WorldWideScience

Sample records for additional terrestrial threat

  1. Amphibian nitrate stress as an additional terrestrial threat from astrophysical ionizing radiation events?

    CERN Document Server

    Thomas, Brian C

    2008-01-01

    As diversity in amphibian species declines, the search for causes has intensified. Work in this area has shown that amphibians are especially susceptible to the combination of heightened UVB radiation and increased nitrate concentrations. Various astrophysical events have been suggested as sources of ionizing radiation that could pose a threat to life on Earth, through destruction of the ozone layer and subsequent increase in UVB, followed by deposition of nitrate. In this study, we investigate whether the nitrate deposition following an ionizing event is sufficiently large to cause an additional stress beyond that of the heightened UVB previously considered. We have converted predicted nitrate depositions to concentration values, utilizing data from the New York State Department of Environmental Conservation Acid Rain Monitoring Network web site. Our results show that the increase in nitrate concentration in bodies of water following the most intense ionization event likely in the last billion years would no...

  2. Global response patterns of terrestrial plant species to nitrogen addition.

    Science.gov (United States)

    Xia, Jianyang; Wan, Shiqiang

    2008-07-01

    Better understanding of the responses of terrestrial plant species under global nitrogen (N) enrichment is critical for projection of changes in structure, functioning, and service of terrestrial ecosystems. Here, a meta-analysis of data from 304 studies was carried out to reveal the general response patterns of terrestrial plant species to the addition of N. Across 456 terrestrial plant species included in the analysis, biomass and N concentration were increased by 53.6 and 28.5%, respectively, under N enrichment. However, the N responses were dependent upon plant functional types, with significantly greater biomass increases in herbaceous than in woody species. Stimulation of plant biomass by the addition of N was enhanced when other resources were improved. In addition, the N responses of terrestrial plants decreased with increasing latitude and increased with annual precipitation. Dependence of the N responses of terrestrial plants on biological realms, functional types, tissues, other resources, and climatic factors revealed in this study can help to explain changes in species composition, diversity, community structure and ecosystem functioning under global N enrichment. These findings are critical in improving model simulation and projection of terrestrial carbon sequestration and its feedbacks to global climate change, especially when progressive N limitation is taken into consideration. PMID:19086179

  3. TLSpy: An Open-Source Addition to Terrestrial Lidar Workflows

    Science.gov (United States)

    Frechette, J. D.; Weissmann, G. S.; Wawrzyniec, T. F.

    2008-12-01

    Terrestrial lidar scanners (TLS) that capture three dimensional (3D) geometry with cm scale precision present many new opportunities in the Earth Sciences and related fields. However, the lack of domain specific tools impedes full and efficient utilization of the information contained in these datasets. Most processing and analysis is performed using a variety of manufacturing, surveying, airborne lidar, and GIS software. Although much overlap exists, inevitably some needs are not addressed by these applications. TLSpy provides a plugin driven framework with 3D visualization capabilities that encourages researchers to fill these gaps. The goal is to free researchers from the intellectual overhead imposed by user and data interface design, enabling rapid development of TLS specific processing and analysis algorithms. We present two plugins as examples of problems that TLSpy is being applied to. The first plugin corrects for the strong influence of target orientation on TLS measured reflectance intensities. It calculates the distribution of incidence angles and intensities in an input scan and assists the user in fitting a reflectance model to the distribution. The model is then used to normalize input intensities, minimizing the impact of surface orientation and simplifying the extraction of quantitative data from reflectance measurements. Although reasonable default models can be determined the large number of factors influencing reflectance values require that the plugin be designed for maximum flexibility, allowing the user to adjust all model parameters and define new reflectance models as needed. The second plugin helps eliminate multipath reflections from water surfaces. Characterized by a lower intensity mirror image of the subaerial bank appearing below the water surface, these reflections are a common problem in scans containing water. These erroneous reflections can be removed by manually selecting points that lie on the waterline, fitting a plane to the

  4. Hotspots of species richness, threat and endemism for terrestrial vertebrates in SW Europe

    Science.gov (United States)

    Pascual, López-López; Luigi, Maiorano; Alessandra, Falcucci; Emilio, Barba; Luigi, Boitani

    2011-09-01

    The Mediterranean basin, and the Iberian Peninsula in particular, represent an outstanding "hotspot" of biological diversity with a long history of integration between natural ecosystems and human activities. Using deductive distribution models, and considering both Spain and Portugal, we downscaled traditional range maps for terrestrial vertebrates (amphibians, breeding birds, mammals and reptiles) to the finest possible resolution with the data at hand, and we identified hotspots based on three criteria: i) species richness; ii) vulnerability, and iii) endemism. We also provided a first evaluation of the conservation status of biodiversity hotspots based on these three criteria considering both existing and proposed protected areas (i.e., Natura 2000). For the identification of hotspots, we used a method based on the cumulative distribution functions of species richness values. We found no clear surrogacy among the different types of hotspots in the Iberian Peninsula. The most important hotspots (considering all criteria) are located in the western and southwestern portions of the study area, in the Mediterranean biogeographical region. Existing protected areas are not specifically concentrated in areas of high species richness, with only 5.2% of the hotspots of total richness being currently protected. The Natura 2000 network can potentially constitute an important baseline for protecting vertebrate diversity in the Iberian Peninsula although further improvements are needed. We suggest taking a step forward in conservation planning in the Mediterranean basin, explicitly considering the history of the region as well as its present environmental context. This would allow moving from traditional reserve networks (conservation focused on "patterns") to considerations about the "processes" that generated present biodiversity.

  5. A new threat to bees? Entomopathogenic nematodes used in biological pest control cause rapid mortality in Bombus terrestris.

    Science.gov (United States)

    Dutka, Alexandrea; McNulty, Alison; Williamson, Sally M

    2015-01-01

    There is currently a great deal of concern about population declines in pollinating insects. Many potential threats have been identified which may adversely affect the behaviour and health of both honey bees and bumble bees: these include pesticide exposure, and parasites and pathogens. Whether biological pest control agents adversely affect bees has been much less well studied: it is generally assumed that biological agents are safer for wildlife than chemical pesticides. The aim of this study was to test whether entomopathogenic nematodes sold as biological pest control products could potentially have adverse effects on the bumble bee Bombus terrestris. One product was a broad spectrum pest control agent containing both Heterorhabditis sp. and Steinernema sp., the other product was specifically for weevil control and contained only Steinernema kraussei. Both nematode products caused ≥80% mortality within the 96 h test period when bees were exposed to soil containing entomopathogenic nematodes at the recommended field concentration of 50 nematodes per cm(2) soil. Of particular concern is the fact that nematodes from the broad spectrum product could proliferate in the carcasses of dead bees, and therefore potentially infect a whole bee colony or spread to the wider environment.

  6. Threatened freshwater and terrestrial molluscs (Mollusca, Gastropoda et Bivalvia of Santa Catarina State, Southern Brazil: check list and evaluation of regional threats

    Directory of Open Access Journals (Sweden)

    2011-06-01

    Full Text Available A total of nineteen continental native mollusc species are confirmed for the Santa Catarina State (SC(organized in ten Genera and seven Families, one aquatic Prosobranchia/Caenogastropoda (Ampullariidae,six Pulmonata terrestrial gastropods (one Ellobiidae, three Megalobulimidae and two micro-snails –Charopidae and Streptaxidae and twelve freshwater mussels (eight Mycetopodidae and four Hyriidae. Thesespecies are designated by the International Union for Conservation of the Nature – IUCN as follows: seven as"Vulnerable", six "In Danger" and six “Without Category Established”. The general regional threats that thesespecies are subjected to are briefly analyzed.

  7. Co2-Y ferrite modified by CuO addition applied to a terrestrial broadcasting antenna

    Science.gov (United States)

    Fujii, Shigeo; Nishijima, Kaihei; Satoh, Hiroshi; Yamamoto, Setsuo

    2015-04-01

    The addition of CuO to hexagonal Y-type ferrites, Ba2Co2Fe12O22 was investigated as a way to modify the magnetic properties of these materials. It was found that a 0.6 wt% CuO addition led to a real part of complex permeability of 2.7 and a loss factor of 0.05 even at a frequency of 1 GHz. The doped ferrite was applied in a terrestrial broadcasting (ISDB) antenna in the 470-750 MHz frequency range. A ferrite antenna with a dimension of 3 mm×3 mm×30 mm dimensions with helical printed conductor patterns was designed and fabricated. It exhibited excellent average gain of -0.5 dBi at a center frequency of ~600 MHz and showed a wide bandwidth of 160 MHz under a gain level of -5 dBi.

  8. Acidification of East Siberian Arctic Shelf waters through addition of freshwater and terrestrial carbon

    Science.gov (United States)

    Semiletov, Igor; Pipko, Irina; Gustafsson, Örjan; Anderson, Leif G.; Sergienko, Valentin; Pugach, Svetlana; Dudarev, Oleg; Charkin, Alexander; Gukov, Alexander; Bröder, Lisa; Andersson, August; Spivak, Eduard; Shakhova, Natalia

    2016-05-01

    Ocean acidification affects marine ecosystems and carbon cycling, and is considered a direct effect of anthropogenic carbon dioxide uptake from the atmosphere. Accumulation of atmospheric CO2 in ocean surface waters is predicted to make the ocean twice as acidic by the end of this century. The Arctic Ocean is particularly sensitive to ocean acidification because more CO2 can dissolve in cold water. Here we present observations of the chemical and physical characteristics of East Siberian Arctic Shelf waters from 1999, 2000-2005, 2008 and 2011, and find extreme aragonite undersaturation that reflects acidity levels in excess of those projected in this region for 2100. Dissolved inorganic carbon isotopic data and Markov chain Monte Carlo simulations of water sources using salinity and δ18O data suggest that the persistent acidification is driven by the degradation of terrestrial organic matter and discharge of Arctic river water with elevated CO2 concentrations, rather than by uptake of atmospheric CO2. We suggest that East Siberian Arctic Shelf waters may become more acidic if thawing permafrost leads to enhanced terrestrial organic carbon inputs and if freshwater additions continue to increase, which may affect their efficiency as a source of CO2.

  9. Additive threats from pathogens, climate and land-use change for global amphibian diversity.

    Science.gov (United States)

    Hof, Christian; Araújo, Miguel B; Jetz, Walter; Rahbek, Carsten

    2011-11-16

    Amphibian population declines far exceed those of other vertebrate groups, with 30% of all species listed as threatened by the International Union for Conservation of Nature. The causes of these declines are a matter of continued research, but probably include climate change, land-use change and spread of the pathogenic fungal disease chytridiomycosis. Here we assess the spatial distribution and interactions of these primary threats in relation to the global distribution of amphibian species. We show that the greatest proportions of species negatively affected by climate change are projected to be found in Africa, parts of northern South America and the Andes. Regions with the highest projected impact of land-use and climate change coincide, but there is little spatial overlap with regions highly threatened by the fungal disease. Overall, the areas harbouring the richest amphibian faunas are disproportionately more affected by one or multiple threat factors than areas with low richness. Amphibian declines are likely to accelerate in the twenty-first century, because multiple drivers of extinction could jeopardize their populations more than previous, mono-causal, assessments have suggested.

  10. A review of conservation threats on Gough Island: a case study for terrestrial conservation in the Southern Oceans

    NARCIS (Netherlands)

    Jones, A.; Chown, S.L.; Ryan, P.G.; Gremmen, N.J.M.; Gaston, K.J.

    2003-01-01

    Gough Island is a remote Southern Ocean Island that, despite having no permanent human population, is under substantial conservation threat as a result of human activity. A considerable proportion of the flora and fauna has been accidentally introduced, and new data are presented showing that ca. 70

  11. Additive threats from pathogens, climate and land-use change for global amphibian diversity

    DEFF Research Database (Denmark)

    Hof, Christian; Bastos Araujo, Miguel; Jetz, Walter;

    2011-01-01

    Amphibian population declines far exceed those of other vertebrate groups, with 30% of all species listed as threatened by the International Union for Conservation of Nature. The causes of these declines are a matter of continued research, but probably include climate change, land-use change...... and spread of the pathogenic fungal disease chytridiomycosis. Here we assess the spatial distribution and interactions of these primary threats in relation to the global distribution of amphibian species. We show that the greatest proportions of species negatively affected by climate change are projected...... to be found in Africa, parts of northern South America and the Andes. Regions with the highest projected impact of land-use and climate change coincide, but there is little spatial overlap with regions highly threatened by the fungal disease. Overall, the areas harbouring the richest amphibian faunas...

  12. Co{sub 2}-Y ferrite modified by CuO addition applied to a terrestrial broadcasting antenna

    Energy Technology Data Exchange (ETDEWEB)

    Fujii, Shigeo, E-mail: s502wd@yamaguchi-u.ac.jp; Nishijima, Kaihei; Satoh, Hiroshi; Yamamoto, Setsuo

    2015-04-01

    The addition of CuO to hexagonal Y-type ferrites, Ba{sub 2}Co{sub 2}Fe{sub 12}O{sub 22} was investigated as a way to modify the magnetic properties of these materials. It was found that a 0.6 wt% CuO addition led to a real part of complex permeability of 2.7 and a loss factor of 0.05 even at a frequency of 1 GHz. The doped ferrite was applied in a terrestrial broadcasting (ISDB) antenna in the 470–750 MHz frequency range. A ferrite antenna with a dimension of 3 mm×3 mm×30 mm dimensions with helical printed conductor patterns was designed and fabricated. It exhibited excellent average gain of −0.5 dBi at a center frequency of ~600 MHz and showed a wide bandwidth of 160 MHz under a gain level of −5 dBi. - Highlights: • The magnetic properties of Co{sub 2}-Y hexagonal ferrite was modified by the CuO addition. • A low tan δ of 0.05 along with a permeability of 2.7 at 1 GHz was achieved. • The ferrite was applied to a terrestrial broadcasting antenna with a helical winding. • A wide bandwidth of 160 MHz and average gain of −0.5 dBi at 600 MHz were demonstrated.

  13. Terrestrial exposure of oilfield flowline additives diminish soil structural stability and remediative microbial function

    International Nuclear Information System (INIS)

    Onshore oil production pipelines are major installations in the petroleum industry, stretching many thousands of kilometres worldwide which also contain flowline additives. The current study focuses on the effect of the flowline additives on soil physico-chemical and biological properties and quantified the impact using resilience and resistance indices. Our findings are the first to highlight deleterious effect of flowline additives by altering some fundamental soil properties, including a complete loss of structural integrity of the impacted soil and a reduced capacity to degrade hydrocarbons mainly due to: (i) phosphonate salts (in scale inhibitor) prevented accumulation of scale in pipelines but also disrupted soil physical structure; (ii) glutaraldehyde (in biocides) which repressed microbial activity in the pipeline and reduced hydrocarbon degradation in soil upon environmental exposure; (iii) the combinatory effects of these two chemicals synergistically caused severe soil structural collapse and disruption of microbial degradation of petroleum hydrocarbons. - Highlights: → Effects of flowline additives on soil structure and microbial function highlighted. → Phosphonate salts (in scale inhibitor) were found to disrupt soil physical structure. → Glutaraldehyde (in biocides) caused significant reduction of hydrocarbon degradation in soil. → Flowline additive chemicals synergistically affects soil structure and remediative microbial function. - Scale inhibitor and biocide oilfield flowline additives interactively affect soil physical and microbial properties

  14. China Threat, What Threat?

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Since the end of the Cold War, China has become the candidate of choice among "illusionist" hawks looking to justify Pentagon spending. Henry Rosemont, a professor emeritus at St Mary’s CoUege of Maryland and a visiting scholar in the Religious Studies Department at Brown University, recently wrote an article for Asia Times Online, saying that facts belie the claims of China’s military threat

  15. Nanling protected areas face a major threat to terrestrial vertebrates and the basic strategies%南岭保护区陆栖脊椎动物面临的主要威胁及基本对策

    Institute of Scientific and Technical Information of China (English)

    林芳; 李石洲; 李超荣

    2011-01-01

    Nanling National Nature Reserve to protect terrestrial wildlife spine was investigated, results show that the hunting, eeo-tourism, natural disasters, habitat destruction and other factors on the survival of wild animals are threatened, the main reason for the threat analyzed, and proposed protection measures and measures.%对南岭国家级自然保护区陆栖脊椎野生动物保护进行了调查研究,结果表明狩猎、生态旅游、自然灾害、生境破坏等因素对野生动物的生存均有威胁,针对造成威胁的主要原因进行了分析,并提出了保护对策和措施.

  16. Biological Threats

    Science.gov (United States)

    ... Workplace Plans School Emergency Plans Main Content Biological Threats Biological agents are organisms or toxins that can ... for Disease Control and Prevention . Before a Biological Threat Unlike an explosion, a biological attack may or ...

  17. Ozone threat

    International Nuclear Information System (INIS)

    Ozone hole was first discovered in 1980. Thus 15 years even after the first warming, the world is no where near to the elimination of man made gases that threaten to destroy the ozone layer. Ozone depletion has become a matter of enormous threat which remains to be solved by the Scientists and intelligentia of the world. Ozone (O3) is a pungent poisonous gas. It forms a layer at a distance of about 15 miles above the earth's surface which helps shield living things from the sun shearing ultra violet light. If ozone is lost, more ultra violet light reaches the earth, which can lead to increasing rate of skin cancer, the death of micro organisms and the failure of crops and plants. It was in 1974 when it was discovered that Chlorofluorocarbons (CFCs) cold rise slowly to the upper atmosphere and destroy the earth's fragile ozone shield. Chlorofluorocarbons are commonly used as coolants (such as Freon) for home and automobile air conditioners and in the making of fast food containers. CFCs take about 100 years or more to reach he stratosphere to damage the ozone layers. In 1988, Scientists confirmed that upto 3% of the ozone layer over the more populated Northern Hemisphere has been destroyed. it is believed that for every 1% decrease in ozone, skin cancers are expected to rise 5 to 6 per cent due to the increase of ultraviolet light. Cases of cataracts and certain human immune system diseases are also expected to rise. (author)

  18. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  19. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  20. Is the Hybrid Threat a True Threat?

    Directory of Open Access Journals (Sweden)

    David L. Raugh

    2016-06-01

    Full Text Available Does the “hybrid threat” discussed in General Marty Dempsey’s 2015 United States National Military Strategy make logical sense? In this paper I define the national security threat risk assessment process, examine the most significant US security threats, and study the hybrid threat. I conclude that the hybrid threat is the one that could most exploit our nation’s critical vulnerabilities- both from a security and foreign policy perspective. I conclude with a study of security and economic methods to reduce this threat.

  1. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  2. Terrestrial forest management plan for Palmyra Atoll

    Science.gov (United States)

    Hathaway, Stacie A.; McEachern, Kathryn; Fisher, Robert N.

    2011-01-01

    , and though rarely documented, beach nesting could be affected by terrestrial management actions. There are various nonnative or invasive species throughout the terrestrial ecosystem. The most notable examples of terrestrial invasive species include coconut palms (Cocos nucifera) and black rats (Rattus rattus). Although it is unclear whether they are nonnative, coconut palms are currently the most dominant plant across Palmyra Atoll. They compete with native plant species for space and resources and are potentially detrimental to sea birds dependent on native vegetation for roosting and nesting habitat. This competition in turn impacts nutrient resource availability, thereby reshaping energy flow in the ecosystem. Black rats are known to prey on ground-nesting sea birds and are likely responsible for the lack of burrowing sea bird reproduction at Palmyra Atoll. In addition, they may be facilitating the invasion of other nonnative species and negatively impacting other native fauna. Although the extent and impacts of these and other nonnative and (or) invasive species are not fully understood, the extent and impacts are clearly a threat to the native species and one of the most urgent threats to the overall ecosystem integrity of Palmyra Atoll. This 'Terrestrial Forest Management Plan for Palmyra Atoll' addresses issues related to invasive species and other problems. Priority goals are established as are associated objectives and strategies. The overarching goal is to perpetuate and where possible restore terrestrial ecosystem integrity through the following techniques: 1. Habitat management: Maintain and enhance habitat to the extent possible to sustain thriving Pisonia grandis forest, coastal strand forest, endemic grassland, self-sustaining populations of sea birds, shore birds, coconut crabs, native lizards, and native insects. 2. Monitoring and assessment: Acquire information on distribution and abundance as needed for conservation of each resour

  3. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    Directory of Open Access Journals (Sweden)

    Yong eZhu

    2015-11-01

    Full Text Available Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes-Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants’ memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed.

  4. Threats to Bitcoin Software

    OpenAIRE

    Kateraas, Christian H

    2014-01-01

    Collect and analyse threat models to the Bitcoin ecosystem and its software. The create misuse case, attack trees, and sequence diagrams of the threats. Create a malicious client from the gathered threat models. Once the development of the client is complete, test the client and evaluate its performance. From this, assess the security of the Bitcoin software.

