enveloped, non-segmented, single-stranded, negative-sense RNA virus. It belongs to the Filoviridae and was first recognized near the Ebola River valley in Zaire in 1976. Since then most of the outbreaks have occurred to both human and nonhuman primates in sub-Saharan Africa. Ebola virus causes highly fatal hemorrhagic fever in human and nonhuman primates. In addition to hemorrhagic fever, it could be used as a bioterrorism agent. Although its natural reservoir is...

  12. Global demand for gold is another threat for tropical forests

    The current global gold rush, driven by increasing consumption in developing countries and uncertainty in financial markets, is an increasing threat for tropical ecosystems. Gold mining causes significant alteration to the environment, yet mining is often overlooked in deforestation analyses because it occupies relatively small areas. As a result, we lack a comprehensive assessment of the spatial extent of gold mining impacts on tropical forests. In this study, we provide a regional assessment of gold mining deforestation in the tropical moist forest biome of South America. Specifically, we analyzed the patterns of forest change in gold mining sites between 2001 and 2013, and evaluated the proximity of gold mining deforestation to protected areas (PAs). The forest cover maps were produced using the Land Mapper web application and images from the MODIS satellite MOD13Q1 vegetation indices 250 m product. Annual maps of forest cover were used to model the incremental change in forest in ∼1600 potential gold mining sites between 2001–2006 and 2007–2013. Approximately 1680 km2 of tropical moist forest was lost in these mining sites between 2001 and 2013. Deforestation was significantly higher during the 2007–2013 period, and this was associated with the increase in global demand for gold after the international financial crisis. More than 90% of the deforestation occurred in four major hotspots: Guianan moist forest ecoregion (41%), Southwest Amazon moist forest ecoregion (28%), Tapajós–Xingú moist forest ecoregion (11%), and Magdalena Valley montane forest and Magdalena–Urabá moist forest ecoregions (9%). In addition, some of the more active zones of gold mining deforestation occurred inside or within 10 km of ∼32 PAs. There is an urgent need to understand the ecological and social impacts of gold mining because it is an important cause of deforestation in the most remote forests in South America, and the impacts, particularly in aquatic systems

  13. Terrestrial matter effects on reactor antineutrino oscillations at JUNO or RENO-50: how small is small?

    Li, Yu-Feng; Xing, Zhi-zhong

    2016-01-01

    We have carefully examined, in both analytical and numerical ways, how small the terrestrial matter effects can be in a given medium-baseline reactor antineutrino oscillation experiment like JUNO or RENO-50. Taking the ongoing JUNO experiment for example, we show that the inclusion of terrestrial matter effects may reduce the sensitivity of the neutrino mass ordering measurement by \\Delta \\chi^2_{\\rm MO} \\simeq 0.6, and a neglect of such effects may shift the best-fit values of the flavor mixing angle \\theta_{12} and the neutrino mass-squared difference \\Delta_{21} by about 1\\sigma to 2\\sigma in the future data analysis. In addition, a preliminary estimate indicates that a 2\\sigma sensitivity of establishing the terrestrial matter effects can be achieved for about 10 years of data taking at JUNO with the help of a proper near detector implementation.

  14. Aquatic carbon cycling in the conterminous United States and implications for terrestrial carbon accounting.

    Butman, David; Stackpoole, Sarah; Stets, Edward; McDonald, Cory P; Clow, David W; Striegl, Robert G