  5. Threat, prejudice and stereotyping in the context of Japanese, North Korean, and South Korean intergroup relations.

    OpenAIRE

    Myers, Chris; Abrams, Dominic; Rosenthal, Harriet E.S.; Christian, Julie

    2013-01-01

    Integrated threat theory, realistic conflict theory, and group justification (based on social identity theory) were evaluated in the international context of Japanese prejudice toward North Korea and South Korea. Military threat emerged as an important addition to the four threats outlined by integrated threat theory. Three perceived North Korean threats (realistic [domestic] threat; intergroup anxiety; military threat) predicted prejudice toward North Korea. North Korean preju...

  6. The terrestrial silica pump.

    Directory of Open Access Journals (Sweden)

    Joanna C Carey

    Full Text Available Silicon (Si cycling controls atmospheric CO(2 concentrations and thus, the global climate, through three well-recognized means: chemical weathering of mineral silicates, occlusion of carbon (C to soil phytoliths, and the oceanic biological Si pump. In the latter, oceanic diatoms directly sequester 25.8 Gton C yr(-1, accounting for 43% of the total oceanic net primary production (NPP. However, another important link between C and Si cycling remains largely ignored, specifically the role of Si in terrestrial NPP. Here we show that 55% of terrestrial NPP (33 Gton C yr(-1 is due to active Si-accumulating vegetation, on par with the amount of C sequestered annually via marine diatoms. Our results suggest that similar to oceanic diatoms, the biological Si cycle of land plants also controls atmospheric CO(2 levels. In addition, we provide the first estimates of Si fixed in terrestrial vegetation by major global biome type, highlighting the ecosystems of most dynamic Si fixation. Projected global land use change will convert forests to agricultural lands, increasing the fixation of Si by land plants, and the magnitude of the terrestrial Si pump.

  7. Terrestrial planet formation.

    Science.gov (United States)

    Righter, K; O'Brien, D P

    2011-11-29

    Advances in our understanding of terrestrial planet formation have come from a multidisciplinary approach. Studies of the ages and compositions of primitive meteorites with compositions similar to the Sun have helped to constrain the nature of the building blocks of planets. This information helps to guide numerical models for the three stages of planet formation from dust to planetesimals (~10(6) y), followed by planetesimals to embryos (lunar to Mars-sized objects; few 10(6) y), and finally embryos to planets (10(7)-10(8) y). Defining the role of turbulence in the early nebula is a key to understanding the growth of solids larger than meter size. The initiation of runaway growth of embryos from planetesimals ultimately leads to the growth of large terrestrial planets via large impacts. Dynamical models can produce inner Solar System configurations that closely resemble our Solar System, especially when the orbital effects of large planets (Jupiter and Saturn) and damping mechanisms, such as gas drag, are included. Experimental studies of terrestrial planet interiors provide additional constraints on the conditions of differentiation and, therefore, origin. A more complete understanding of terrestrial planet formation might be possible via a combination of chemical and physical modeling, as well as obtaining samples and new geophysical data from other planets (Venus, Mars, or Mercury) and asteroids. PMID:21709256

  8. The terrestrial silica pump.

    Science.gov (United States)

    Carey, Joanna C; Fulweiler, Robinson W

    2012-01-01

    Silicon (Si) cycling controls atmospheric CO(2) concentrations and thus, the global climate, through three well-recognized means: chemical weathering of mineral silicates, occlusion of carbon (C) to soil phytoliths, and the oceanic biological Si pump. In the latter, oceanic diatoms directly sequester 25.8 Gton C yr(-1), accounting for 43% of the total oceanic net primary production (NPP). However, another important link between C and Si cycling remains largely ignored, specifically the role of Si in terrestrial NPP. Here we show that 55% of terrestrial NPP (33 Gton C yr(-1)) is due to active Si-accumulating vegetation, on par with the amount of C sequestered annually via marine diatoms. Our results suggest that similar to oceanic diatoms, the biological Si cycle of land plants also controls atmospheric CO(2) levels. In addition, we provide the first estimates of Si fixed in terrestrial vegetation by major global biome type, highlighting the ecosystems of most dynamic Si fixation. Projected global land use change will convert forests to agricultural lands, increasing the fixation of Si by land plants, and the magnitude of the terrestrial Si pump. PMID:23300825

  9. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  10. Alternative Threat Methodology

    Directory of Open Access Journals (Sweden)

    Charles B. King III

    2011-01-01

    Full Text Available Of the many challenges facing risk analysis practitioners, perhaps the most difficult to overcome is in the field of terrorist threat analysis. When estimating the threat associated with naturally occurring events, historical data provides a great deal of insight into the frequency of those events. Threat associated with accidents applies many operations research tools to gauge future failure-rates (Failure Mode and Effects Analysis being perhaps the most widely known. However, estimating the probability of an individual's or group's attacking a specific (or even a generic target is an element of risk analysis in which art and intuition are applied far more regularly than is science.

  11. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  12. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...... on to discuss a number of approaches from the technological, the sociological, and the socio-technical domain. We draw two main conclusions. Tackling insider threats requires a combination of techniques from the technical, the sociological, and the socio-technical domain, to enable qualified detection...... of threats, and their mitigation. Another important observation is that the distinction between insiders and outsiders seems to loose significance as IT infrastructure is used in performing insider attacks....

  13. Facing ambiguous threats.

    Science.gov (United States)

    Roberto, Michael A; Bohmer, Richard M J; Edmondson, Amy C

    2006-11-01

    On February 1, 2003, the world watched in horror as the Columbia space shuttle broke apart while reentering the earth's atmosphere, killing all seven astronauts. Some have argued that NASA's failure to respond with appropriate intensity to the so-called foam strike that led to the accident was evidence of irresponsible or incompetent management. The authors' research, however, suggests that NASA was exhibiting a natural, albeit unfortunate, pattern of behavior common in many organizations. The foam strike is a prime example of what the authors call an ambiguous threat-a signal that may or may not portend future harm. Ambiguous threats differ from threats with obvious causes-say, a fire in the building-for which the response is clear. They also differ from unmistakable threats that may lack straightforward response paths (such as the frightening oxygen-tank explosion aboard Apollo 13). However, when the warning sign is ambiguous and the threat's potential effect is unclear, managers may choose to ignore or discount the risk. Such an approach can be catastrophic. Firms that do a good job of dealing with ambiguous threats do not improvise during a crisis; rather, they apply a rigorous set of detection and response capabilities that they have developed and practiced beforehand. In this article, the authors outline how to put such capabilities in place long before a crisis strikes. First, companies need to hone their teamwork and rapid problem-solving skills through practice. Second, they must learn to recognize weak signals, amplify the threat, and encourage employees to ask disconcerting "what if" questions in a safe environment. Finally, they should explore possible responses to threats through quick, low-cost experimentation. PMID:17131567

  14. Ethical Proactive Threat Research

    Science.gov (United States)

    Aycock, John; Sullins, John

    Through a provocative examination of the positive effects of computer security research on regular users, we argue that traditional security research is insufficient. Instead, we turn to a largely untapped alternative, proactive threat research, a fruitful research area but an ethical minefield. We discuss practices for ethical research and dissemination of proactive research.

  15. Nuclear Threats and Security

    OpenAIRE

    Garry Jacobs; Winston P. Nagan

    2012-01-01

    This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legalit...

  16. Patient Safety Threat - Syringe Reuse

    Science.gov (United States)

    ... HAIs HICPAC One & Only Campaign A Patient Safety Threat – Syringe Reuse Recommend on Facebook Tweet Share Compartir ... need to be aware of a very serious threat to their health - the reuse of needles or ...

  17. Low costs of terrestrial locomotion in waders

    NARCIS (Netherlands)

    Bruinzeel, L.W.; Piersma, T; Kersten, M.; Leopold, Mardik F.

    1999-01-01

    Energy expenditure of terrestrial locomotion on a linear treadmill was measured in five wader species: Turnstone Arenaria interpres, Knot Calidris canutus, Grey Plover Pluvialis squatarola, Oystercatcher Haematopus ostralegus and Bar-tailed Godwit Limosa lapponica. Additional data on Redshank Tringa

  18. Threats to international science

    Science.gov (United States)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  19. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  20. Threat detection, precautionary responses, and anxiety disorders.

    Science.gov (United States)

    Stein, Dan J; Nesse, Randolph M

    2011-03-01

    Study of the anxiety disorders may be a particularly useful vehicle for demonstrating how foundational sciences (e.g. cognitive-affective neuroscience, evolutionary psychology) can advance psychiatric theory and research. Here we consider important potential advances and remaining future challenges when basic research on threat detection and precautionary responses is used to address the anxiety disorders. We emphasize the potential value of a model of threat detection and precautionary responses that integrates cognitive-affective neuroscience and evolutionary approaches for understanding the anxiety disorders. However, we also suggest that substantial additional work is needed in order to link systematically the psychobiological mechanisms posited by basic work on threat detection and precautionary responses to the complex phenomena seen in the clinic. PMID:21147162

  1. Prejudice towards Muslims in The Netherlands: testing integrated threat theory.

    Science.gov (United States)

    Velasco González, Karina; Verkuyten, Maykel; Weesie, Jeroen; Poppe, Edwin

    2008-12-01

    This study uses integrated threat theory to examine Dutch adolescents' (N=1,187) prejudice towards Muslim minorities. One out of two participants was found to have negative feelings towards Muslims. Perceived symbolic and realistic threat and negative stereotypes were examined as mediators between antecedent factors (in-group identification, intergroup contact, and the endorsement of multiculturalism) and prejudice. Based on structural equation modelling, it was found that stereotypes and symbolic threats, but not realistic threats, predicted prejudice towards Muslims. Further, it was found that the effect of in-group identification on prejudice was fully mediated by symbolic threat, the effect of contact was partially mediated by stereotypes, and the effect of the endorsement of multiculturalism was mediated by both symbolic threat and stereotypes. In addition, contact and multiculturalism were directly associated with prejudice towards Muslims. The theoretical and practical implications of these findings are discussed.

  2. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  3. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  4. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  5. 'NRBC' threat: is this concept still valid?

    International Nuclear Information System (INIS)

    About 10 years ago, after the Sarin attack in Tokyo, the world discover that terrorists could use again radio-nuclear, chemical or biological agents to launch attacks, just to cause terror and disruption of western economies. This has forged the acronym 'NRBC'. In terms of likelihood, nuclear and radiological attacks could be considered among the most easy to prepare, and some possible acts are listed in this paper. A considerable amount of work has been prepared for the preparedness against radio-nuclear attacks, during the last 3 years, by World Health Organization (WHO), International Atomic Energy Agency (IAEA), the Atomic Energy Agency (AEN) as well as by the International Commission of Radio Protection (ICRP). A series of documents have been issued from international cooperation. These documents shows specificities to the R/N threat in terms of health consequences, that make this threat less prone to international cooperative efforts than biological threats. In addition, the Ministers of Health of the G7 countries have created an 'Global Health Security Initiative' (GHSI) in 2002 to anticipate crisis such as the anthrax problem, or other possible NRBC threats

  6. Mobbing, threats to employees

    Directory of Open Access Journals (Sweden)

    Tatjana Vene

    2012-02-01

    Full Text Available RQ: Is there a connection among perception of hostile and unethical communication, timely removal of causes and employee satisfaction?Purpose: Perceived mobbing in the organization, analysing causes and timely removal of them without any effect; achieve an environment of satisfied employees. The purpose is to study the relationship amongthe categories: perceiving mobbing, removing the effects, employee satisfaction.Methods: Qualitative research approach, method of interview by using the seven steps principles.Results: The findings clearly state that being aware of the negative factors and psychological abuse in organizations was present. The interview participants perceived different negative behaviours especially by the female population and from the side of superiors. In some organizations perceived negative factors are insults,insinuations, low wages, inadequate working day, competition, lobbying, and verbal threats. All negative factors lead to serious implications for employees, in which the organization can lose its reputation, productivity is reduced, costs of employment can increase with more sick leaves and in extreme cases, the results can be soserious that the organization can end in bankruptcy or liquidation.Organization: The result of the study warns management to acceptcertain actions and remediate the situation in organizations. The employer and managers must do everything to protect their subordinates from violence and potential offenders.Society: The research study warns on the seriousness of mobbing among employees, the aim is to bring the issue to individuals and society. The victim usually needs help (health costs, losses in the pension system, increased unemployment, and lower productivity of the whole society.Originality: In view of the sensitivity of the issues, the author concludes that the existing research studies are based especially on closed questions (questionnaires; however, interviews create mutual trust between

  7. Introduced Terrestrial Species (Future)

    Data.gov (United States)

    U.S. Environmental Protection Agency — These data represent predicted future potential distributions of terrestrial plants, animals, and pathogens non-native to the Middle-Atlantic region. These data are...

  8. Heat Waves Are Health Threats

    Science.gov (United States)

    ... https://medlineplus.gov/news/fullstory_159694.html Heat Waves Are Health Threats Drink plenty of water and ... 2016 SATURDAY, July 2, 2016 (HealthDay News) -- Heat waves are more than uncomfortable, they can be deadly. ...

  9. End the nuclear threat

    International Nuclear Information System (INIS)

    's promises and commitments. Fulfilling our promises in the Nuclear Non-Proliferation Treaty, now with 189 member States, must be a primary aim. This Treaty, essential to our security, will be reviewed formally in 2005 at the UN. The International Atomic Energy Agency (IAEA) performs a vital role under the Treaty - it's the world's nuclear inspectorate to check that countries are not pursuing nuclear weapons. I've had the chance to visit the UN and IAEA at their headquarters in Vienna, Austria, and know how tough the job can be. We need to back the IAEA and make sure it stays strong in our fight against nuclear weapons. At the 2000 Review of the Treaty, the US along with all other parties to the Treaty made a pledge. Let me remind you of what was promised, and I quote: 'an unequivocal undertaking by the nuclear weapons States to accomplish the total elimination of their nuclear arsenals. leading to nuclear disarmament.' There are tens of thousands of nuclear weapons in the world, over 90% are possessed by Russia and the US. Most are many times more devastating than those used on Hiroshima. The arsenals of Russia and the US are armed, targeted and poised, waiting for three short computer signals to fire. These hair trigger devices represent the devastation of approximately 100,000 Hiroshimas and pose a horrific threat to life. The use of a nuclear weapon could take place by accident or design by States, or even terrorists. These weapons pose an unacceptable risk to the planet. We must demonstrate our unambiguous commitment to fulfill our promises. Other-wise, the prospect of more nuclear weapons States, and the construction of new nuclear weapons, will only increase human peril. The world needs a more effective non-proliferation and disarmament regime and is looking to us for leadership

  10. Parallel Computing for Terrestrial Ecosystem Carbon Modeling

    International Nuclear Information System (INIS)

    Terrestrial ecosystems are a primary component of research on global environmental change. Observational and modeling research on terrestrial ecosystems at the global scale, however, has lagged behind their counterparts for oceanic and atmospheric systems, largely because the unique challenges associated with the tremendous diversity and complexity of terrestrial ecosystems. There are 8 major types of terrestrial ecosystem: tropical rain forest, savannas, deserts, temperate grassland, deciduous forest, coniferous forest, tundra, and chaparral. The carbon cycle is an important mechanism in the coupling of terrestrial ecosystems with climate through biological fluxes of CO2. The influence of terrestrial ecosystems on atmospheric CO2 can be modeled via several means at different timescales. Important processes include plant dynamics, change in land use, as well as ecosystem biogeography. Over the past several decades, many terrestrial ecosystem models (see the 'Model developments' section) have been developed to understand the interactions between terrestrial carbon storage and CO2 concentration in the atmosphere, as well as the consequences of these interactions. Early TECMs generally adapted simple box-flow exchange models, in which photosynthetic CO2 uptake and respiratory CO2 release are simulated in an empirical manner with a small number of vegetation and soil carbon pools. Demands on kinds and amount of information required from global TECMs have grown. Recently, along with the rapid development of parallel computing, spatially explicit TECMs with detailed process based representations of carbon dynamics become attractive, because those models can readily incorporate a variety of additional ecosystem processes (such as dispersal, establishment, growth, mortality etc.) and environmental factors (such as landscape position, pest populations, disturbances, resource manipulations, etc.), and provide information to frame policy options for climate change impact

  11. Entry Threat and Entry Deterrence: The Timing of Broadband Rollout

    OpenAIRE

    Mo Xiao; Orazem, Peter F.

    2007-01-01

    Past empirical literature provides strong evidence that competition increases when new firms enter a market. However, rarely have economists been able to examine how competition changes with the threat of entry. This paper uses the evolution of the zip code level market structure of facilities-based broadband providers from 1999 to 2004 to investigate how a firm adjusts its entry strategy when facing the threat of additional entrants. We identify the potential entrant into a local market as t...

  12. Terrestrial and extraterrestrial fullerenes

    Energy Technology Data Exchange (ETDEWEB)

    Heymann, D.; Jenneskens, L.W.; Jehlicka, J; Koper, C.; Vlietstra, E. [Rice Univ, Houston, TX (United States). Dept. of Earth Science

    2003-07-01

    This paper reviews reports of occurrences of fullerenes in circumstellar media, interstellar media, meteorites, interplanetary dust particles (IDPs), lunar rocks, hard terrestrial rocks from Shunga (Russia), Sudbury (Canada) and Mitov (Czech Republic), coal, terrestrial sediments from the Cretaceous-Tertiary-Boundary and Pennian-Triassic-Boundary, fulgurite, ink sticks, dinosaur eggs, and a tree char. The occurrences are discussed in the context of known and postulated processes of fullerene formation, including the suggestion that some natural fullerenes might have formed from biological (algal) remains.

  13. Cyber threat model for tactical radio networks

    Science.gov (United States)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  14. 28 CFR 36.208 - Direct threat.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) Direct threat means a...

  15. Comparative Environmental Threat Analysis: Three Case Studies.

    Science.gov (United States)

    Latour, J. B.; Reiling, R.

    1994-01-01

    Reviews how carrying capacity for different environmental problems is operationalized. Discusses whether it is possible to compare threats, using the exceeding of carrying capacity as a yardstick. Points out problems in comparative threat analysis using three case studies: threats to European groundwater resources, threats to ecosystems in Europe,…

  16. Histories of terrestrial planets

    International Nuclear Information System (INIS)

    The uneven historical development of terrestrial planets - Mercury, Venus, Earth, Moon and Mars - is probably due to the differences in their size, weight and rotational dynamics in association with the internal planet structure, their distance from the Sun, etc. A systematic study of extraterrestrial planets showed that the time span of internal activity was not the same for all bodies. It is assumed that the initial history of all terrestrial planets was marked with catastrophic events connected with the overall dynamic development of the solar system. In view of the fact that the cores of small terrestrial bodies cooled quicker, their geological development almost stagnated after two or three thousand million years. This is what probably happened to the Mercury and the Moon as well as the Mars. Therefore, traces of previous catastrophic events were preserved on the surface of the planets. On the other hand, the Earth is the most metamorphosed terrestrial planet and compared to the other planets appears to be atypical. Its biosphere is significantly developed as well as the other shell components, its hydrosphere and atmosphere, and its crust is considerably differentiated. (J.P.)

  17. Prefrontal inhibition of threat processing protects working memory from interference.

    Directory of Open Access Journals (Sweden)

    Robert James Clarke

    2013-05-01

    Full Text Available Bottom-up processes can interrupt ongoing cognitive processing in order to adaptively respond to emotional stimuli of high potential significance, such as those that threaten wellbeing. However it is vital that this interference can be modulated in certain contexts to focus on current tasks. Deficits in the ability to maintain the appropriate balance between cognitive and emotional demands can severely impact on day-to-day activities. This fMRI study examined this interaction between threat processing and cognition; 18 adult participants performed a visuospatial working memory (WM task with two load conditions, in the presence and absence of anxiety induction by threat of electric shock. Threat of shock interfered with performance in the low cognitive load condition; however interference was eradicated under high load, consistent with engagement of emotion regulation mechanisms. Under low load the amygdala showed significant activation to threat of shock that was modulated by high cognitive load. A directed top-down control contrast identified two regions associated with top-down control; ventrolateral PFC and dorsal ACC. Dynamic causal modelling provided further evidence that under high cognitive load, top-down inhibition is exerted on the amygdala and its outputs to prefrontal regions. Additionally, we hypothesised that individual differences in a separate, non-emotional top-down control task would predict the recruitment of dorsal ACC and ventrolateral PFC during top-down control of threat. Consistent with this, performance on a separate dichotic listening task predicted dorsal ACC and ventrolateral PFC activation during high WM load under threat of shock, though activation in these regions did not directly correlate with WM performance. Together, the findings suggest that under high cognitive load and threat, top-down control is exerted by dACC and vlPFC to inhibit threat processing, thus enabling WM performance without threat

  18. Threats in Optical Burst Switched Network

    Directory of Open Access Journals (Sweden)

    P. Siva Subramanian

    2011-05-01

    Full Text Available Optical network is a viable network for future communication, which transmits data at an average rate of 50Tb/s. Optical Burst Switching is a trusted mechanism used for Optical network. There is a good amount of research done in the area of security in Optical networks. In addition, the issues related to physical network security has been dealt with respect to Optical networks. Our proposed work is intend to find the possible security threats that may happen in Optical Burst Switched Networks and the counter measures are examined separately. The NS-2 simulator with modified OBS patch is used to verify and validate the proposed mechanism

  19. TERRORISM AS THE MAIN THREAT TO THE STATE DEFENCE

    Directory of Open Access Journals (Sweden)

    T. V. VERBITSKAYA

    2015-01-01

    Full Text Available The article focuses on the analysis of terrorism as the main threat to the state defense. One of the main problems in combating this threat is lack of the uniformity in understanding and definition of terrorism on national and international level, what complicates the search of the means reducing this threat. In addition, because of possible use of armed forces against this threat, the absence of understanding of this term as the basis for introducing relevant legal regimes may lead to violation of human rights. The article presents definitions of terrorism from normative acts of foreign countries and sources of international law. It traces the historical development of the understanding of terrorism in different countries in terms of the evolution of the content of this term.

  20. Terrestrial mammals in an Atlantic Forest remnant, Paraná, Brazil

    OpenAIRE

    Gustavo Borba de Miranda; Mateus Da Fré; Márcia Regina Wolfart; Elaine Maria Lucas

    2013-01-01

    The threat degree and the ecological importance of terrestrial mammals make clear the need for constantly conducting researches in order to add information to the current knowledge on this theme. This study aimed to provide a list of terrestrial mammal species in an Atlantic Forest remnant located in the Southwestern Paraná state, Brazil. Species richness and occurrence frequency were studied from April to October 2009 using two methods: direct observation and recording of traces. We register...

  1. Threat from Emerging Vectorborne Viruses

    Centers for Disease Control (CDC) Podcasts

    2016-06-09

    Reginald Tucker reads an abridged version of the commentary by CDC author Ronald Rosenberg, Threat from Emerging Vectorborne Viruses.  Created: 6/9/2016 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 6/9/2016.

  2. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  3. Volcanic ash - Terrestrial versus extraterrestrial

    Science.gov (United States)

    Okeefe, J. A.

    1976-01-01

    A principal difference between terrestrial and extraterrestrial lavas may consist in the greater ability of terrestrial lavas to form thin films (like those of soap bubbles) and hence foams. It would follow that, in place of the pumice and spiny shards found in terrestrial volcanic ash, an extraterrestrial ash should contain minute spherules. This hypothesis may help to explain lunar microspherules.

  4. Working group 4: Terrestrial

    International Nuclear Information System (INIS)

    A working group at a Canada/USA symposium on climate change and the Arctic identified major concerns and issues related to terrestrial resources. The group examined the need for, and the means of, involving resource managers and users at local and territorial levels in the process of identifying and examining the impacts and consequences of climatic change. Climatic change will be important to the Arctic because of the magnitude of the change projected for northern latitudes; the apparent sensitivity of its terrestrial ecosystems, natural resources, and human support systems; and the dependence of the social, cultural, and economic welfare of Arctic communities, businesses, and industries on the health and quality of their environment. Impacts of climatic change on the physical, biological, and associated socio-economic environment are outlined. Gaps in knowledge needed to quantify these impacts are listed along with their relationships with resource management. Finally, potential actions for response and adaptation are presented

  5. The early evolution of the atmospheres of terrestrial planets

    CERN Document Server

    Raulin, François; Muller, Christian; Nixon, Conor; Astrophysics and Space Science Proceedings : Volume 35

    2013-01-01

    “The Early Evolution of the Atmospheres of Terrestrial Planets” presents the main processes participating in the atmospheric evolution of terrestrial planets. A group of experts in the different fields provide an update of our current knowledge on this topic. Several papers in this book discuss the key role of nitrogen in the atmospheric evolution of terrestrial planets. The earliest setting and evolution of planetary atmospheres of terrestrial planets is directly associated with accretion, chemical differentiation, outgassing, stochastic impacts, and extremely high energy fluxes from their host stars. This book provides an overview of the present knowledge of the initial atmospheric composition of the terrestrial planets. Additionally it includes some papers about the current exoplanet discoveries and provides additional clues to our understanding of Earth’s transition from a hot accretionary phase into a habitable world. All papers included were reviewed by experts in their respective fields. We are ...

  6. Is China Threat a Hoax?

    Institute of Scientific and Technical Information of China (English)

    Niu Weigan; Ma Zongshi

    2008-01-01

    The Beijing Olympics has focused unprecedented world attention on China this year. Many people hail the Games as an occasion that showcases China's growing contribution to world development and harmony. But intent on politicizing this global event, a few modern Cassandras still cling to the flawed China Threat theory. In this paper, the author traces the origins of this fallacious theory. He sees it as a product of Western empiricism viewed through an historical and philosophical prism. He argues that the assertion of threat arises from a generalization of historical facts. The assertion links China's growing clout with declining Western dominance in international affairs. Starting with the myth that peace is possible only among democracies, the theory predicts the inevitability of conflict between the West and China, a country with an alleged expansionist tradition and under an authoritarian system.

  7. Symbian `vulnerability' and Mobile Threats

    OpenAIRE

    Gharibi, Wajeb

    2012-01-01

    Modern technologies are becoming ever more integrated with each other. Mobile phones are becoming increasing intelligent, and handsets are growing ever more like computers in functionality. We are entering a new era - the age of smart houses, global advanced networks which encompass a wide range of devices, all of them exchanging data with each other. Such trends clearly open new horizons to malicious users, and the potential threats are self evident. In this paper, we study and discuss one o...

  8. Subordinates as Threats to Leaders

    OpenAIRE

    Glazer, Amihai; Segendorff, Björn

    2001-01-01

    A leader of an organization may view a subordinate as threatening or weakening the leader's position. The threat may increase with the subordinate's ability and reduce the rents the leader wins. In particular, a leader who trains his subordinate reduces the cost to the owner of a firm in replacing the leader, and so reduces the leader's bargaining power. The leader therefore provides inefficiently low training for the subordinate.

  9. Filling in biodiversity threat gaps

    DEFF Research Database (Denmark)

    Joppa, Lucas; O'Connor, Brian; Visconti, Piero;

    2016-01-01

    increase to 10,000 times the background rate should species threatened with extinction succumb to pressures they face (4). Reversing these trends is a focus of the Convention on Biological Diversity's 2020 Strategic Plan for Biodiversity and its 20 Aichi Targets and is explicitly incorporated...... into the United Nations' 2030 Agenda for Sustainable Development and its 17 Sustainable Development Goals (SDGs). We identify major gaps in data available for assessing global biodiversity threats and suggest mechanisms for closing them....

  10. Ruthenium Isotopic Composition of Terrestrial Materials, Iron Meteorites and Chondrites

    Science.gov (United States)

    Becker, H.; Walker, R. J.

    2002-01-01

    Ru isotopic compositions of magmatic iron meteorites and chondrites overlap with terrestrial Ru at the 0.3 to 0.9 (epsilon) level. Additional information is contained in the original extended abstract.

  11. Antibiotic and Antimicrobial Resistance: Threat Report 2013

    Science.gov (United States)

    ... this? Submit What's this? Submit Button Antibiotic Resistance Threats in the United States, 2013 Recommend on Facebook Tweet Share Compartir This report, Antibiotic resistance threats in the United States, 2013 gives a first- ...

  12. Terrestrial Steering Group. 2014. Arctic Terrestrial Biodiversity Monitoring Plan

    DEFF Research Database (Denmark)

    Aastrup, Peter; Aronsson, Mora; Barry, Tom;

    The Terrestrial Steering Group (TSG), has initiated the implementation phase of the CBMP Terrestrial Plan. The CBMP Terrestrial Steering Group, along with a set of invited experts (see Appendix A for a participants list), met in Iceland from February 25-27th to develop a three year work plan...... to guide implementation of the CBMP-Terrestrial Plan. This report describes the outcome of that workshop. The aim of the workshop was to develop a three year work plan to guide implementation of the CBMP-Terrestrial Plan. The participants were tasked with devising an approach to both (a) determine what...... capacity and information may be currently available and (b) to outline near-term required steps to begin implementing the plan and reporting on an initial set of Arctic terrestrial biodiversity focal ecosystem component attributes. The specific objectives of the workshop were to: Identify key products...

  13. Raising New Zealand’s Terrorism Threat Level: Is Transparency Important in National Security?

    Directory of Open Access Journals (Sweden)

    Richard Shortt

    2015-03-01

    Full Text Available In mid-October 2014, ten years after the New Zealand Government confirmed the establishment of a Combined Threat Assessment Group (CTAG to advise it on a range of potential threats, the prime minister announced, for the first time, the raising of New Zealand’s domestic terrorism threat level. Unfortunately, the assessment that gave rise to the threat level’s change (or a version of it was not made public. Therefore, how were New Zealanders or others expected to properly understand the environment giving rise to the threat changes, and to judge whether the assessors got the setting right. This paper argues increased public transparency is appropriate when additional security measures resulting from a change in threat perception impact citizens’ lives and cost tax-payers more money. In presenting this argument, the paper briefly describes the role of threat assessments and how threat levels are set. In the absence of a public version of New Zealand’s threat assessment giving a cohesive, concise and transparent outline of the threat environment, the paper presents publicly available information from well-informed high office holders to see if that provides alternative and suitable transparency. Finally, the paper compares New Zealand’s terrorism threat assessment transparency processes with those of four countries with similar characteristics to New Zealand to see if alternative models of public transparency are available for consideration.

  14. The role of threats in animal cooperation

    OpenAIRE

    Cant, Michael A.

    2010-01-01

    In human societies, social behaviour is strongly influenced by threats of punishment, even though the threats themselves rarely need to be exercised. Recent experimental evidence suggests that similar hidden threats can promote cooperation and limit within-group selfishness in some animal systems. In other animals, however, threats appear to be ineffective. Here I review theoretical and empirical studies that help to understand the evolutionary causes of these contrasting patterns, and identi...

  15. Terrestrial plant methane production

    DEFF Research Database (Denmark)

    Mikkelsen, Teis Nørgaard; Bruhn, Dan; Møller, Ian M.;

    We evaluate all experimental work published on the phenomenon of aerobic methane (CH4) generation in terrestrial plants. We conclude that the phenomenon is true. Four stimulating factors have been observed to induce aerobic plant CH4 production, i.e. cutting injuries, increasing temperature...... into consideration other potential sources than pectin. Due to the large uncertainties related to effects of stimulating factors, genotypic responses and type of precursors, we conclude that current attempts for upscaling aerobic CH4 into a global budget is insufficient. Thus it is too early to draw the line under...

  16. Terrestrial planet formation

    OpenAIRE

    Righter, K.; D. P. O’Brien

    2011-01-01

    Advances in our understanding of terrestrial planet formation have come from a multidisciplinary approach. Studies of the ages and compositions of primitive meteorites with compositions similar to the Sun have helped to constrain the nature of the building blocks of planets. This information helps to guide numerical models for the three stages of planet formation from dust to planetesimals (∼106 y), followed by planetesimals to embryos (lunar to Mars-sized objects; few × 106 y), and finally e...

  17. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  18. 24 CFR 9.131 - Direct threat.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Direct threat. 9.131 Section 9.131... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT § 9.131 Direct threat. (a) This part does not require the agency..., privileges, advantages and accommodations of that agency when that individual poses a direct threat to...

  19. Security of radioactive sources: Threats and answers

    International Nuclear Information System (INIS)

    The general issue of the security of radioactive sources is presented as a prime but constitutive element of radiation safety, focusing particularly on the perceived threats for the malevolent use of radioactive sources and on the possible answers to these threats. The paper discusses the source security threat and the possible international response, and presents an overall outlook for the future. (author)

  20. Arctic Terrestrial Biodiversity Monitoring Plan

    DEFF Research Database (Denmark)

    Christensen, Tom; Payne, J.; Doyle, M.;

    The Conservation of Arctic Flora and Fauna (CAFF), the biodiversity working group of the Arctic Council, established the Circumpolar Biodiversity Monitoring Program (CBMP) to address the need for coordinated and standardized monitoring of Arctic environments. The CBMP includes an international...... on developing and implementing long-term plans for monitoring the integrity of Arctic biomes: terrestrial, marine, freshwater, and coastal (under development) environments. The CBMP Terrestrial Expert Monitoring Group (CBMP-TEMG) has developed the Arctic Terrestrial Biodiversity Monitoring Plan (CBMP......-Terrestrial Plan/the Plan) as the framework for coordinated, long-term Arctic terrestrial biodiversity monitoring. The goal of the CBMP-Terrestrial Plan is to improve the collective ability of Arctic traditional knowledge (TK) holders, northern communities, and scientists to detect, understand and report on long...

  1. Atmospheric Circulation of Terrestrial Exoplanets

    OpenAIRE

    Showman, Adam P.; Wordsworth, Robin D.; Merlis, Timothy M.; Kaspi, Yohai

    2013-01-01

    The investigation of planets around other stars began with the study of gas giants, but is now extending to the discovery and characterization of super-Earths and terrestrial planets. Motivated by this observational tide, we survey the basic dynamical principles governing the atmospheric circulation of terrestrial exoplanets, and discuss the interaction of their circulation with the hydrological cycle and global-scale climate feedbacks. Terrestrial exoplanets occupy a wide range of physical a...

  2. New Threat to World Economy

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    The aggregate amount of money and credit in the global economy has risen sharply over the past 30 years,with its growth rate and stock far exceeding that of the real economy or real assets of the world.This is the view of Xiang Songzuo,professor at the Huazhong University of Science and Technology,whose opinion was first published in a recent article in China Business News.Xiang said this situation is a real threat to the world economy.Excerpts of his article are reprinted below:

  3. Symbian `vulnerability' and Mobile Threats

    CERN Document Server

    Gharibi, Wajeb

    2012-01-01

    Modern technologies are becoming ever more integrated with each other. Mobile phones are becoming increasing intelligent, and handsets are growing ever more like computers in functionality. We are entering a new era - the age of smart houses, global advanced networks which encompass a wide range of devices, all of them exchanging data with each other. Such trends clearly open new horizons to malicious users, and the potential threats are self evident. In this paper, we study and discuss one of the most famous mobile operating systems 'Symbian'; its vulnerabilities and recommended protection technologies.

  4. Terrestrial Plume Impingement Testbed Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Masten Space Systems proposes to create a terrestrial plume impingement testbed for generating novel datasets for extraterrestrial robotic missions. This testbed...

  5. Freshwater biodiversity: importance, threats, status and conservation challenges.

    Science.gov (United States)

    Dudgeon, David; Arthington, Angela H; Gessner, Mark O; Kawabata, Zen-Ichiro; Knowler, Duncan J; Lévêque, Christian; Naiman, Robert J; Prieur-Richard, Anne-Hélène; Soto, Doris; Stiassny, Melanie L J; Sullivan, Caroline A

    2006-05-01

    Freshwater biodiversity is the over-riding conservation priority during the International Decade for Action - 'Water for Life' - 2005 to 2015. Fresh water makes up only 0.01% of the World's water and approximately 0.8% of the Earth's surface, yet this tiny fraction of global water supports at least 100000 species out of approximately 1.8 million - almost 6% of all described species. Inland waters and freshwater biodiversity constitute a valuable natural resource, in economic, cultural, aesthetic, scientific and educational terms. Their conservation and management are critical to the interests of all humans, nations and governments. Yet this precious heritage is in crisis. Fresh waters are experiencing declines in biodiversity far greater than those in the most affected terrestrial ecosystems, and if trends in human demands for water remain unaltered and species losses continue at current rates, the opportunity to conserve much of the remaining biodiversity in fresh water will vanish before the 'Water for Life' decade ends in 2015. Why is this so, and what is being done about it? This article explores the special features of freshwater habitats and the biodiversity they support that makes them especially vulnerable to human activities. We document threats to global freshwater biodiversity under five headings: overexploitation; water pollution; flow modification; destruction or degradation of habitat; and invasion by exotic species. Their combined and interacting influences have resulted in population declines and range reduction of freshwater biodiversity worldwide. Conservation of biodiversity is complicated by the landscape position of rivers and wetlands as 'receivers' of land-use effluents, and the problems posed by endemism and thus non-substitutability. In addition, in many parts of the world, fresh water is subject to severe competition among multiple human stakeholders. Protection of freshwater biodiversity is perhaps the ultimate conservation challenge

  6. Freshwater biodiversity: importance, threats, status and conservation challenges.

    Science.gov (United States)

    Dudgeon, David; Arthington, Angela H; Gessner, Mark O; Kawabata, Zen-Ichiro; Knowler, Duncan J; Lévêque, Christian; Naiman, Robert J; Prieur-Richard, Anne-Hélène; Soto, Doris; Stiassny, Melanie L J; Sullivan, Caroline A

    2006-05-01

    Freshwater biodiversity is the over-riding conservation priority during the International Decade for Action - 'Water for Life' - 2005 to 2015. Fresh water makes up only 0.01% of the World's water and approximately 0.8% of the Earth's surface, yet this tiny fraction of global water supports at least 100000 species out of approximately 1.8 million - almost 6% of all described species. Inland waters and freshwater biodiversity constitute a valuable natural resource, in economic, cultural, aesthetic, scientific and educational terms. Their conservation and management are critical to the interests of all humans, nations and governments. Yet this precious heritage is in crisis. Fresh waters are experiencing declines in biodiversity far greater than those in the most affected terrestrial ecosystems, and if trends in human demands for water remain unaltered and species losses continue at current rates, the opportunity to conserve much of the remaining biodiversity in fresh water will vanish before the 'Water for Life' decade ends in 2015. Why is this so, and what is being done about it? This article explores the special features of freshwater habitats and the biodiversity they support that makes them especially vulnerable to human activities. We document threats to global freshwater biodiversity under five headings: overexploitation; water pollution; flow modification; destruction or degradation of habitat; and invasion by exotic species. Their combined and interacting influences have resulted in population declines and range reduction of freshwater biodiversity worldwide. Conservation of biodiversity is complicated by the landscape position of rivers and wetlands as 'receivers' of land-use effluents, and the problems posed by endemism and thus non-substitutability. In addition, in many parts of the world, fresh water is subject to severe competition among multiple human stakeholders. Protection of freshwater biodiversity is perhaps the ultimate conservation challenge

  7. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  8. Terrestrial Carbon Cycle Variability

    Science.gov (United States)

    Baldocchi, Dennis; Ryu, Youngryel; Keenan, Trevor

    2016-01-01

    A growing literature is reporting on how the terrestrial carbon cycle is experiencing year-to-year variability because of climate anomalies and trends caused by global change. As CO 2 concentration records in the atmosphere exceed 50 years and as satellite records reach over 30 years in length, we are becoming better able to address carbon cycle variability and trends. Here we review how variable the carbon cycle is, how large the trends in its gross and net fluxes are, and how well the signal can be separated from noise. We explore mechanisms that explain year-to-year variability and trends by deconstructing the global carbon budget. The CO 2 concentration record is detecting a significant increase in the seasonal amplitude between 1958 and now. Inferential methods provide a variety of explanations for this result, but a conclusive attribution remains elusive. Scientists have reported that this trend is a consequence of the greening of the biosphere, stronger northern latitude photosynthesis, more photosynthesis by semi-arid ecosystems, agriculture and the green revolution, tropical temperature anomalies, or increased winter respiration. At the global scale, variability in the terrestrial carbon cycle can be due to changes in constituent fluxes, gross primary productivity, plant respiration and heterotrophic (microbial) respiration, and losses due to fire, land use change, soil erosion, or harvesting. It remains controversial whether or not there is a significant trend in global primary productivity (due to rising CO 2, temperature, nitrogen deposition, changing land use, and preponderance of wet and dry regions). The degree to which year-to-year variability in temperature and precipitation anomalies affect global primary productivity also remains uncertain. For perspective, interannual variability in global gross primary productivity is relatively small (on the order of 2 Pg-C y -1) with respect to a large and uncertain background (123 +/- 4 Pg-C y -1), and

  9. Threat sensitivity in bipolar disorder.

    Science.gov (United States)

    Muhtadie, Luma; Johnson, Sheri L

    2015-02-01

    Life stress is a major predictor of the course of bipolar disorder. Few studies have used laboratory paradigms to examine stress reactivity in bipolar disorder, and none have assessed autonomic reactivity to laboratory stressors. In the present investigation we sought to address this gap in the literature. Participants, 27 diagnosed with bipolar I disorder and 24 controls with no history of mood disorder, were asked to complete a complex working memory task presented as "a test of general intelligence." Self-reported emotions were assessed at baseline and after participants were given task instructions; autonomic physiology was assessed at baseline and continuously during the stressor task. Compared to controls, individuals with bipolar disorder reported greater increases in pretask anxiety from baseline and showed greater cardiovascular threat reactivity during the task. Group differences in cardiovascular threat reactivity were significantly correlated with comorbid anxiety in the bipolar group. Our results suggest that a multimethod approach to assessing stress reactivity-including the use of physiological parameters that differentiate between maladaptive and adaptive profiles of stress responding-can yield valuable information regarding stress sensitivity and its associations with negative affectivity in bipolar disorder. (PsycINFO Database Record (c) 2015 APA, all rights reserved). PMID:25688436

  10. The threat of illicit trafficking

    International Nuclear Information System (INIS)

    Intelligence services, the army, the navy, the air force and the police together work to avoid illicit trafficking around the world by taking actions as follows: examining the risks and threats of illicit trafficking of radioactive material by terrorists or criminals; gaining a better understanding of current and future patterns and trends in the illicit trafficking of radioactive material; determining progress on efforts to establish detection capabilities at borders and to exchange information on developments in detection technology and response methodologies through installation of radiation detection equipment; strengthening existing networks and cooperation for sharing information on illicit trafficking reports on incidents involving smuggling, theft, loss and illegal disposal, illegal possession and transfer, and attempted illegal sales of the material; examining how an enhanced export/import regime can assist in combating illicit trafficking control through unauthorized movement of radioactive material; sharing information on activities intended to implement international obligations, recommendations and guidance relevant to nuclear security; suggest actions by which the international effort, through the IAEA, would be strengthened. This paper examines the threat and context of illicit nuclear trafficking of radioactive material, what is being done to combat such trafficking and highlights where more needs to be done

  11. Low costs of terrestrial locomotion in waders

    OpenAIRE

    Bruinzeel, L.W.; Piersma, T; M. Kersten; Leopold, Mardik F

    1999-01-01

    Energy expenditure of terrestrial locomotion on a linear treadmill was measured in five wader species: Turnstone Arenaria interpres, Knot Calidris canutus, Grey Plover Pluvialis squatarola, Oystercatcher Haematopus ostralegus and Bar-tailed Godwit Limosa lapponica. Additional data on Redshank Tringa totanus were taken from the literature. The cost of running in these waders, measured as the slope of the regression line of energy expenditure against speed of locomotion, is significantly less t...