    2016-01-01

    Inland water ecosystems dynamically process, transport, and sequester carbon. However, the transport of carbon through aquatic environments has not been quantitatively integrated in the context of terrestrial ecosystems. Here, we present the first integrated assessment, to our knowledge, of freshwater carbon fluxes for the conterminous United States, where 106 (range: 71-149) teragrams of carbon per year (TgC⋅y(-1)) is exported downstream or emitted to the atmosphere and sedimentation stores 21 (range: 9-65) TgC⋅y(-1) in lakes and reservoirs. We show that there is significant regional variation in aquatic carbon flux, but verify that emission across stream and river surfaces represents the dominant flux at 69 (range: 36-110) TgC⋅y(-1) or 65% of the total aquatic carbon flux for the conterminous United States. Comparing our results with the output of a suite of terrestrial biosphere models (TBMs), we suggest that within the current modeling framework, calculations of net ecosystem production (NEP) defined as terrestrial only may be overestimated by as much as 27%. However, the internal production and mineralization of carbon in freshwaters remain to be quantified and would reduce the effect of including aquatic carbon fluxes within calculations of terrestrial NEP. Reconciliation of carbon mass-flux interactions between terrestrial and aquatic carbon sources and sinks will require significant additional research and modeling capacity. PMID:26699473

  15. Stereotype threat reduces false recognition when older adults are forewarned.

    Wong, Jessica T; Gallo, David A

    2016-05-01

    Exposing older adults to ageing stereotypes can reduce their memory for studied information-a phenomenon attributed to stereotype threat-but little is known about stereotype effects on false memory. Here, we assessed ageing stereotype effects on the Deese-Roediger-McDermott false memory illusion. Older adults studied lists of semantically associated words, and then read a passage about age-related memory decline (threat condition) or an age-neutral passage (control condition). They then took a surprise memory test with a warning to avoid false recognition of non-studied associates. Relative to the control condition, activating stereotype threat reduced the recognition of both studied and non-studied words, implicating a conservative criterion shift for associated test words. These results indicate that stereotype threat can reduce false memory, and they help to clarify mixed results from prior ageing research. Consistent with the regulatory focus hypothesis, threat motivates older adults to respond more conservatively when error-prevention is emphasised at retrieval. PMID:26218527

  16. Matching and fairness in threat-based mobile sensor coverage

    Cheng-Yu, Ma T. [Purdue Univ., West Lafayette, IN (United States). Dept. of Computer Science; Yau, King Y. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States). Spallation Neutron Source (SNS); Chin, Jren-Chit [Purdue Univ., West Lafayette, IN (United States). Dept. of Computer Science; Rao, Nageswara S. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States). Spallation Neutron Source (SNS); Shankar, Mallikarjun [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States). Spallation Neutron Source (SNS)

    2009-12-01

    Mobile sensors can be used to effect complete coverage of a surveillance area for a given threat over time, thereby reducing the number of sensors necessary. The surveillance area may have a given threat profile as determined by the kind of threat, and accompanying meteorological, environmental, and human factors. In planning the movement of sensors, areas that are deemed higher threat should receive proportionately higher coverage. We propose a coverage algorithm for mobile sensors to achieve a coverage that will match - over the long term and as quantified by an RMSE metric - a given threat profile. Moreover, the algorithm has the following desirable properties: (1) stochastic, so that it is robust to contingencies and makes it hard for an adversary to anticipate the sensor's movement, (2) efficient, and (3) practical, by avoiding movement over inaccessible areas. Further to matching, we argue that a fairness measure of performance over the shorter time scale is also important. We show that the RMSE and fairness are, in general, antagonistic, and argue for the need of a combined measure of performance, which we call efficacy. We show how a pause time parameter of the coverage algorithm can be used to control the trade-off between the RMSE and fairness, and present an efficient offline algorithm to determine the optimal pause time maximizing the efficacy. Finally, we discuss the effects of multiple sensors, under both independent and coordinated operation. Extensive simulation results - under realistic coverage scenarios - are presented for performance evaluation.