  12. Looming vulnerability to threat: a cognitive paradigm for anxiety.

    Science.gov (United States)

    Riskind, J H

    1997-08-01

    The concept that perceived threat or danger is a cognitive antecedent of anxiety is central in clinical psychology, personality psychology, and social psychology. The aim in the current article is to review this concept and present a new conception called the looming vulnerability model. Looming vulnerability is conceptualized as an important cognitive component of threat or danger that elicits anxiety, sensitizes the individual to signs of movement and threat, biases cognitive processing, and makes the anxiety more persistent and less likely to habituate. In addition, it is postulated as a principal theme that discriminates anxiety and focal fears from depression. The looming vulnerability model integrates a disparate collection of findings and integrates the conceptualization of anxiety and fear with ethological and developmental observations. The social-cognitive and evolutionary basis of the sense of looming vulnerability are discussed, as well as its roots in cognitive schemata (fear scripts), its state elicitation by several potential classes of antecedent conditions, and possible treatment implications.

  13. Countering the Nuclear Terrorist Threat

    Energy Technology Data Exchange (ETDEWEB)

    Vantine, H C

    2002-10-04

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things

  14. Exploring Parents' and Children's Awareness on Internet Threats in Relation to Internet Safety

    Science.gov (United States)

    Ktoridou, Despo; Eteokleous, Nikleia; Zahariadou, Anastasia

    2012-01-01

    Purpose: The purpose of the study is to explore parents' level of awareness in relation to the threats that children are exposed to when using the internet. Additionally, it explores the parental interest to raise their awareness on internet use and threats, as well as investigating their interest in establishing household environment safety…

  15. Can polar bears use terrestrial foods to offset lost ice-based hunting opportunities?

    Science.gov (United States)

    Rode, Karyn D.; Robbins, Charles T.; Nelson, Lynne; Amstrup, Steven C.

    2015-01-01

    Increased land use by polar bears (Ursus maritimus) due to climate-change-induced reduction of their sea-ice habitat illustrates the impact of climate change on species distributions and the difficulty of conserving a large, highly specialized carnivore in the face of this global threat. Some authors have suggested that terrestrial food consumption by polar bears will help them withstand sea-ice loss as they are forced to spend increasing amounts of time on land. Here, we evaluate the nutritional needs of polar bears as well as the physiological and environmental constraints that shape their use of terrestrial ecosystems. Only small numbers of polar bears have been documented consuming terrestrial foods even in modest quantities. Over much of the polar bear's range, limited terrestrial food availability supports only low densities of much smaller, resident brown bears (Ursus arctos), which use low-quality resources more efficiently and may compete with polar bears in these areas. Where consumption of terrestrial foods has been documented, polar bear body condition and survival rates have declined even as land use has increased. Thus far, observed consumption of terrestrial food by polar bears has been insufficient to offset lost ice-based hunting opportunities but can have ecological consequences for other species. Warming-induced loss of sea ice remains the primary threat faced by polar bears.

  16. Ranking terrestrial vertebrate species for utility in biomonitoring and vulnerability to environmental contaminants

    Science.gov (United States)

    Golden, N.H.; Rattner, B.A.

    2003-01-01

    The measurement of contaminant tissue concentrations or exposure-related effects in biota has been used extensively to monitor pollution and environmental health. Terrestrial vertebrates have historically been an important group of species in such evaluations, not only because many are excellent sentinels of environmental contamination, but also because they are valued natural resources in their own right that may be adversely affected by toxicant exposure. Selection of appropriate vertebrates for biomonitoring studies frequently relies on expert opinion, although a few rigorous schemes are in use for predicting vulnerability of birds to the adverse effects of petroleum crude oil. A Utility Index that ranks terrestrial vertebrate species as potential sentinels of contaminants in a region, and a Vulnerability Index that assesses the threat of specific groups of contaminants to these species, have been developed to assist decision makers in risk assessments of persistent organic pollutants, cholinesterase-inhibiting pesticides, petroleum crude oil, mercury, and lead shot. Twenty-five terrestrial vertebrate species commonly found in Atlantic Coast estuarine habitat were ranked for their utility as biomonitors of contamination and their vulnerability to pollutants in this region. No single species, taxa or class of vertebrates was found to be an ideal sentinel for all groups of contaminants. Although birds have overwhelmingly been used to monitor contaminants compared to other terrestrial vertebrate classes, the non-migratory nature and dietary habits of the snapping turtle and mink consistently resulted in ranking these species excellent sentinels as well. Vulnerability of Atlantic Coast populations of these species varied considerably among groups of contaminants. Usually a particular species was found to be at high risk to only one or two groups of contaminants, although a noteworthy exception is the bald eagle that is highly vulnerable to all five of the

  17. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  18. Bias Adjusted Precipitation Threat Scores

    Directory of Open Access Journals (Sweden)

    F. Mesinger

    2008-04-01

    Full Text Available Among the wide variety of performance measures available for the assessment of skill of deterministic precipitation forecasts, the equitable threat score (ETS might well be the one used most frequently. It is typically used in conjunction with the bias score. However, apart from its mathematical definition the meaning of the ETS is not clear. It has been pointed out (Mason, 1989; Hamill, 1999 that forecasts with a larger bias tend to have a higher ETS. Even so, the present author has not seen this having been accounted for in any of numerous papers that in recent years have used the ETS along with bias "as a measure of forecast accuracy".

    A method to adjust the threat score (TS or the ETS so as to arrive at their values that correspond to unit bias in order to show the model's or forecaster's accuracy in extit{placing} precipitation has been proposed earlier by the present author (Mesinger and Brill, the so-called dH/dF method. A serious deficiency however has since been noted with the dH/dF method in that the hypothetical function that it arrives at to interpolate or extrapolate the observed value of hits to unit bias can have values of hits greater than forecast when the forecast area tends to zero. Another method is proposed here based on the assumption that the increase in hits per unit increase in false alarms is proportional to the yet unhit area. This new method removes the deficiency of the dH/dF method. Examples of its performance for 12 months of forecasts by three NCEP operational models are given.

  19. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  20. Nuclear terrorism: How real is the threat?

    International Nuclear Information System (INIS)

    After the end of the Cold War the threat of proliferation of weapons of mass destruction to non-state actors has increased and since non-territorial actors cannot be deterred as easily as states, new responses have to be found. The author offers a definition of nuclear terrorism which includes also attacks on, and sabotage of, nuclear reactors and the dispersal of radioactive waste, in addition to the possession or use of weapon-grade nuclear materials. It is held that the main bottleneck for would-be nuclear terrorists is not so much bomb design than access to nuclear material for which the territories of the former Soviet Union are a likely source, due to gaps in safety and security. The article discusses the smuggling of nuclear material from the former USSR's territories and lists seven possible methods of acquisition of nuclear materials by terrorists. The intentions of various types of groups to use weapons of mass destruction and their possible goals are analyzed and the question whether or not Osama Bin Laden has acquired nuclear materials is raised. A discussion of possible motivations for nuclear terrorism by non-state actors and a listing of facilitating and inhibiting factors with regard to terrorist use of weapons of mass destruction lead to the conclusion that nuclear terrorism by non-state actors is still a low probability event but that no risks can be taken and that a broad action plan to counter the threat is needed whereby the IAEA should stand in the forefront. (author)

  1. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  2. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology.

  3. Threat by association: do distant intergroup threats carry-over into local intolerance?

    Science.gov (United States)

    Bouman, Thijs; van Zomeren, Martijn; Otten, Sabine

    2014-09-01

    Individuals are often confronted with intergroup threats, yet many of these threats emanate from distant groups that most individuals are unlikely to encounter in their local environment. An important yet unanswered question is whether reactions to those threats, such as intolerance towards the threatening group, carry over to other groups that individuals actually do encounter in their local environment (e.g., immigrants). The main goal of our studies was to experimentally identify this carry-over effect of intergroup threat. Specifically, we hypothesized that (by definition relatively abstract) symbolic threats (e.g., threats to the ingroup's worldview) have an especially strong carry-over potential because those threats can be easily attributed to other outgroups. We tested these predictions in one correlational and two experimental studies. The results of all three studies confirmed our hypothesis that particularly distant symbolic threats were predictive of intolerance towards local outgroups.

  4. In Brief: Forecasting meningitis threats

    Science.gov (United States)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  5. [Counterfeit medicines: a growing threat].

    Science.gov (United States)

    Barbereau, S

    2006-12-01

    The medical drug market has undergone considerable transformation in recent years. Like other products, medicines have been affected by globalization. Free trade policies have had a number of negative effects including a reduction in quality control not only for some products but also for raw materials and finished products. The global environment has also created conditions conducive to counterfeit medicines. The term counterfeit medicine is defined differently from one country to another in terms of quality, legality and fraudulent intent. This situation prompted the WHO to propose the following definition: "A counterfeit medicine is one which is deliberately and fraudulently mislabeled with respect to identity and/or source. Counterfeiting can apply to both branded and generic products and counterfeit products may include products with the correct ingredients or with the wrong ingredients, without active ingredients, with insufficient active ingredients or with fake packaging." Weak pharmaceutical regulation often compounded by widespread corruption in developing countries has greatly facilitated the development of this illicit market with harmful and costly effects on public health. Due to the lack of pharmocovigilance accidents involving use of counterfeit drugs go unreported. For this reason it is not possible to measure the economic impact. While counterfeiting has become a major threat in developing countries, it also affects industrialized countries. Fraudulent behavior occurs all over the world.

  6. Atmospheric Circulation of Terrestrial Exoplanets

    CERN Document Server

    Showman, Adam P; Merlis, Timothy M; Kaspi, Yohai

    2013-01-01

    The investigation of planets around other stars began with the study of gas giants, but is now extending to the discovery and characterization of super-Earths and terrestrial planets. Motivated by this observational tide, we survey the basic dynamical principles governing the atmospheric circulation of terrestrial exoplanets, and discuss the interaction of their circulation with the hydrological cycle and global-scale climate feedbacks. Terrestrial exoplanets occupy a wide range of physical and dynamical conditions, only a small fraction of which have yet been explored in detail. Our approach is to lay out the fundamental dynamical principles governing the atmospheric circulation on terrestrial planets--broadly defined--and show how they can provide a foundation for understanding the atmospheric behavior of these worlds. We first survey basic atmospheric dynamics, including the role of geostrophy, baroclinic instabilities, and jets in the strongly rotating regime (the "extratropics") and the role of the Hadle...

  7. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  8. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  9. Cosmic Impacts: The DoomsDay Threat

    Science.gov (United States)

    McGaha, J.

    1998-07-01

    Recent science fiction movies (Deep Impact and Armageddon) have brought public attention to the threat of possible impacts from space. Just how real is this threat and what would be the consequences of such an impact? Can we do anything to prevent it? The survival of civilization may depend on it.

  10. Threat by association : Do distant intergroup threats carry-over into local intolerance?

    NARCIS (Netherlands)

    Bouman, Thijs; van Zomeren, Martijn; Otten, Sabine

    2014-01-01

    Individuals are often confronted with intergroup threats, yet many of these threats emanate from distant groups that most individuals are unlikely to encounter in their local environment. An important yet unanswered question is whether reactions to those threats, such as intolerance towards the thre

  11. The Threat of Terrorist Organizations in Cyberspace

    Directory of Open Access Journals (Sweden)

    Gabi Siboni

    2013-12-01

    Full Text Available This article discusses the threat of terrorism in cyberspace and examines the truth of the perceptions of this threat that have formed in recent years. It examines the capabilities that a non-state actor can achieve and whether these can constitute a real threat to the national security of states. For an analysis of the main threats facing a state from a multi-year perspective and in light of anticipated changes in a state’s strategic balance, the factors that threaten the state are presented and the roots of the threat are identified. The article thus examines whether terrorism, whose impact is generally tactical, could make (or perhaps has already made the transition to a cyber weapon capability with strategic impact. Specifically, the question is could terrorists develop cyber weapon capabilities that could inflict widespread damage or damage over time, of the sort that brings states to their knees and causes critical systems to crash.

  12. Insider threat to secure facilities: data analysis

    Energy Technology Data Exchange (ETDEWEB)

    1979-12-07

    This report is the culmination of a project in which data from several industries confronting internal security threats were collected and analyzed. The industries and threats involved are deemed to be analogous in one or more respects to potential threats confronting decision makers in the nuclear industry. The analog internal threats consist of bank frauds and embezzlements over $10,000, computer crimes of various types and insider drug thefts from drug manufactures and distributors. These data have been subjected to careful analysis utilizing both descriptive and formal statistical techniques. A number of findings are quite suggestive as to the general nature of the internal threat and are discussed and interpreted in terms of thenuclear industry analogy.

  13. The threat of nuclear terrorism

    International Nuclear Information System (INIS)

    Full text: There have always been enormous gaps between the potential of a weapon and the abilities and/or the will to employ it by terrorists. New means and methods of violence with unknown outcomes could be less appealing for sub-national groups. Conventional 'off the shelf' weaponry is thus likely to remain the major tools for traditional terrorists. However, the analysis show that while the risk of nuclear terrorism may be remote, it should not and cannot be excluded. Rigorous standards and means the protection, control and accounting of fissile materials are thus needed. 'Nuclear terrorism' can be defined as acts of violence and destruction where the means applied are nuclear devices, or threats of use of such means, to create a condition of fear, to get attention, or to blackmail to have wider effect on others than the directly targeted victim(s). Nuclear terrorism is a subset of radiological terrorism, were the means (or threats) applied are radioactive substances. While being distinctly dissimilar in terms of technical approaches and damage potentials, many of the features with regards to public threat perception are likely to be similar. No non-state actors have ever deployed or used a nuclear device, and the number of (publicly known) nuclear bomb treats has been limited. However, there is a disturbing interest among some terrorist organizations in acquiring nuclear weapon capabilities, probably for tactical purposes. The biological and chemical programs of the Japanese 'Aum Shinrikyo' cult that culminated in the Tokyo metro attack is highly publicized. Less well-known is the nuclear weapon program of the group. Nuclear material was acquired from the sect's properties in Australia and markets were explored to purchase nuclear technology via straw trading companies. Another highly profiled terrorist group with obvious nuclear intentions is the 'Al- Qa'ida', the group of bin Laden. The recent trail for the bombings of the U.S. embassies in Nairobi, Kenya

  14. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  15. External threat and the definition of deviance.

    Science.gov (United States)

    Laudedale, P; Smith-Cunnien, P; Parker, J; Inverarity, J

    1984-05-01

    Research ( Lauderdale , 1976; Schachter , 1951) suggests that an external threat to a group can lead to the rejection of deviant members of the group and alteration of group communication patterns and solidarity. This study sought to extend those findings, integrate them with concepts from Simmel 's (1917/1955) work on group conflict, and link them to key issues in the societal reaction approach to deviant behavior. We examined the effect of variation in level of threat, the relationship between deviant status and nonconformity to the central task norm, the role of high-status actors in deviance designation, the relationship between rejection and negative definition of the deviant, and the effects of rejection and negative definition on group solidarity. Hypotheses were tested in an experimental design involving three conditions (strong threat, weak threat, and no threat). The results suggest that (a) the level of threat is directly related to the extent of rejection and negative definition, (b) nonconformity to the central task norm is not systematically related to deviant status, (c) high-status actors are more involved in the rejection of the deviant, (d) sociometric rejection of the deviant is accompanied by negative definition in the strong-threat condition, and (e) the level of group solidarity is related to the extent of rejection and negative definition. Implications of these findings are discussed relative to the societal reaction approach to deviant behavior and analogous processes in other social groups.

  16. Towards securing SCADA systems against process-related threats

    NARCIS (Netherlands)

    Hadziosmanovic, Dina; Bolzoni, Damiano; Hartel, Pieter

    2010-01-01

    We propose a tool-assisted approach to address process-related threats on SCADA systems. Process-related threats have not been addressed before in a systematic manner. Our approach consists of two steps: threat analysis and threat mitigation. For the threat analysis, we combine two methodologies (PH

  17. Sea Level Threat in Tuvalu

    Directory of Open Access Journals (Sweden)

    Than Aung

    2009-01-01

    Full Text Available Problem statement: Recently the impacts of climate change, in particular, sea level rise, had been a major concern for many Pacific island countries. In early 2000, there were a series of media coverage over sea level rise issues using Tuvalu as an example. The daily life of Tuvalu revolves around the ocean and the immediate threat on the islands people, economy, environment and its islands is of concern to the Tuvalu government. The Tuvalu government has concluded that Tuvalu was destined to become the first nation to be sunk by global warming because it is one of the smallest and lowest-lying countries in the world. Approach: In this study, sea level data from the Australian project will be focussed on despite the fact that the length of data is not sufficiently long. The AusAID funded South Pacific Sea Level and climate monitoring project was set up in response to concerns raised by Pacific island countries over the potential impacts of an enhanced greenhouse effect on climate and sea levels in the South Pacific for 20 years. Results: Based upon the 15½ years of sea level data from the project, the sea level rise rate in Tuvalu as at september 2008 was 5.9 mM year-1. This was about four times higher than the global average of 1-2 mm year-1. Sea level in the Tuvalu area had risen approximately 9.14 cm since the inception of the project 15½ years ago. However, it was to be noted that the land is quite stable and the rate of land sinking is -0.06 mM year-1 only. Accordingly, there was no significant impact on the sea level trends. Conclusion: Although the data length is just over 15 years, the sea level trend values do not fluctuate significantly since 1999. It simply indicated that the rate of sea level rise in the Tuvalu region was not accelerating as anticipated by the community.

  18. Ebola Virus ─ A Global Threat

    Directory of Open Access Journals (Sweden)

    Mejbah Uddin Ahmed

    2015-01-01

    Full Text Available Ebola virus is a filamentous, enveloped, non-segmented, single-stranded, negative-sense RNA virus. It belongs to the Filoviridae and was first recognized near the Ebola River valley in Zaire in 1976. Since then most of the outbreaks have occurred to both human and nonhuman primates in sub-Saharan Africa. Ebola virus causes highly fatal hemorrhagic fever in human and nonhuman primates. In addition to hemorrhagic fever, it could be used as a bioterrorism agent. Although its natural reservoir is yet to be proven, current data suggest that fruit bats are the possibility. Infection has also been documented through the handling of infected chimpanzees, gorillas, monkeys, forest antelope and porcupines. Human infection is caused through close contact with the blood, secretion, organ or other body fluids of infected animal. Human-to-human transmission is also possible. Ebola virus infections are characterized by immune suppression and a systemic inflammatory response that causes impairment of the vascular, coagulation, and immune systems, leading to multiorgan failure and shock. The virus constitutes an important public health threat in Africa and also worldwide as no effective treatment or vaccine is available till now

  19. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  20. Mercury cycling in terrestrial watersheds

    Science.gov (United States)

    Shanley, James B.; Bishop, Kevin; Banks, Michael S.

    2012-01-01

    This chapter discusses mercury cycling in the terrestrial landscape, including inputs from the atmosphere, accumulation in soils and vegetation, outputs in streamflow and volatilization, and effects of land disturbance. Mercury mobility in the terrestrial landscape is strongly controlled by organic matter. About 90% of the atmospheric mercury input is retained in vegetation and organic matter in soils, causing a buildup of legacy mercury. Some mercury is volatilized back to the atmosphere, but most export of mercury from watersheds occurs by streamflow. Stream mercury export is episodic, in association with dissolved and particulate organic carbon, as stormflow and snowmelt flush organic-rich shallow soil horizons. The terrestrial landscape is thus a major source of mercury to downstream aquatic environments, where mercury is methylated and enters the aquatic food web. With ample organic matter and sulfur, methylmercury forms in uplands as well—in wetlands, riparian zones, and other anoxic sites. Watershed features (topography, land cover type, and soil drainage class) are often more important than atmospheric mercury deposition in controlling the amount of stream mercury and methylmercury export. While reductions in atmospheric mercury deposition may rapidly benefit lakes, the terrestrial landscape will respond only over decades, because of the large stock and slow turnover of legacy mercury. We conclude with a discussion of future scenarios and the challenge of managing terrestrial mercury.

  1. Simulations for terrestrial planets formation

    Institute of Scientific and Technical Information of China (English)

    ZHANG Niu; JI JiangHui

    2009-01-01

    In this paper, the formation of terrestrial planets in the late stage of planetary formation is Investigated using the two-planet model. At that time, the protostar formed for about 3 Ma and the gas disk dissipated. In the model, the perturbations from Jupiter and Saturn are considered. Variations of the mass of outer planet, and the initial eccentricities and inclinations of embryos and planetesimals are also considered. Our results show that, terrestrial planets are formed in 50 Ma, and the accretion rate is about 60%-80%. In each simulation, 3-4 terrestrial planets are formed inside "Jupiter" with masses of 0.15-3.6 M(⊙). In the 0.5-4 AU, when the eccentricities of planetesimals are excited, planetesimals are able to accrete material from wide radial direction. The plenty of water material of the terrestrial planet in the Habitable Zone may be transferred from the farther places by this mechanism. Accretion could also happen a few times between two major planets only if the outer planet has a moderate mass and the small terrestrial planet could survive at some resonances over time scale of 108a. In one of our simulations, commensurability of the orbital periods of planets is very common. Moreover, a librating-circulating 3:2 configuration of mean motion resonance is found.

  2. Simulations for terrestrial planets formation

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    In this paper,the formation of terrestrial planets in the late stage of planetary formation is investigated using the two-planet model.At that time,the protostar formed for about 3 Ma and the gas disk dissipated.In the model,the perturbations from Jupiter and Saturn are considered.Variations of the mass of outer planet,and the initial eccentricities and inclinations of embryos and planetesimals are also considered.Our results show that,terrestrial planets are formed in 50 Ma,and the accretion rate is about 60%-80%.In each simulation,3-4 terrestrial planets are formed inside"Jupiter"with masses of 0.15 -3.6M⊕.In the 0.5-4 AU,when the eccentricities of planetesimals are excited,planetesimals are able to accrete material from wide radial direction.The plenty of water material of the terrestrial planet in the Habitable Zone may be transferred from the farther places by this mechanism.Accretion could also happen a few times between two major planets only if the outer planet has a moderate mass and the small terrestrial planet could survive at some resonances over time scale of 10 8 a.In one of our simulations,commensurability of the orbital periods of planets is very common.Moreover,a librating-circulating 3:2 configuration of mean motion resonance is found.

  3. Accumulation and fluxes of mercury in terrestrial and aquatic food chains with special reference to Finland

    Directory of Open Access Journals (Sweden)

    Martin Lodenius

    2013-03-01

    Full Text Available Mercury is known for its biomagnification especially in aquatic food chains and for its toxic effects on different organisms including man. In Finland mercury has formerly been used in industry and agriculture and in addition many anthropogenic activities may increase the mercury levels in ecosystems. Phenyl mercury was widely used as slimicide in the pulp and paper industry in the 1950s and 1960s. In the chlor-alkali industry metallic mercury was used as catalyst at three plants. The most toxic form of mercury, methyl mercury, may be formed in soils, water, sediments and organisms. Many factors, including microbial activity, temperature, oxygen status etc., affect the methylation rate. In the lake ecosystem bioaccumulation of methyl mercury is very strong. In early 1980s there was a restriction of fishing concerning approximately 4000 km2 of lakes and sea areas because of mercury pollution. In aquatic systems we still find elevated concentrations near former emission sources. Long-range atmospheric transport and mechanical operations like ditching and water regulation may cause increased levels of mercury in the aquatic ecosystems. In the Finnish agriculture organic mercury compounds were used for seed dressing until 1992. Although the amounts used were substantial the concentrations in agricultural soils have remained rather low. In terrestrial food chains bioaccumulation is normally weak with low or moderate concentration at all ecosystem levels. Due to a weak uptake through roots terrestrial, vascular plants normally contain only small amounts of mercury. There is a bidirectional exchange of mercury between vegetation and atmosphere. Contrary to vascular plants, there is a very wide range of concentrations in fungi. Mercury may pose a threat to human health especially when accumulated in aquatic food chains.

  4. Controllability modulates the neural response to predictable but not unpredictable threat in humans.

    Science.gov (United States)

    Wood, Kimberly H; Wheelock, Muriah D; Shumen, Joshua R; Bowen, Kenton H; Ver Hoef, Lawrence W; Knight, David C

    2015-10-01

    Stress resilience is mediated, in part, by our ability to predict and control threats within our environment. Therefore, determining the neural mechanisms that regulate the emotional response to predictable and controllable threats may provide important new insight into the processes that mediate resilience to emotional dysfunction and guide the future development of interventions for anxiety disorders. To better understand the effect of predictability and controllability on threat-related brain activity in humans, two groups of healthy volunteers participated in a yoked Pavlovian fear conditioning study during functional magnetic resonance imaging (fMRI). Threat predictability was manipulated by presenting an aversive unconditioned stimulus (UCS) that was either preceded by a conditioned stimulus (i.e., predictable) or by presenting the UCS alone (i.e., unpredictable). Similar to animal model research that has employed yoked fear conditioning procedures, one group (controllable condition; CC), but not the other group (uncontrollable condition; UC) was able to terminate the UCS. The fMRI signal response within the dorsolateral prefrontal cortex (PFC), dorsomedial PFC, ventromedial PFC, and posterior cingulate was diminished during predictable compared to unpredictable threat (i.e., UCS). In addition, threat-related activity within the ventromedial PFC and bilateral hippocampus was diminished only to threats that were both predictable and controllable. These findings provide insight into how threat predictability and controllability affects the activity of brain regions (i.e., ventromedial PFC and hippocampus) involved in emotion regulation, and may have important implications for better understanding neural processes that mediate emotional resilience to stress.

  5. Utilization of the terrestrial cyanobacteria

    Science.gov (United States)

    Katoh, Hiroshi; Tomita-Yokotani, Kaori; Furukawa, Jun; Kimura, Shunta; Yokoshima, Mika; Yamaguchi, Yuji; Takenaka, Hiroyuki

    The terrestrial, N _{2}-fixing cyanobacterium, Nostoc commune has expected to utilize for agriculture, food and terraforming cause of its extracellular polysaccharide, desiccation tolerance and nitrogen fixation. Previously, the first author indicated that desiccation related genes were analyzed and the suggested that the genes were related to nitrogen fixation and metabolisms. In this report, we suggest possibility of agriculture, using the cyanobacterium. Further, we also found radioactive compounds accumulated N. commune (cyanobacterium) in Fukushima, Japan after nuclear accident. Thus, it is investigated to decontaminate radioactive compounds from the surface soil by the cyanobacterium and showed to accumulate radioactive compounds using the cyanobacterium. We will discuss utilization of terrestrial cyanobacteria under closed environment. Keyword: Desiccation, terrestrial cyanobacteria, bioremediation, agriculture

  6. Acid Rain: The Silent Environmental Threat.

    Science.gov (United States)

    Zmud, Mia

    1992-01-01

    Describes the silent environmental threat posed by acid rain. Caused mainly by manmade pollutants, acid rain damages water and trees, decreases visibility, corrodes monuments, and threatens public health. The article includes guidelines for action. (SM)

  7. Cyber threats in social networking websites

    CERN Document Server

    Gharibi, Wajeb

    2012-01-01

    A social network is a social structure made up of individuals or organizations called nodes, which are connected by one or more specific types of interdependency, such as friendship, common interest, and exchange of finance, relationships of beliefs, knowledge or prestige. A cyber threat can be both unintentional and intentional, targeted or non targeted, and it can come from a variety of sources, including foreign nations engaged in espionage and information warfare, criminals, hackers, virus writers, disgruntled employees and contractors working within an organization. Social networking sites are not only to communicate or interact with other people globally, but also one effective way for business promotion. In this paper, we investigate and study the cyber threats in social networking websites. We go through the amassing history of online social websites, classify their types and also discuss the cyber threats, suggest the anti-threats strategies and visualize the future trends of such hoppy popular websi...

  8. Hydrology: Indo-Gangetic groundwater threat

    Science.gov (United States)

    Fendorf, Scott; Benner, Shawn G.

    2016-10-01

    Increasing groundwater extraction supports hundreds of millions of people across the Indo-Gangetic Basin. Data suggests that despite the increase in withdrawals, groundwater depletion is localized and the most widespread threat is contamination.

  9. Advanced Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  10. Heat Waves Pose Big Health Threats

    Science.gov (United States)

    ... https://medlineplus.gov/news/fullstory_159744.html Heat Waves Pose Big Health Threats Kids, elderly among those ... can be inherently dangerous, but the initial heat waves every summer can be particularly perilous to those ...

  11. Cyber Threats In Social Networking Websites

    Directory of Open Access Journals (Sweden)

    Wajeb Ghari

    2012-02-01

    Full Text Available A social network is a social structure made up of individuals or organizations called nodes, which areconnected by one or more specific types of interdependency, such as friendship, common interest, and exchange of finance, relationships of beliefs, knowledge or prestige. A cyber threat can be both unintentional and intentional, targeted or non targeted, and it can come from a variety of sources, including foreign nations engaged in espionage and information warfare, criminals, hackers, virus writers, disgruntled employees and contractors working within an organization. Social networking sitesare not only to communicate or interact with other people globally, but also one effective way for business promotion. In this paper, we investigate and study the cyber threats in social networking websites. We go through the amassing history of online social websites, classify their types and also discuss the cyber threats, suggest the anti-threats strategies and visualize the future trends of such hoppy popular websites.

  12. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  13. WIRELESS NETWORKS: DEVELOPMENTS, THREATS AND COUNTERMEASURES

    OpenAIRE

    Mardiana Mohamad Noor; Wan Haslina Hassan

    2013-01-01

    This paper discusses current threats in wireless networks and some academia research reviews regarding the matters. Significant and persistent threats discussed are sniffing, Man In the Middle Attack (MITM), Rogue Access Points (RAP), Denial Of Services (DoS) and social engineering attacks. Some current developments of wireless communication technology such as short range communication, cloud computing, bring your own device policy (BYOD), devices tethering and convergences of WiFi and cellul...

  14. Space Station Program threat and vulnerability analysis

    Science.gov (United States)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  15. Advanced insider threat mitigation workshop instructional materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2008-11-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.

  16. Environmental Health: Threats and their Interactions

    OpenAIRE

    Holdstock, Douglas

    2008-01-01

    Improvements in the provision of an acceptable standard of health care, particularly in the developing world, will be undermined by three ongoing processes: ongoing armed conflicts; the threat of global warming due to rising levels of greenhouse gases, particularly carbon dioxide emitted by developed countries; and by rapidly rising populations. The key features of these three threats are summarised, and it is shown that interactions between them increase both the likelihood of their occurren...

  17. Priapism caused by 'Tribulus terrestris'.

    Science.gov (United States)

    Campanelli, M; De Thomasis, R; Tenaglia, R L

    2016-01-01

    A 36-year-old Caucasian man was diagnosed with a 72-h-lasting priapism that occurred after the assumption of a Herbal supplement based on Tribulus terrestris, which is becoming increasingly popular for the treatment of sexual dysfunction. The patient underwent a cavernoglandular shunt (Ebbehoj shunt) in order to obtain complete detumescence, from which derived negative post-episode outcomes on sexual function. All patients consuming non-FDA-approved alternative supplements such as Tribulus terrestris should be warned about the possible serious side effects. PMID:26631925

  18. Sniffing Threat and Practices in IPv6 Networks

    Institute of Scientific and Technical Information of China (English)

    YI Xiushuang; WEN Zhankao; ZHANG Dengke

    2006-01-01

    The IPv4 protocol suite is vulnerable to a variety of attacks.IPv6 security is in many ways the same as IPv4 security, the basic mechanisms for transporting packets across the network stay mostly unchanged, and the upper-layer protocols that transport the actual application data are mostly unaffected.This paper illustrates sniffing threat against IPv4 and then compares how the threat might influence an IPv6 networks.This is prefaced by a brief overview of current practices around the design of an IPv4 Internet edge network and then followed by a review of how that IPv4 edge network needs to evolve in order to secure the addition of IPv6.As IPv6 security is a large and complex subject, and also, IPv6 network is still at the very beginning stage and has not been fully examined in fact, this paper focus on the security requirements of medium edge networks.

  19. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat. PMID:19245886

  20. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    Science.gov (United States)

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    The Florida manatee (Trichechus manatus latirostris) is an endangered marine mammal endemic to the southeastern United States. The primary threats to manatee populations are collisions with watercraft and the potential loss of warm-water refuges. For the purposes of listing, recovery, and regulation under the Endangered Species Act (ESA), an understanding of the relative effects of the principal threats is needed. This work is a quantitative approach to threats analysis, grounded in the assumption that an appropriate measure of status under the ESA is based on the risk of extinction, as quantified by the probability of quasi-extinction. This is related to the qualitative threats analyses that are more common under the ESA, but provides an additional level of rigor, objectivity, and integration. In this approach, our philosophy is that analysis of the five threat factors described in Section 4(a)(1) of the ESA can be undertaken within an integrated quantitative framework. The basis of this threats analysis is a comparative population viability analysis. This involves forecasting the Florida manatee population under different scenarios regarding the presence of threats, while accounting for process variation (environmental, demographic, and catastrophic stochasticity) as well as parametric and structural uncertainty. We used the manatee core biological model (CBM) for this viability analysis, and considered the role of five threats: watercraft-related mortality, loss of warm-water habitat in winter, mortality in water-control structures, entanglement, and red tide. All scenarios were run with an underlying parallel structure that allowed a more powerful estimation of the effects of the various threats. The results reflect our understanding of manatee ecology (as captured in the structure of the CBM), our estimates of manatee demography (as described by the parameters in the model), and our characterization of the mechanisms by which the threats act on manatees. As an

  1. Additivity dominance

    Directory of Open Access Journals (Sweden)

    Paul Rozin

    2009-10-01

    Full Text Available Judgments of naturalness of foods tend to be more influenced by the process history of a food, rather than its actual constituents. Two types of processing of a ``natural'' food are to add something or to remove something. We report in this study, based on a large random sample of individuals from six countries (France, Germany, Italy, Switzerland, UK and USA that additives are considered defining features of what makes a food not natural, whereas ``subtractives'' are almost never mentioned. In support of this, skim milk (with major subtraction of fat is rated as more natural than whole milk with a small amount of natural vitamin D added. It is also noted that ``additives'' is a common word, with a synonym reported by a native speaker in 17 of 18 languages, whereas ``subtractive'' is lexicalized in only 1 of the 18 languages. We consider reasons for additivity dominance, relating it to omission bias, feature positive bias, and notions of purity.

  2. Study on a Threat-Countermeasure Model Based on International Standard Information

    Directory of Open Access Journals (Sweden)

    Guillermo Horacio Ramirez Caceres

    2008-12-01

    Full Text Available Many international standards exist in the field of IT security. This research is based on the ISO/IEC 15408, 15446, 19791, 13335 and 17799 standards. In this paper, we propose a knowledge base comprising a threat countermeasure model based on international standards for identifying and specifying threats which affect IT environments. In addition, the proposed knowledge base system aims at fusing similar security control policies and objectives in order to create effective security guidelines for specific IT environments. As a result, a knowledge base of security objectives was developed on the basis of the relationships inside the standards as well as the relationships between different standards. In addition, a web application was developed which displays details about the most common threats to information systems, and for each threat presents a set of related security control policies from different international standards, including ISO/IEC 27002.

  3. Anomaly metrics to differentiate threat sources from benign sources in primary vehicle screening.

    Energy Technology Data Exchange (ETDEWEB)

    Cohen, Israel Dov; Mengesha, Wondwosen

    2011-09-01

    Discrimination of benign sources from threat sources at Port of Entries (POE) is of a great importance in efficient screening of cargo and vehicles using Radiation Portal Monitors (RPM). Currently RPM's ability to distinguish these radiological sources is seriously hampered by the energy resolution of the deployed RPMs. As naturally occurring radioactive materials (NORM) are ubiquitous in commerce, false alarms are problematic as they require additional resources in secondary inspection in addition to impacts on commerce. To increase the sensitivity of such detection systems without increasing false alarm rates, alarm metrics need to incorporate the ability to distinguish benign and threat sources. Principal component analysis (PCA) and clustering technique were implemented in the present study. Such techniques were investigated for their potential to lower false alarm rates and/or increase sensitivity to weaker threat sources without loss of specificity. Results of the investigation demonstrated improved sensitivity and specificity in discriminating benign sources from threat sources.

  4. Aquatic and Terrestrial Environment 2004

    DEFF Research Database (Denmark)

    Andersen, J. M.; Boutrup, S.; Bijl, L. van der;

    , watercourses, lakes and marine waters and the pressures upon them and reviews the monitoring of terrestrial natural habitats and selected plants and animals. The report is based on the annual reports prepared for each subprogramme by the Topic Centres. The latter reports are mainly based on data collected...

  5. Pollution, habitat loss, fishing, and climate change as critical threats to penguins.

    Science.gov (United States)

    Trathan, Phil N; García-Borboroglu, Pablo; Boersma, Dee; Bost, Charles-André; Crawford, Robert J M; Crossin, Glenn T; Cuthbert, Richard J; Dann, Peter; Davis, Lloyd Spencer; De La Puente, Santiago; Ellenberg, Ursula; Lynch, Heather J; Mattern, Thomas; Pütz, Klemens; Seddon, Philip J; Trivelpiece, Wayne; Wienecke, Barbara

    2015-02-01

    Cumulative human impacts across the world's oceans are considerable. We therefore examined a single model taxonomic group, the penguins (Spheniscidae), to explore how marine species and communities might be at risk of decline or extinction in the southern hemisphere. We sought to determine the most important threats to penguins and to suggest means to mitigate these threats. Our review has relevance to other taxonomic groups in the southern hemisphere and in northern latitudes, where human impacts are greater. Our review was based on an expert assessment and literature review of all 18 penguin species; 49 scientists contributed to the process. For each penguin species, we considered their range and distribution, population trends, and main anthropogenic threats over the past approximately 250 years. These threats were harvesting adults for oil, skin, and feathers and as bait for crab and rock lobster fisheries; harvesting of eggs; terrestrial habitat degradation; marine pollution; fisheries bycatch and resource competition; environmental variability and climate change; and toxic algal poisoning and disease. Habitat loss, pollution, and fishing, all factors humans can readily mitigate, remain the primary threats for penguin species. Their future resilience to further climate change impacts will almost certainly depend on addressing current threats to existing habitat degradation on land and at sea. We suggest protection of breeding habitat, linked to the designation of appropriately scaled marine reserves, including in the High Seas, will be critical for the future conservation of penguins. However, large-scale conservation zones are not always practical or politically feasible and other ecosystem-based management methods that include spatial zoning, bycatch mitigation, and robust harvest control must be developed to maintain marine biodiversity and ensure that ecosystem functioning is maintained across a variety of scales.