  17. Managing threats from emerging technologies: can safeguards show the way?

    The system of international nuclear safeguards implemented by the International Atomic Energy Agency (IAEA) is primarily a means of verification of states’ commitments under various legal instruments, principally the Nuclear Non‑Proliferation Treaty (NPT), to utilize controlled nuclear fission for peaceful purposes only. However, the safeguards system can also be seen as a mechanism through which states acted to reduce the threat posed by a new technology that had a transformative impact on existing national security paradigms when it emerged in the twentieth century. In the twenty‑first century, new technologies with equally profound national security implications are emerging. These include biotechnology and synthetic biology, nano technology, information technology, cognitive science, robotics and artificial intelligence. Throughout its history, the safeguards system has evolved to accommodate new technologies, new undertakings and new threats. Because multiple emerging technologies now constitute potential national security threats, it is appropriate to consider whether and how the lessons and successes of the safeguards system, including its capacity to evolve in response to changing requirements, could be leveraged to mitigate the threat posed by these new technologies. This paper addresses the possibility of re‑imagining safeguards in a way that makes them applicable to a broader range of technology‑based threats without compromising their effectiveness for their original purpose.

  18. Assessment of terrorist threats to the Canadian energy sector

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs

  19. Canine distemper virus as a threat to wild tigers in Russia and across their range.

    Gilbert, Martin; Soutyrina, Svetlana V; Seryodkin, Ivan V; Sulikhan, Nadezhda; Uphyrkina, Olga V; Goncharuk, Mikhail; Matthews, Louise; Cleaveland, Sarah; Miquelle, Dale G

    2015-07-01

    Canine distemper virus (CDV) has recently been identified in populations of wild tigers in Russia and India. Tiger populations are generally too small to maintain CDV for long periods, but are at risk of infections arising from more abundant susceptible hosts that constitute a reservoir of infection. Because CDV is an additive mortality factor, it could represent a significant threat to small, isolated tiger populations. In Russia, CDV was associated with the deaths of tigers in 2004 and 2010, and was coincident with a localized decline of tigers in Sikhote-Alin Biosphere Zapovednik (from 25 tigers in 2008 to 9 in 2012). Habitat continuity with surrounding areas likely played an important role in promoting an ongoing recovery. We recommend steps be taken to assess the presence and the impact of CDV in all tiger range states, but should not detract focus away from the primary threats to tigers, which include habitat loss and fragmentation, poaching and retaliatory killing. Research priorities include: (i) recognition and diagnosis of clinical cases of CDV in tigers when they occur; and (ii) collection of baseline data on the health of wild tigers. CDV infection of individual tigers need not imply a conservation threat, and modeling should complement disease surveillance and targeted research to assess the potential impact to tiger populations across the range of ecosystems, population densities and climate extremes occupied by tigers. Describing the role of domestic and wild carnivores as contributors to a local CDV reservoir is an important precursor to considering control measures. PMID:25939829

  20. Global Threat Reduction Initiative International Partners' Conference. Summary of the proceedings and findings of the conference

    The Global Threat Reduction Initiative (GTRI) International Partners' Conference took place in Vienna, Austria, from September 18-19, 2004. More than 590 representatives from 100 International Atomic Energy Agency (IAEA) Member States attended the GTRI International Partners' Conference on September 18-19, 2004, in Vienna, Austria. Representatives from ten non-governmental and international organizations were also present during the conference. The Governments of the United States and the Russian Federation co-sponsored the International Partners Conference, with support from the International Atomic Energy Agency. The purpose of the International Partners' Conference was to build and broaden international support for efforts by national authorities to identify, secure, recover, and/or facilitate the disposition of high-risk nuclear and radioactive materials that pose a potential threat to the international community. One of the significant outcomes of the International Partners Conference was reaching agreement on the Findings of the Conference (enclosed in this document) by participating Member States that outlined a broadly shared opinion of participating Member States on efforts to reduce the potential threat posed by vulnerable, unsecured nuclear and other radioactive material. It is hoped that this document can be used as a framework to consolidate, expand, and accelerate domestic, regional, and IAEA programs that address unsecured vulnerable nuclear and radioactive materials, as deemed necessary by Member States. As a first step, participating members states urged the international community to note additional opportunities to further build support for activities related to GTRI