  6. Reproductive disturbance of Japanese bumblebees by the introduced European bumblebee Bombus terrestris

    Science.gov (United States)

    Kondo, Natsuko Ito; Yamanaka, Daisei; Kanbe, Yuya; Kunitake, Yoko Kawate; Yoneda, Masahiro; Tsuchida, Koji; Goka, Koichi

    2009-04-01

    The European bumblebee, Bombus terrestris, is an invasive eusocial species whose distribution is expanding greatly beyond its native range because numerous colonies are imported to or locally produced in non-native countries for pollination of agricultural crops. Closely related species exist in Japan where the unrestricted import and use of B. terrestris has resulted in the establishment of wild colonies. Laboratory studies previously showed that B. terrestris and Japanese native species can copulate and produce fertilized eggs. Although these eggs do not hatch, the interspecific mating can cause a serious reproductive disturbance to native bumblebees. In this study, we determined the frequencies of interspecies mating between B. terrestris males and native bumblebee queens in the wild on the islands of Hokkaido and Honshu by analyzing the DNA sequences of spermatozoa stored in spermathecae of native queens. We found that 20.2% of B. hypocrita hypocrita queens and 30.2% of B. hypocrita sapporoensis queens had spermatozoa of B. terrestris males in their spermathecae. Given that a Bombus queen generally mates only once in her life, such high frequencies of interspecific mating with B. terrestris pose serious threats to the populations of native bumblebees in Japan.

  7. Identifying serotonergic mechanisms underlying the corticolimbic response to threat in humans

    DEFF Research Database (Denmark)

    Fisher, Patrick M; Hariri, Ahmad R

    2013-01-01

    A corticolimbic circuit including the amygdala and medial prefrontal cortex (mPFC) plays an important role in regulating sensitivity to threat, which is heightened in mood and anxiety disorders. Serotonin is a potent neuromodulator of this circuit; however, specific serotonergic mechanisms......-dependent functional magnetic resonance imaging. This multi-modal neuroimaging strategy can be integrated with additional techniques including imaging genetics and pharmacological challenge paradigms to more clearly understand how serotonin signalling modulates neural pathways underlying sensitivity to threat...

  8. Chemical-Sensing Cables Detect Potential Threats

    Science.gov (United States)

    2007-01-01

    Intelligent Optical Systems Inc. (IOS) completed Phase I and II Small Business Innovation Research (SBIR) contracts with NASA's Langley Research Center to develop moisture- and pH-sensitive sensors to detect corrosion or pre-corrosive conditions, warning of potentially dangerous conditions before significant structural damage occurs. This new type of sensor uses a specially manufactured optical fiber whose entire length is chemically sensitive, changing color in response to contact with its target, and demonstrated to detect potentially corrosive moisture incursions to within 2 cm. After completing the work with NASA, the company received a Defense Advanced Research Projects Agency (DARPA) Phase III SBIR to develop the sensors further for detecting chemical warfare agents, for which they proved just as successful. The company then worked with the U.S. Department of Defense (DoD) to fine tune the sensors for detecting potential threats, such as toxic industrial compounds and nerve agents. In addition to the work with government agencies, Intelligent Optical Systems has sold the chemically sensitive fiber optic cables to major automotive and aerospace companies, who are finding a variety of uses for the devices. Marketed under the brand name Distributed Intrinsic Chemical Agent Sensing and Transmission (DICAST), these unique continuous-cable fiber optic chemical sensors can serve in a variety of applications: Corrosive-condition monitoring, aiding experimentation with nontraditional power sources, as an economical means of detecting chemical release in large facilities, as an inexpensive "alarm" systems to alert the user to a change in the chemical environment anywhere along the cable, or in distance-resolved optical time domain reflectometry systems to provide detailed profiles of chemical concentration versus length.

  9. Potlining Additives

    Energy Technology Data Exchange (ETDEWEB)

    Rudolf Keller

    2004-08-10

    In this project, a concept to improve the performance of aluminum production cells by introducing potlining additives was examined and tested. Boron oxide was added to cathode blocks, and titanium was dissolved in the metal pool; this resulted in the formation of titanium diboride and caused the molten aluminum to wet the carbonaceous cathode surface. Such wetting reportedly leads to operational improvements and extended cell life. In addition, boron oxide suppresses cyanide formation. This final report presents and discusses the results of this project. Substantial economic benefits for the practical implementation of the technology are projected, especially for modern cells with graphitized blocks. For example, with an energy savings of about 5% and an increase in pot life from 1500 to 2500 days, a cost savings of $ 0.023 per pound of aluminum produced is projected for a 200 kA pot.

  10. EU conference - 'The microbial threat'

    DEFF Research Database (Denmark)

    Mevius, D.J.; Sprenger, M.J.W.; Wegener, Henrik Caspar

    1999-01-01

    A global or European strategy should be developed to deal with increasing antimicrobial resistance. This strategy includes surveillance of antimicrobial resistance and monitoring of the use of antimicrobial agents in animals and humans. In animals, surveillance should be focussed on potential...... transfer of resistant, zoonotic, food-born pathogens and resistance genes to humans. In humans the surveillance should be clinically relevant. Guidelines for rational therapy should be implemented and 'antibiotic teams' should be installed in each hospital to evaluate the prescription of antibiotics...... and its compliance with guidelines. Keeping animals for food production involves the responsibility for their well being. This includes treatment of infections. However, the use of feed additive, growth-promoting antimicrobials related to therapeutics in human medicine, should be banned immediately...

  11. Threat navigator: grouping and ranking malicious external threats to current and future urban smart grids

    NARCIS (Netherlands)

    Vasenev, Alexandr; Montoya, Lorena; Ceccarelli, Andrea; Le, Anhtuan; Ionita, Dan

    2016-01-01

    Deriving value judgements about threat rankings for large and entangled systems, such as those of urban smart grids, is a challenging task. Suitable approaches should account for multiple threat events posed by different classes of attackers who target system components. Given the complexity of the

  12. Assessing the potential threat landscape of a proposed reintroduction site for carnivores.

    Directory of Open Access Journals (Sweden)

    Samantha K Page

    Full Text Available This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent's first language (isiXhosa had more positive indices, education level (poorer education was synonymous with more positive threat indices, land use (wildlife ranching being the most negative and land tenure (community respondents had more positive indices than private landowners. Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid.

  13. Terrorism threats and preparedness in Canada: the perspective of the Canadian public.

    Science.gov (United States)

    Gibson, Stacey; Lemyre, Louise; Clément, Mélanie; Markon, Marie-Pierre L; Lee, Jennifer E C

    2007-06-01

    Although Canada has not experienced a major terrorist attack, an increased global pending threat has put preparedness at the top of the Canadian government's agenda. Given its strong multicultural community and close proximity to the recently targeted United States, the Canadian experience is unique. However, minimal research exists on the public's reactions to terrorism threats and related preparedness strategies. In order for response initiatives to be optimally effective, it is important that the public's opinions regarding terrorism and preparedness be considered. This qualitative study examined perceptions of terrorism threats among Canadians living in Central and Eastern Canada (N = 75) in the fall of 2004. Conceptualizations of terrorism threat, psychosocial impacts, and sense of preparedness were explored in a series of qualitative interviews. Findings revealed that the majority of Canadians did not feel overly threatened by terrorist attacks, due in part to a perception of terrorist threats as related to global sociopolitical events and a positive Canadian identity. In addition, while most respondents did not feel they were individually affected by the threat of terrorism, there was some concern regarding larger societal impacts, such as increased paranoia, discrimination, and threats to civil liberties. Participants' views on preparedness focused largely on the utility of emergency preparedness strategies and the factors that could mitigate or inhibit preparedness at the individual and institutional levels, with a specific focus on education. Finally, the significant relevance of these findings in shaping terrorism preparedness, both in Canada and generally, is discussed.

  14. Assessing the potential threat landscape of a proposed reintroduction site for carnivores.

    Science.gov (United States)

    Page, Samantha K; Parker, Daniel M; Peinke, Dean M; Davies-Mostert, Harriet T

    2015-01-01

    This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus) as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent's first language (isiXhosa had more positive indices), education level (poorer education was synonymous with more positive threat indices), land use (wildlife ranching being the most negative) and land tenure (community respondents had more positive indices than private landowners). Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid. PMID:25822468

  15. Miocene Antarctic Terrestrial Realm

    Science.gov (United States)

    Ashworth, A. C.; Lewis, A.; Marchant, D. R.

    2009-12-01

    The discovery of several locations in the Transantarctic Mountains that contain macrofossils and pollen is transforming our understanding of late Cenozoic Antarctica. The most southerly location is on the Beardmore Glacier (85.1°S) about 500 km from the South Pole. The environment was an active glacial margin in which plants, insects and freshwater mollusks inhabited the sand and gravel bars and small lakes on an outwash plain. In addition to leaves and wood of dwarf Nothofagus (Southern Beech) shrubs, achenes of Ranunculus (Buttercup), in situ cushion growth forms of mosses and a vascular plant, the assemblages contains various exoskeletal parts of carabid and curculionid beetles and a cyclorrhaphan fly, the shells of freshwater bivalve and gastropod species and a fish tooth. Initially the deposits were assigned a Pliocene age (3.5 Ma) but a mid- to early Miocene age is more probable (c. 14 - 25 Ma) based on correlation of fossil pollen from the deposits with 39Ar/40Ar dated pollen assemblages from the McMurdo Dry Valleys locations. The oldest location within the Dry Valleys also involved an active ice margin but was part of a valley system that was completely deglaciated for intervals long enough for thick paleosols to develop. The Friis Hills fossil deposits of the Taylor Valley region (77.8°S) are at least 19.76 Ma based on the 39Ar/40Ar age of a volcanic ash bed. The valley floor during the non-glacial phases had poorly-drained soils and the extensive development of mossy mires. Wood and leaves of Nothofagus are abundant in lacustrine deposits. The silts of shallow fluvial channels contain abundant megaspores and spiky leaves of the aquatic lycopod Isoetes (Quillwort). Fossils of beetles are also present in these deposits. During the glacial phases, proglacial lakes were surrounded by dwarfed, deciduous Nothofagus shrubs. The youngest fossils recovered from the Dry Valleys are from the Olympus Range (77.5°S) with an age of 14.07 Ma. The environment was an

  16. Satellite Threat Warning and Attack Reporting

    Energy Technology Data Exchange (ETDEWEB)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  17. On the special status of "ego threats".

    Science.gov (United States)

    Schotte, D E

    1992-05-01

    This article comments on a recent article by Heatherton, Herman, and Polivy (1991) in which they suggest that ego threats are a prerequisite to affectively induced disinhibition of food intake in restrained eaters and current dieters. In contrast, the present review suggests that mood induction procedures that involve no apparent threat (e.g., viewing a frightening film) can also prompt disinhibition in restrained eaters. Thus, any mood induction procedure that does not directly physically threaten the S may disinhibit restrained eaters. It is concluded that recommendations to focus future research on ego threats are premature and may serve to obscure the mechanisms by which changes in affective state influence food intake in dieters. PMID:1507070

  18. Left-Wing Extremism: The Current Threat

    Energy Technology Data Exchange (ETDEWEB)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  19. 49 CFR 1540.203 - Security threat assessment.

    Science.gov (United States)

    2010-10-01

    ... check conducted by TSA. (2) A security threat assessment conducted under 49 CFR part 1572 for the... 49 Transportation 9 2010-10-01 2010-10-01 false Security threat assessment. 1540.203 Section 1540... Security Threat Assessments § 1540.203 Security threat assessment. (a) Each operator subject to...

  20. 49 CFR 1572.5 - Standards for security threat assessments.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Standards for security threat assessments. 1572.5... CREDENTIALING AND SECURITY THREAT ASSESSMENTS Procedures and General Standards § 1572.5 Standards for security threat assessments. (a) Standards. TSA determines that an applicant poses a security threat...

  1. Metal Poisoning: Threat and Management

    Directory of Open Access Journals (Sweden)

    SJS Flora

    2009-12-01

    Full Text Available Exposure to toxic metals remains a wide spread occupational and environmental problems in world. Due to their widespread use in human activities such as industry, agriculture and even as medicine numerous health risks may be associated with exposure to these substances. Lead, arsenic and cadmium generally interferes with a number of body functions such as the haematopoietic system, central nervous system (CNS, liver and kidneys. Over the past few decades there have been growing awareness and concern that the toxic biochemical and functional effects are occurring at lower level of metal exposure than those that produce overt clinical and pathological signs and symptoms. Despite many years of research we are still far from an effective treatment of chronic heavy metal poisoning. The main therapeutic option for chronic metal poisoning relies in chelation therapy. Chelating agents are capable of linking together metal ions to form complex structures which can be easily excreted from the body. They have been used clinically as antidotes for acute and chronic poisoning. 2, 3-dimercaprol (BAL has long been the mainstay of chelation therapy of lead or arsenic poisoning. Meso 2, 3, -dimercaptosuccinic acid (DMSA has been tried successfully in animals as well as in few cases of human lead or arsenic poisoning. However, one of the major disadvantages of chelation with DMSA has been its inability to remove heavy metal from the intracellular sites because of its lipophobic nature. Further, it does not provide protection in terms of clinical/ biochemical recovery. A new trend in chelation therapy has emerged to use combined treatment. This includes use of structurally different chelating agents or a combination of an antioxidant and a chelator to provide better clinical/biochemical recovery in addition to mobilization of heavy metal form intracellular sites. The present review article attempts to provide update information about the current strategies being

  2. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  3. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  4. Nash bargaining with a nondeterministic threat

    CERN Document Server

    Soileau, Kerry Michael

    2008-01-01

    We consider bargaining problems which involve two participants, with a nonempty closed, bounded convex bargaining set of points in the real plane representing all realizable bargains. We also assume that there is no definite threat or disagreement point which will provide the default bargain if the players cannot agree on some point in the bargaining set. However, there is a nondeterministic threat: if the players fail to agree on a bargain, one of them will be chosen at random with equal probability, and that chosen player will select any realizable bargain as the solution, subject to a reasonable restriction.

  5. Phytopharmacological overview of Tribulus terrestris

    OpenAIRE

    Saurabh Chhatre; Tanuja Nesari; Gauresh Somani; Divya Kanchan; Sadhana Sathaye

    2014-01-01

    Tribulus terrestris (family Zygophyllaceae), commonly known as Gokshur or Gokharu or puncture vine, has been used for a long time in both the Indian and Chinese systems of medicine for treatment of various kinds of diseases. Its various parts contain a variety of chemical constituents which are medicinally important, such as flavonoids, flavonol glycosides, steroidal saponins, and alkaloids. It has diuretic, aphrodisiac, antiurolithic, immunomodulatory, antidiabetic, absorption enhancing, hyp...

  6. Terrestrial atmosphere, water and astrobiology

    OpenAIRE

    Coradini M.; Brack A.

    2010-01-01

    Primitive life, defined as a chemical system capable to transfer its molecular information via self-replication and also capable to evolve, originated about 4 billion years ago from the processing of organic molecules by liquid water. Terrestrial atmosphere played a key role in the process by allowing the permanent presence of liquid water and by participating in the production of carbon-based molecules. Water molecules exhibit specific properties mainly due to a dense network of hydrogen bon...

  7. Spatial Vision in Bombus terrestris.

    Science.gov (United States)

    Chakravarthi, Aravin; Baird, Emily; Dacke, Marie; Kelber, Almut

    2016-01-01

    Bombus terrestris is one of the most commonly used insect models to investigate visually guided behavior and spatial vision in particular. Two fundamental measures of spatial vision are spatial resolution and contrast sensitivity. In this study, we report the threshold of spatial resolution in B. terrestris and characterize the contrast sensitivity function of the bumblebee visual system for a dual choice discrimination task. We trained bumblebees in a Y-maze experimental set-up to associate a vertical sinusoidal grating with a sucrose reward, and a horizontal grating with absence of a reward. Using a logistic psychometric function, we estimated a resolution threshold of 0.21 cycles deg(-1) of visual angle. This resolution is in the same range but slightly lower than that found in honeybees (Apis mellifera and A. cerana) and another bumblebee species (B. impatiens). We also found that the contrast sensitivity of B. terrestris was 1.57 for the spatial frequency 0.090 cycles deg(-1) and 1.26 for 0.18 cycles deg(-1). PMID:26912998

  8. Spatial vision in Bombus terrestris

    Directory of Open Access Journals (Sweden)

    Aravin eChakravarthi

    2016-02-01

    Full Text Available Bombus terrestris is one of the most commonly used insect models to investigate visually guided behavior and spatial vision in particular. Two fundamental measures of spatial vision are spatial resolution and contrast sensitivity. In this study, we report the threshold of spatial resolution in B. terrestris and characterize the contrast sensitivity function of the bumblebee visual system for a dual choice discrimination task. We trained bumblebees in a Y-maze experimental set-up to associate a vertical sinusoidal grating with a sucrose reward, and a horizontal grating with absence of a reward. Using a logistic psychometric function, we estimated a resolution threshold of 0.21 cycles deg-1 of visual angle. This resolution is in the same range but slightly lower than that found in honeybees (Apis mellifera and A. cerana and another bumblebee species (B. impatiens. We also found that the contrast sensitivity of B. terrestris was 1.57 for the spatial frequency 0.09 cycles deg-1 and 1.26. for 0.18 cycles deg-1.

  9. The Threat to Religious Liberties and the European Institutions

    Directory of Open Access Journals (Sweden)

    Roger Kiska

    2011-07-01

    Full Text Available The following article analyzes the 3 chief threats facing religious liberty today in Europe, namely: (1 hate speech legislation; (2 anti-discrimination laws; (3 attacks on parental rights. Concrete examples are given of offenses to religious freedom. Additionally, the black letter law is set out in each section with suggested action points for national governments. The Article also discusses the Lautsi v. Italy judgment of the European Court of Human Rights, explaining its importance and using it as evidence to establish the political nature of the Strasbourg based court.

  10. The role of warning behaviors in threat assessment: an exploration and suggested typology.

    Science.gov (United States)

    Reid Meloy, J; Hoffmann, Jens; Guldimann, Angela; James, David

    2012-01-01

    The concept of warning behaviors offers an additional perspective in threat assessment. Warning behaviors are acts which constitute evidence of increasing or accelerating risk. They are acute, dynamic, and particularly toxic changes in patterns of behavior which may aid in structuring a professional's judgment that an individual of concern now poses a threat - whether the actual target has been identified or not. They require an operational response. A typology of eight warning behaviors for assessing the threat of intended violence is proposed: pathway, fixation, identification, novel aggression, energy burst, leakage, directly communicated threat, and last resort warning behaviors. Previous research on risk factors associated with such warning behaviors is reviewed, and examples of each warning behavior from various intended violence cases are presented, including public figure assassination, adolescent and adult mass murder, corporate celebrity stalking, and both domestic and foreign acts of terrorism. Practical applications and future research into warning behaviors are suggested. PMID:22556034

  11. Ontogenetic shifts in terrestrial reliance of stream-dwelling brown trout

    Directory of Open Access Journals (Sweden)

    Javier Sánchez-Hernández

    2016-07-01

    Full Text Available This study focuses on terrestrial reliance of brown trout (Salmo trutta and compared it to the potential prey available (macrozoobenthos and drifting invertebrates in three temperate rivers (Galicia, NW Spain, with special emphasis on variations in terrestrial energy intake through the ontogeny of brown trout. Additionally, we paid particular attention to individual variation of terrestrial resource use within and between age classes. Prey items were grouped in four categories: i aquatic invertebrates; ii imagoes of aquatic invertebrates; iii terrestrial invertebrates; and iv fish prey. Next, energy composition was measured according to dry weight-energy equations for each individual in line with above-mentioned prey categories. Our findings illustrate that terrestrial invertebrates appeared to be scarce in the environment, whereas aquatic food resources were rather abundant and accessible. The use of terrestrial invertebrates tended to increase with age, but with a high degree of inter-individual variation in resource use. In fact, the individual reliance of brown trout on terrestrial invertebrates may vary considerably (between 0% and 76.9%. Besides, the frequency of terrestrial foragers, i.e., individuals with terrestrial invertebrates in their stomachs, increased with age, except in one population which had the maximum value in the age-2 class. The acquisition of terrestrial invertebrates thus appears to be a process strongly dependent upon the actual food availability in the environment, but with a high degree of individual variance in resource use within the same age class. Finally, we discuss that terrestrial invertebrates may largely contribute to cover the energy intake of the species, highlighting the interface between terrestrial and aquatic ecosystems, and thereby the importance of riparian canopy cover as a key factor for food supply of stream-dwelling salmonids species.

  12. Defensive activation to (un)predictable interoceptive threat: The NPU respiratory threat test (NPUr).

    Science.gov (United States)

    Schroijen, Mathias; Fantoni, Simona; Rivera, Carmen; Vervliet, Bram; Schruers, Koen; van den Bergh, Omer; van Diest, Ilse

    2016-06-01

    Potentially life-threatening interoceptive sensations easily engage the behavioral defensive system. Resulting fear and anxiety toward interoceptive threat are functionally distinct states that are hypothesized to play a prominent role in the etiology of panic disorder. The present study aimed to investigate whether fear- and anxiety-potentiated startle responses occur to predictable and unpredictable interoceptive threat, respectively. Therefore, we modified the NPU threat test (Schmitz & Grillon, ) and replaced the aversive electrocutaneous stimulus with an aversive interoceptive stimulus (a breathing occlusion, making it briefly impossible to breathe). Healthy participants (N = 48) underwent three instructed conditions. A visual cue signaled the occlusion in the predictable condition (P), whereas another cue was unrelated to the occurrence of the occlusion in the unpredictable condition (U). The safe condition (N) also had a visual cue, but no occlusion. Both fear- and anxiety-potentiated startle blink responses were observed in response to predictable and unpredictable respiratory threat, respectively. The current study presents and validates the NPU respiratory threat test (NPUr) as an ecologically valid paradigm to study both anxiety and fear in response to a panic-relevant interoceptive threat. The paradigm allows future testing of contextual generalization, investigation of different clinical groups, and more explicit comparisons of defensive responding to interoceptive versus exteroceptive threats.

  13. Global threat to agriculture from invasive species

    Science.gov (United States)

    Paini, Dean R.; Sheppard, Andy W.; Cook, David C.; De Barro, Paul J.; Worner, Susan P.; Thomas, Matthew B.

    2016-01-01

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread. PMID:27325781

  14. Threats and Vulnerabilities of RFID and Beyond

    NARCIS (Netherlands)

    Hoepman, J.H.; Veugen, P.J.M.

    2009-01-01

    This chapter discusses both security and privacy threats to RFID systems, in a balanced way. We first outline the general architecture of an RFID system, the stakeholders managing the different components, and identify the specific properties of RFID systems relevant for privacy and security. We the

  15. Avoidance: From threat encounter to action execution

    NARCIS (Netherlands)

    I. Arnaudova

    2015-01-01

    Every day we encounter many threats to survival: a car speeding on a small street or an angry neighbor carrying an axe. Mostly, people go through their days not worrying that their chance of survival might be small. They avoid many dangers without even thinking about them (e.g., looking at both side

  16. Extensible threat taxonomy for critical infrastructures

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Nieuwenhuijs, A.H.

    2008-01-01

    The European Union-sponsored project Vital Infrastructure Threats and Assurance (VITA) has the objective of exploring and showing new paths in Critical Infrastructure Protection (CIP) R&D. This paper describes one of VITA’s results: the idea and the development of a novel extensible and generic thre

  17. Global threat to agriculture from invasive species.

    Science.gov (United States)

    Paini, Dean R; Sheppard, Andy W; Cook, David C; De Barro, Paul J; Worner, Susan P; Thomas, Matthew B

    2016-07-01

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread. PMID:27325781

  18. Diversity, Racial Threat and Metropolitan Housing Segregation

    Science.gov (United States)

    DeFina, Robert; Hannon, Lance

    2009-01-01

    Previous studies have shown that as the percent black or percent Hispanic grows, that group's residential segregation from whites tends to increase as well. Typically, these findings are explained in terms of white discriminatory reaction to the perceived threat associated with minority population growth. The present analysis examines whether…

  19. The silent threat of low genetic diversity

    Science.gov (United States)

    Hunter, Margaret E.

    2013-01-01

    Across the Caribbean, protected coastal waters have served as primary feeding and breeding grounds for the endangered Antillean manatee. Unfortunately, these same coastal waters are also a popular “habitat” for humans. In the past, the overlap between human and manatee habitat allowed for manatee hunting and threatened the survival of these gentle marine mammals. Today, however, threats are much more inadvertent and are often related to coastal development, degraded habitats and boat strikes. In the state of Florida, decades of research on the species’ biological needs have helped conservationists address threats to its survival. For example, low wake zones and boater education have protected manatees from boat strikes, and many of their critical winter refuges are now protected. The Florida population has grown steadily, thus increasing from approximately 1,200 in 1991 to more than 5,000 in 2010. It is conceivable that in Florida manatees may one day be reclassified as “threatened” rather than “endangered.” Yet, in other parts of the Caribbean, threats still loom. This includes small, isolated manatee populations found on islands that can be more susceptible to extinction and lack of genetic diversity. To ensure the species’ long-term viability, scientists have turned their sights to the overall population dynamics of manatees throughout the Caribbean. Molecular genetics has provided new insights into long-term threats the species faces. Fortunately, the emerging field of conservation genetics provides managers with tools and strategies for protecting the species’ long-term viability.

  20. The Missing Piece in Threat Intelligence

    Directory of Open Access Journals (Sweden)

    Frank Denis

    2016-03-01

    Full Text Available Common systems for sharing intelligence on security threats have not been designed to efficiently process feedback from infrastructure providers. In order to fill this gap, we introduce DIP, a new description language to expose changes being made on a network that are relevant to security research and prevention.

  1. Comparative Climatology of Terrestrial Planets

    Science.gov (United States)

    Mackwell, Stephen J.; Simon-Miller, Amy A.; Harder, Jerald W.; Bullock, Mark A.

    Public awareness of climate change on Earth is currently very high, promoting significant interest in atmospheric processes. We are fortunate to live in an era where it is possible to study the climates of many planets, including our own, using spacecraft and groundbased observations as well as advanced computational power that allows detailed modeling. Planetary atmospheric dynamics and structure are all governed by the same basic physics. Thus differences in the input variables (such as composition, internal structure, and solar radiation) among the known planets provide a broad suite of natural laboratory settings for gaining new understanding of these physical processes and their outcomes. Diverse planetary settings provide insightful comparisons to atmospheric processes and feedbacks on Earth, allowing a greater understanding of the driving forces and external influences on our own planetary climate. They also inform us in our search for habitable environments on planets orbiting distant stars, a topic that was a focus of Exoplanets, the preceding book in the University of Arizona Press Space Sciences Series. Quite naturally, and perhaps inevitably, our fascination with climate is largely driven toward investigating the interplay between the early development of life and the presence of a suitable planetary climate. Our understanding of how habitable planets come to be begins with the worlds closest to home. Venus, Earth, and Mars differ only modestly in their mass and distance from the Sun, yet their current climates could scarcely be more divergent. Our purpose for this book is to set forth the foundations for this emerging science and to bring to the forefront our current understanding of atmospheric formation and climate evolution. Although there is significant comparison to be made to atmospheric processes on nonterrestrial planets in our solar system — the gas and ice giants — here we focus on the terrestrial planets, leaving even broader comparisons

  2. Insider Threat - Material Control and Accountability Mitigation

    Energy Technology Data Exchange (ETDEWEB)

    Powell, Danny H [ORNL; Elwood Jr, Robert H [ORNL; Roche, Charles T [ORNL

    2011-01-01

    The technical objectives of nuclear safeguards are (1) the timely detection of diversion of significant quantities of nuclear material from peaceful uses to the manufacture of nuclear weapons or other nuclear explosive devices or for purposes unknown and (2) the deterrence of such diversion by the risk of early detection. The safeguards and security program must address both outsider threats and insider threats. Outsider threats are primarily addressed by the physical protection system. Insider threats can be any level of personnel at the site including passive or active insiders that could attempt protracted or abrupt diversion. This could occur by an individual acting alone or by collusion between an individual with material control and accountability (MC&A) responsibilities and another individual who has responsibility or control within both the physical protection and the MC&A systems. The insider threat is one that must be understood and incorporated into the safeguards posture. There have been more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. The insider has access, authority, and knowledge, as well as a set of attributes, that make him/her difficult to detect. An integrated safeguards program is designed as a defense-in-depth system that seeks to prevent the unauthorized removal of nuclear material, to provide early detection of any unauthorized attempt to remove nuclear material, and to rapidly respond to any attempted removal of nuclear material. The program is also designed to support protection against sabotage, espionage, unauthorized access, compromise, and other hostile acts that may cause unacceptable adverse impacts on national security, program continuity, the health and safety of employees, the public, or the environment. Nuclear MC&A play an essential role in the capabilities of an integrated safeguards system to deter and detect theft or diversion of nuclear material. An integrated safeguards system with

  3. Cosmic bombardment V: Threat object-dispersing approaches to active planetary defense

    Energy Technology Data Exchange (ETDEWEB)

    Teller, E.; Wood, L. [Stanford Univ., CA (United States). Hoover Institution on War, Revolution and Peace]|[Lawrence Livermore National Lab., CA (United States); Ishikawa, M. [Stanford Univ., CA (United States). Dept. of Aeronautics and Astronautics]|[Lawrence Livermore National Lab., CA (United States); Hyde, R. [Lawrence Livermore National Lab., CA (United States)

    1995-05-24

    Earth-impacting comets and asteroids with diameters {approx}0.03 - 10 km pose the greatest threats to the terrestrial biosphere in terms of impact frequency-weighted impact consequences, and thus are of most concern to designers of active planetary defenses. Specific gravitational binding energies of such objects range from 10{sup -7} to 10{sup -2} J/gm, and are small compared with the specific energies of 1x10{sup 3} to 3x10{sup 3} J/gm required to vaporize objects of typical composition or the specific energies required to pulverize them, which are 10{sup -1} to 10 J/gm. All of these are small compared to the specific kinetic energy of these objects in the Earth- centered frame, which is 2x10{sup 5} to 2x10{sup 6} J/gm. The prospect naturally arises of negating all such threats by deflecting, pulverizing or vaporizing the objects. Pulverization-with-dispersal is an attractive option of reasonable defensive robustness. Examples of such equipments - which employ no explosives of any type - are given. Vaporization is the maximally robust defensive option, and may be invoked to negate threat objects not observed until little time is left until Earth-strike, and pulverization-with-dispersal has proven inadequate. Physically larger threats may be vaporized with nuclear explosives. No contemporary technical means of any kind appear capable of directly dispersing the -100 km diameter scale Charon- class cometary objects recently observed in the outer solar system, although such objects may be deflected to defensively useful extents. Means of implementing defenses of each of these types are proposed for specificity, and areas for optimization noted. Biospheric impacts of threat object debris are briefly considered, for bounding purposes. Experiments are suggested on cometary and asteroidal objects.

  4. Groundwater and Terrestrial Water Storage

    Science.gov (United States)

    Rodell, Matthew; Chambers, Don P.; Famiglietti, James S.

    2014-01-01

    Terrestrial water storage (TWS) comprises groundwater, soil moisture, surface water, snow,and ice. Groundwater typically varies more slowly than the other TWS components because itis not in direct contact with the atmosphere, but often it has a larger range of variability onmultiannual timescales (Rodell and Famiglietti, 2001; Alley et al., 2002). In situ groundwaterdata are only archived and made available by a few countries. However, monthly TWSvariations observed by the Gravity Recovery and Climate Experiment (GRACE; Tapley et al.,2004) satellite mission, which launched in 2002, are a reasonable proxy for unconfinedgroundwater at climatic scales.

  5. Dependency conflict, marital threat, and alcohol consumption in a middle-aged sample.

    Science.gov (United States)

    Schwarz, J C; Wheeler, D S

    1992-09-01

    The hypothesis that dependency conflict is associated with higher levels of alcohol consumption when dependency needs are threatened or thwarted was tested with a sample of 672 middle-aged, married adults with college-age children. The subjects' current level of alcohol consumption was predicted based on the present level of threat to the marital relationship (assessed by reports from several family members) and on indices of dependency need and inhibition of dependent behavior estimated from sibship size, sibship density, and sibling position. A multiple regression analysis yielded a significant two-way interaction (p less than .05) between marital threat and subject sex, and a significant three-way interaction of dependency need, inhibition of dependent behavior, and marital threat. High marital threat was associated with higher levels of alcohol consumption in men and slightly lower levels of alcohol consumption in women. Additionally, when dependency need was high, alcohol consumption was generally low, except when both inhibition of dependent behavior and marital threat were high. However, when dependency need was low, the highest alcohol consumption score occurred when marital threat was low and inhibition was high.

  6. Securing Infrastructure from High Explosive Threats

    Energy Technology Data Exchange (ETDEWEB)

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  7. Detecting underwater improvised explosive threats (DUIET)

    Science.gov (United States)

    Feeley, Terry

    2010-04-01

    Improvised Explosive Devices (IEDs) have presented a major threat in the wars in Afghanistan and Iraq. These devices are powerful homemade land mines that can be small and easily hidden near roadsides. They are then remotely detonated when Coalition Forces pass by either singly or in convoys. Their rapid detection, classification and destruction is key to the safety of troops in the area. These land based bombs will have an analogue in the underwater theater especially in ports, lakes, rivers and streams. These devices may be used against Americans on American soil as an element of the global war on terrorism (GWOT) Rapid detection and classification of underwater improvised explosive devices (UIED) is critical to protecting innocent lives and maintaining the day to day flow of commerce. This paper will discuss a strategy and tool set to deal with this potential threat.

  8. Dietary characterization of terrestrial mammals.

    Science.gov (United States)

    Pineda-Munoz, Silvia; Alroy, John

    2014-08-22

    Understanding the feeding behaviour of the species that make up any ecosystem is essential for designing further research. Mammals have been studied intensively, but the criteria used for classifying their diets are far from being standardized. We built a database summarizing the dietary preferences of terrestrial mammals using published data regarding their stomach contents. We performed multivariate analyses in order to set up a standardized classification scheme. Ideally, food consumption percentages should be used instead of qualitative classifications. However, when highly detailed information is not available we propose classifying animals based on their main feeding resources. They should be classified as generalists when none of the feeding resources constitute over 50% of the diet. The term 'omnivore' should be avoided because it does not communicate all the complexity inherent to food choice. Moreover, the so-called omnivore diets actually involve several distinctive adaptations. Our dataset shows that terrestrial mammals are generally highly specialized and that some degree of food mixing may even be required for most species.

  9. The Laboratory for Terrestrial Physics

    Science.gov (United States)

    2003-01-01

    The Laboratory for Terrestrial Physics is dedicated to the advancement of knowledge in Earth and planetary science, by conducting innovative research using space technology. The Laboratory's mission and activities support the work and new initiatives at NASA's Goddard Space Flight Center (GSFC). The Laboratory's success contributes to the Earth Science Directorate as a national resource for studies of Earth from Space. The Laboratory is part of the Earth Science Directorate based at the GSFC in Greenbelt, MD. The Directorate itself is comprised of the Global Change Data Center (GCDC), the Space Data and Computing Division (SDCD), and four science Laboratories, including Laboratory for Terrestrial Physics, Laboratory for Atmospheres, and Laboratory for Hydrospheric Processes all in Greenbelt, MD. The fourth research organization, Goddard Institute for Space Studies (GISS), is in New York, NY. Relevant to NASA's Strategic Plan, the Laboratory ensures that all work undertaken and completed is within the vision of GSFC. The philosophy of the Laboratory is to balance the completion of near term goals, while building on the Laboratory's achievements as a foundation for the scientific challenges in the future.

  10. Nonproliferation, Nuclear Security, and the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Balatsky, Galya I. [Los Alamos National Laboratory; Duggan, Ruth [SNL

    2012-07-12

    Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

  11. Community Changes Address Common Health Threat

    Centers for Disease Control (CDC) Podcasts

    2013-09-30

    This podcast helps residents living in multiunit housing, like apartments and condos, understand the threat of secondhand smoke. It also helps residents understand what steps they can take to breathe a little easier if involuntarily exposed to secondhand smoke.  Created: 9/30/2013 by Division of Community Health, National Center for Chronic Disease Prevention and Health Promotion.   Date Released: 9/30/2013.

  12. Handsets Malware Threats and Facing Techniques

    CERN Document Server

    Elfattah, Marwa M A; Sarhan, Ebada

    2012-01-01

    Nowadays, mobile handsets combine the functionality of mobile phones and PDAs. Unfortunately, mobile handsets development process has been driven by market demand, focusing on new features and neglecting security. So, it is imperative to study the existing challenges that facing the mobile handsets threat containment process, and the different techniques and methodologies that used to face those challenges and contain the mobile handsets malwares. This paper also presents a new approach to group the different malware containment systems according to their typologies.

  13. Avian influenza: an emerging pandemic threat.

    Science.gov (United States)

    Jin, Xian Wen; Mossad, Sherif B

    2005-12-01

    While we are facing the threat of an emerging pandemic from the current avian flu outbreak in Asia, we have learned important traits of the virus responsible for the 1918 Spanish influenza pandemic that made it so deadly. By using stockpiled antiviral drugs effectively and developing an effective vaccine, we can be in a better position than ever to mitigate the global impact of an avian influenza pandemic. PMID:16392727

  14. Bot armies as threats to network security

    Science.gov (United States)

    Banks, Sheila B.; Stytz, Martin R.

    2007-04-01

    "Botnets", or "bot armies", are large groups of remotely controlled malicious software. Bot armies pose one of the most serious security threats to all networks. Botnets, remotely controlled and operated by botmasters or botherders, can launch massive denial of service attacks, multiple penetration attacks, or any other malicious network activity on a massive scale. While bot army activity has, in the past, been limited to fraud, blackmail, and other forms of criminal activity, their potential for causing large-scale damage to the entire internet; for launching large-scale, coordinated attacks on government computers and networks; and for large-scale, coordinated data gathering from thousands of users and computers on any network has been underestimated. This paper will not discuss how to build bots but the threats they pose. In a "botnet" or "bot army", computers can be used to spread spam, launch denial-of-service attacks against Web sites, conduct fraudulent activities, and prevent authorized network traffic from traversing the network. In this paper we discuss botnets and the technologies that underlie this threat to network and computer security. The first section motivates the need for improved protection against botnets, their technologies, and for further research about botnets. The second contains background information about bot armies and their key underlying technologies. The third section presents a discussion of the types of attacks that botnets can conduct and potential defenses against them. The fourth section contains a summary and suggestions for future research and development.

  15. Mere effort and stereotype threat performance effects.

    Science.gov (United States)

    Jamieson, Jeremy P; Harkins, Stephen G

    2007-10-01

    Although the fact that stereotype threat impacts performance is well established, the underlying process(es) is(are) not clear. Recently, T. Schmader and M. Johns (2003) argued for a working memory interference account, which proposes that performance suffers because cognitive resources are expended on processing information associated with negative stereotypes. The antisaccade task provides a vehicle to test this account because optimal performance requires working memory resources to inhibit the tendency to look at an irrelevant, peripheral cue (the prepotent response) and to generate volitional saccades to the target. If stereotype threat occupies working memory resources, then the ability to inhibit the prepotent response and to launch volitional saccades will be impaired, and performance will suffer. In contrast, S. Harkins's (2006) mere effort account argues that stereotype threat participants are motivated to perform well, which potentiates the prepotent response, but also leads to efforts to counter this tendency if participants recognize that the response is incorrect, know the correct response, and have the opportunity to make it. Results from 4 experiments support the mere effort but not the working memory interference account.

  16. Asymmetric threat data mining and knowledge discovery

    Science.gov (United States)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  17. High-angular Resolution Laser Threat Warner

    Directory of Open Access Journals (Sweden)

    Sushil Kumar

    2007-07-01

    Full Text Available In this paper, the design and development aspects of a high-angular resolution laser-threat Warner developed at the Laser Science & Technology Centre (LASTEC, Delhi are presented. It describes a high-angular resolution laser-threat warner capable of giving warning with a resolution of i 3" when it is exposed to laser radiation from visible and near-IR pulsed solid-state laser source. It has a field of view of 90' in the azimuth direction, whereas the elevation coverage is between -5" and + 25". It is capable of handling multiple types of laser threats covering wavelength from 400 nm to 1100 nm and has an operational range of 4 km for a Q-switched laser source energy (10 ns of 10 mJ/pulse and output beam divergence of 1 mrad. The paper also describes its simulated evaluation process and field-testing which it has undergone. The result of field-testing confirms that it meets all its performance specifications mentioned above.

  18. By land or by sea: a modified C-start motor pattern drives the terrestrial tail-flip.

    Science.gov (United States)

    Perlman, Benjamin M; Ashley-Ross, Miriam A

    2016-06-15

    Aquatic C-start escape responses in teleost fishes are driven by a well-studied network of reticulospinal neurons that produce a motor pattern of simultaneous contraction of axial muscle on the side of the body opposite the threatening stimulus, bending the fish into the characteristic C shape, followed by a traveling wave of muscle contraction on the contralateral side that moves the fish away from the threat. Superficially, the kinematics of the terrestrial tail-flip resemble the C-start, with the anterior body rolling up and over the tail into a tight C shape, followed by straightening as the fish launches off of the caudal peduncle into ballistic flight. We asked whether similar motor control is used for both behaviors in the amphibious mangrove rivulus, Kryptolebias marmoratus Fine-wire bipolar electrodes were percutaneously inserted into repeatable paired axial locations in five individual fish. Electromyograms synchronized with high-speed video were made of aquatic C-starts, immediately followed by terrestrial tail-flips. Tail-flips took longer to complete than aquatic escapes; correspondingly, muscles were activated for longer durations on land. In the tail-flip, activity was seen in contralateral posterior axial muscle for an extended period of time during the formation of the C shape, likely to press the caudal peduncle against the ground in preparation for launch. Tail-flips thus appear to be produced by modification of the motor pattern driving the aquatic C-start, with differences consistent with the additional requirement of overcoming gravity.

  19. Near Earth Asteroid Characteristics for Asteroid Threat Assessment

    Science.gov (United States)

    Dotson, J.; Wooden, D. H.; Bryson, K.; Ostrowski, D. R.

    2015-12-01

    Information about the physical characteristics of Near Earth Asteroids (NEAs) is needed to model behavior during atmospheric entry, to assess the risk of an impact, and to model possible mitigation techniques. The intrinsic properties of interest to entry and mitigation modelers, however, rarely are directly measureable. Instead we measure other properties and infer the intrinsic physical properties, so determining the complete set of characteristics of interest is far from straightforward. In addition, for the majority of NEAs, only the basic measurements exist so often properties must be inferred from statistics of the population of more completely characterized objects. We will provide an assessment of the current state of knowledge about the physical characteristics of importance to asteroid threat assessment. In addition, an ongoing effort to collate NEA characteristics into a readily accessible database for use by the planetary defense community will be discussed.

  20. Preventing radiological threat in the Republic of Azerbaijan

    International Nuclear Information System (INIS)

    Full text: Azerbaijan is a developing and transit country in the Caucasus, connecting East and West. In addition, Azerbaijan is neighboring countries with pronounced political instability, some of which have extensive nuclear infrastructure or try to develop nuclear infrastructure. Furthermore, in the recent past fundamentalist religious terrorism has taken roots in some of these countries. Therefore, in spite of the fact that the Republic of Azerbaijan has no nuclear facilities or nuclear materials in its own territory, it could be interesting for terrorist groups trying to develop a crude radiological dispersal device using radioactive sources that are widely used in everyday life especially in such areas as oil industry, medicine, agriculture and scientific researches. The issues of reduction and prevention of both radiological and nuclear terrorism threat are one of the main global challenges around the world. The Republic of Azerbaijan is a part of world community and so we are concerned that radioactive sources used for peaceful applications could be stolen by the terrorist groups and used in the development of radiological dispersal devices sometimes referred to as a 'dirty bomb'. It is obvious that using highly radioactive materials in radiological dispersal devices could be very disruptive to society, causing panic, environmental contamination, and large financial losses. One of the ways for reduction and prevention of radiological threat for the countries like Azerbaijan with underdeveloped nuclear security and radiation safety infrastructure is closely participation in the international cooperation programs. As an example of such cooperation, I would like to present the United States Department of Energy's International Radiological Threat Reduction (IRTR) Program. Good progress has made in the field of radiological security within the framework of this program that was started 2003. Actually, in comparison with any IAEA programs, the progress reached by

  1. Cyber Terrorism demands a Global Risks and Threats Strategic Management

    International Nuclear Information System (INIS)

    The world is in the third wave of development, which is digital managed and networked. Information, which creates the knowledge is transferring thorough the Internet by exponential function. The rapid advancement of the computer technology has a great influence over the development of the critical information infrastructure, thus changing the safety environment and the national values and interests. This advancement produces threats and risks from computer perspective which are sublimated in different forms of international terrorism and particularly in cyber terrorism. The main aim of this paper is based on a thorough analysis of what is scientifically known and practiced when nowadays critical information infrastructure is in the focus of the cyber terrorism. The rapid IT development demands changes in the strategic management focus. As a result of a time-consuming theoretical and empirical research this paper suggests a methodology for strategic managing of: threats, risks and vulnerabilities. The proposed methodology is seen as a mean to increase the human security conscious in every sense of the word, and to promote the need for rules, procedures and standards establishment from the aspect of the strategic management in the new information epoch concerning. In addition, through a scientific discourse, a short attempt is made to relate Macedonian reality with the phenomenon mentioned above. The most fundamental set phrase is that the efficiency and promptly made decisions during strategic planning are a projection of the systematic organization of functions and models for managing the risks and threats of the critical information infrastructure. Hence, this paper could be seen as a perspective when taking in consideration the regional strategic management, and the cyber space vital functioning. (author)

  2. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    Science.gov (United States)

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures.

  3. Zika Threat Calls for Extra Mosquito Protection This Summer

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_159168.html Zika Threat Calls for Extra Mosquito Protection This Summer ... THURSDAY, June 2, 2016 (HealthDay News) -- With the Zika threat growing in the United States, people need ...

  4. Introduction to Administrative Programs that Mitigate the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  5. Threat Modeling-Oriented Attack Path Evaluating Algorithm

    Institute of Scientific and Technical Information of China (English)

    LI Xiaohong; LIU Ran; FENG Zhiyong; HE Ke

    2009-01-01

    In order to evaluate all attack paths in a threat tree,based on threat modeling theory,a weight distribution algorithm of the root node in a threat tree is designed,which computes threat coefficients of leaf nodes in two ways including threat occurring possibility and the degree of damage.Besides,an algorithm of searching attack path was also obtained in accordence with its definition.Finally,an attack path evaluation system was implemented which can output the threat coefficients of the leaf nodes in a target threat tree,the weight distribution information,and the attack paths.An example threat tree is given to verify the effectiveness of the algorithms.

  6. Synergistic Antimicrobial Effect of Tribulus terrestris and Bitter Almond Extracts

    OpenAIRE

    Hamid Abtahi; Ali Ghazavi; Masode Karimi

    2014-01-01

    Background: The antimicrobial effects of the extracts of different kinds of plants have been demonstrated in several studies. However, no study has been conducted so far on the synergistic effects of two herbal extracts on their germicidal effects. In this study, in addition to antibacterial effects of the aqueous, methanol or ethanol extracts of Tribulus terrestris and bitter almond on some bacteria, the synergistic effects of the extracts of these two plants were also evaluated. Material...

  7. Correlations between Lumbricus terrestris survival and gut microbiota

    OpenAIRE

    Rudi, Knut; Strætkvern, Knut Olav

    2012-01-01

    Background: The interplay between diet, gut bacteria and health still remain enigmatic. Here, we addressed this issue through the investigation of the effect of crystalline cellulose on the earthworm Lumbricus terrestris gut microbiota composition and survival. Methods: Earthworm gut contents were analyzed after 14 days of feeding using a mixed 16S rRNA gene sequencing approach, in addition to direct measurements of cellulase activity. The survival of earthworms was followed each week for 17 ...

  8. Use of multisensor fusion technology to meet the challenges of emerging EO and RF threats to a combat aircraft

    Science.gov (United States)

    Shukla, Arvind K.; Parthasarathy, T.; Rao, P. N. A. P.

    2003-04-01

    The pilot on-board a combat aircraft encounters during any mission a dynamically varying threat environment of diverse EO and RF threats. Different sensors are carried on-board the aircraft to combat these threats. However, these sensors have their own limitations and no single sensor is able to perform in all kinds of situations. In addition, the technological advances in the threat scenario - in terms of higher speeds, small signatures and multimode guidance - and increased complex threats in the battlefield leading to generation of large amount of data input to the pilot make his decision making task very difficult due to increased workload. These challenges can be efficiently handled by deployment of a system on-board the aircraft with a comprehensive goal of autonomous target detection and tracking, situation and threat assessment and decision making based on multi-sensor data fusion techniques. In this paper, major emerging EO and RF threats for a combat aircraft and some important EO and RF sensors on-board the aircraft have been discussed. A design approach for the development of a multi-sensor data fusion system for a combat aircraft to provide better threat assessment than that provided by any single stand alone sensor has also been presented.

  9. Threat model framework and methodology for personal networks (PNs)

    DEFF Research Database (Denmark)

    Prasad, Neeli R.

    2007-01-01

    is to give a structured, convenient approach for building threat models. A framework for the threat model is presented with a list of requirements for methodology. The methodology will be applied to build a threat model for Personal Networks. Practical tools like UML sequence diagrams and attack trees have...

  10. 49 CFR 1540.205 - Procedures for security threat assessment.

    Science.gov (United States)

    2010-10-01

    ... TSA determines that the applicant meets the security threat assessment standards in 49 CFR 1540.201(c... the applicant does not meet the security threat assessment standards in 49 CFR 1540.201(c). The... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  11. 77 FR 1672 - Threat Reduction Advisory Committee; Notice of Meeting

    Science.gov (United States)

    2012-01-11

    ... of the Secretary Threat Reduction Advisory Committee; Notice of Meeting AGENCY: Department of Defense... Department of Defense announces the following Federal advisory committee meeting of the Threat Reduction.... William Hostyn, GS-15, DoD, Defense Threat Reduction Agency/SP-ACP, 8725 John J. Kingman Road, MS...

  12. 77 FR 27208 - Renewal of Threat Reduction Advisory Committee

    Science.gov (United States)

    2012-05-09

    ... of the Secretary Renewal of Threat Reduction Advisory Committee AGENCY: DoD. ACTION: Renewal of...), the Department of Defense gives notice that it is renewing the charter for the Threat Reduction... Biological Defense Programs), independent advice and recommendations on: a. Reducing the threat to the...

  13. 75 FR 30002 - Federal Advisory Committee; Threat Reduction Advisory Committee

    Science.gov (United States)

    2010-05-28

    ... Office of the Secretary Federal Advisory Committee; Threat Reduction Advisory Committee AGENCY... the charter for the Threat Reduction Advisory Committee (hereafter referred to as the Committee). FOR... Acquisition, Technology and Logistics and the Director of the Defense Threat Reduction Agency on the...

  14. Potential and Actual Terrestrial Rabies Exposures in People and Domestic Animals, Upstate South Carolina, 1994–2004: A Surveillance Study

    OpenAIRE

    Foppa Ivo M; Goolsby W David; Roseveare Catherine W

    2009-01-01

    Abstract Background Although there has been a reduction of rabies in pets and domestic animals during recent decades in the United States, rabies remains enzootic among bats and several species of terrestrial wildlife. Spillover transmission of wildlife rabies to domestic animals therefore remains a public health threat Methods Retrospective analysis of surveillance data of reported animal incidents (bites, scratches, mucous membrane contacts) from South Carolina, 1995 to 2003, was performed ...

  15. How to deal with the Radiological Dispersal Device (RDD) threat

    International Nuclear Information System (INIS)

    In the United States of America, the IAEA's Code of Conduct on the Safety and Security of Radioactive Sources (Code of Conduct) and RS-G-1.9, Categorization of Radioactive Sources, provide a basis for risk informing both safety and security actions to protect against the threat of radiological dispersal devices (RDDs). The US Government, States, and the private and public sectors are working to address a broad range of issues for reducing RDD risk, in a consistent manner, across multi-jurisdictional authorities. Key Nuclear Regulatory Commission safety and security actions for protection against RDDs and implementation of the key elements of the Code of Conduct include developing and implementing increased controls for risk significant radioactive material, enhancing import/export protocols and establishing a national source registry, known as the National Source Tracking System. Challenges arise in coordinating a national threat policy and consequences of concern and implementing protective strategies that balance safety, security and response as well as sharing burdens across diverse operational modes and overlapping regulatory responsibilities. The Nuclear Regulatory Commission participates in several collaborative initiatives with the Department of Homeland Security (DHS) to achieve consistency in the protection and response to national threats. The National Infrastructure Protection Plan describes the integrated activities needed to protect the nation's critical infrastructure/key resources, including protection from an RDD attack. In addition, the National Response Plan provides the protocols for coordinating response to nuclear or radiological incidents. In January 2006, the DHS issued its draft Application of Protective Action Guides for Radiological Dispersal Devices and Improvised Nuclear Device Incidents, which was developed within the Government in coordination with State and local agencies. The Government continues to work with State and local

  16. Identification of threats using linguistics-based knowledge extraction.

    Energy Technology Data Exchange (ETDEWEB)

    Chew, Peter A.

    2008-09-01

    One of the challenges increasingly facing intelligence analysts, along with professionals in many other fields, is the vast amount of data which needs to be reviewed and converted into meaningful information, and ultimately into rational, wise decisions by policy makers. The advent of the world wide web (WWW) has magnified this challenge. A key hypothesis which has guided us is that threats come from ideas (or ideology), and ideas are almost always put into writing before the threats materialize. While in the past the 'writing' might have taken the form of pamphlets or books, today's medium of choice is the WWW, precisely because it is a decentralized, flexible, and low-cost method of reaching a wide audience. However, a factor which complicates matters for the analyst is that material published on the WWW may be in any of a large number of languages. In 'Identification of Threats Using Linguistics-Based Knowledge Extraction', we have sought to use Latent Semantic Analysis (LSA) and other similar text analysis techniques to map documents from the WWW, in whatever language they were originally written, to a common language-independent vector-based representation. This then opens up a number of possibilities. First, similar documents can be found across language boundaries. Secondly, a set of documents in multiple languages can be visualized in a graphical representation. These alone offer potentially useful tools and capabilities to the intelligence analyst whose knowledge of foreign languages may be limited. Finally, we can test the over-arching hypothesis--that ideology, and more specifically ideology which represents a threat, can be detected solely from the words which express the ideology--by using the vector-based representation of documents to predict additional features (such as the ideology) within a framework based on supervised learning. In this report, we present the results of a three-year project of the same name. We believe

  17. Phytopharmacological overview of Tribulus terrestris.

    Science.gov (United States)

    Chhatre, Saurabh; Nesari, Tanuja; Somani, Gauresh; Kanchan, Divya; Sathaye, Sadhana

    2014-01-01

    Tribulus terrestris (family Zygophyllaceae), commonly known as Gokshur or Gokharu or puncture vine, has been used for a long time in both the Indian and Chinese systems of medicine for treatment of various kinds of diseases. Its various parts contain a variety of chemical constituents which are medicinally important, such as flavonoids, flavonol glycosides, steroidal saponins, and alkaloids. It has diuretic, aphrodisiac, antiurolithic, immunomodulatory, antidiabetic, absorption enhancing, hypolipidemic, cardiotonic, central nervous system, hepatoprotective, anti-inflammatory, analgesic, antispasmodic, anticancer, antibacterial, anthelmintic, larvicidal, and anticariogenic activities. For the last few decades or so, extensive research work has been done to prove its biological activities and the pharmacology of its extracts. The aim of this review is to create a database for further investigations of the discovered phytochemical and pharmacological properties of this plant to promote research. This will help in confirmation of its traditional use along with its value-added utility, eventually leading to higher revenues from the plant. PMID:24600195

  18. Phytopharmacological overview of Tribulus terrestris

    Directory of Open Access Journals (Sweden)

    Saurabh Chhatre

    2014-01-01

    Full Text Available Tribulus terrestris (family Zygophyllaceae, commonly known as Gokshur or Gokharu or puncture vine, has been used for a long time in both the Indian and Chinese systems of medicine for treatment of various kinds of diseases. Its various parts contain a variety of chemical constituents which are medicinally important, such as flavonoids, flavonol glycosides, steroidal saponins, and alkaloids. It has diuretic, aphrodisiac, antiurolithic, immunomodulatory, antidiabetic, absorption enhancing, hypolipidemic, cardiotonic, central nervous system, hepatoprotective, anti-inflammatory, analgesic, antispasmodic, anticancer, antibacterial, anthelmintic, larvicidal, and anticariogenic activities. For the last few decades or so, extensive research work has been done to prove its biological activities and the pharmacology of its extracts. The aim of this review is to create a database for further investigations of the discovered phytochemical and pharmacological properties of this plant to promote research. This will help in confirmation of its traditional use along with its value-added utility, eventually leading to higher revenues from the plant.

  19. Possible climates on terrestrial exoplanets

    CERN Document Server

    Forget, Francois

    2013-01-01

    What kind of environment may exist on terrestrial planets around other stars? In spite of the lack of direct observations, it may not be premature to speculate on exoplanetary climates, for instance to optimize future telescopic observations, or to assess the probability of habitable worlds. To first order, climate primarily depends on 1) The atmospheric composition and the volatile inventory; 2) The incident stellar flux; 3) The tidal evolution of the planetary spin, which can notably lock a planet with a permanent night side. The atmospheric composition and mass depends on complex processes which are difficult to model: origins of volatile, atmospheric escape, geochemistry, photochemistry. We discuss physical constraints which can help us to speculate on the possible type of atmosphere, depending on the planet size, its final distance for its star and the star type. Assuming that the atmosphere is known, the possible climates can be explored using Global Climate Models analogous to the ones developed to sim...

  20. Solar-Terrestrial Ontology Development

    Science.gov (United States)

    McGuinness, D.; Fox, P.; Middleton, D.; Garcia, J.; Cinquni, L.; West, P.; Darnell, J. A.; Benedict, J.

    2005-12-01

    The development of an interdisciplinary virtual observatory (the Virtual Solar-Terrestrial Observatory; VSTO) as a scalable environment for searching, integrating, and analyzing databases distributed over the Internet requires a higher level of semantic interoperability than here-to-fore required by most (if not all) distributed data systems or discipline specific virtual observatories. The formalization of semantics using ontologies and their encodings for the internet (e.g. OWL - the Web Ontology Language), as well as the use of accompanying tools, such as reasoning, inference and explanation, open up both a substantial leap in options for interoperability and in the need for formal development principles to guide ontology development and use within modern, multi-tiered network data environments. In this presentation, we outline the formal methodologies we utilize in the VSTO project, the currently developed use-cases, ontologies and their relation to existing ontologies (such as SWEET).

  1. Terrestrial atmosphere, water and astrobiology

    Directory of Open Access Journals (Sweden)

    Coradini M.

    2010-12-01

    Full Text Available Primitive life, defined as a chemical system capable to transfer its molecular information via self-replication and also capable to evolve, originated about 4 billion years ago from the processing of organic molecules by liquid water. Terrestrial atmosphere played a key role in the process by allowing the permanent presence of liquid water and by participating in the production of carbon-based molecules. Water molecules exhibit specific properties mainly due to a dense network of hydrogen bonds. The carbon-based molecules were either home made in the atmosphere and/or in submarine hydrothermal systems or delivered by meteorites and micrometeorites. The search for possible places beyond the earth where the trilogy atmosphere/water/life could exist is the main objective of astrobiology. Within the Solar System, exploration missions are dedicated to Mars, Europa, Titan and the icy bodies. The discovery of several hundreds of extrasolar planets opens the quest to the whole Milky Way.

  2. Terrestrial gamma-ray flashes

    Energy Technology Data Exchange (ETDEWEB)

    Marisaldi, Martino, E-mail: marisaldi@iasfbo.inaf.it [INAF-IASF Bologna, Via Gobetti 101, I-40129 Bologna (Italy); Fuschino, Fabio; Labanti, Claudio [INAF-IASF Bologna, Via Gobetti 101, I-40129 Bologna (Italy); Tavani, Marco [INAF-IASF Roma, Via Fosso del Cavaliere 100, I-00133 Roma (Italy); Argan, Andrea [INAF, Viale del Parco Mellini 84, 00136 Roma (Italy); Del Monte, Ettore [INAF-IASF Roma, Via Fosso del Cavaliere 100, I-00133 Roma (Italy); Longo, Francesco; Barbiellini, Guido [Dipartimento di Fisica Università di Trieste and INFN Trieste, via A. Valerio 2, I-34127 Trieste (Italy); Giuliani, Andrea [INAF-IASF Milano, Via Bassini 15, I-20133 Milano (Italy); Trois, Alessio [INAF Osservatorio Astronomico di Cagliari, loc. Poggio dei Pini, strada 54, I-09012 Capoterra (Italy); Bulgarelli, Andrea; Gianotti, Fulvio; Trifoglio, Massimo [INAF-IASF Bologna, Via Gobetti 101, I-40129 Bologna (Italy)

    2013-08-21

    Lightning and thunderstorm systems in general have been recently recognized as powerful particle accelerators, capable of producing electrons, positrons, gamma-rays and neutrons with energies as high as several tens of MeV. In fact, these natural systems turn out to be the highest energy and most efficient natural particle accelerators on Earth. Terrestrial Gamma-ray Flashes (TGFs) are millisecond long, very intense bursts of gamma-rays and are one of the most intriguing manifestation of these natural accelerators. Only three currently operative missions are capable of detecting TGFs from space: the RHESSI, Fermi and AGILE satellites. In this paper we review the characteristics of TGFs, including energy spectrum, timing structure, beam geometry and correlation with lightning, and the basic principles of the associated production models. Then we focus on the recent AGILE discoveries concerning the high energy extension of the TGF spectrum up to 100 MeV, which is difficult to reconcile with current theoretical models.

  3. Taking Steps to Protect Against the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Pope, Noah Gale [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Williams, Martha [Tetra Tech HEI; Powell, TN (United States); Lewis, Joel [Gregg Protection Services; Lynchburg, VA (United States); Pham, Thomas [United States Nuclear Regulatory Commission; CHattanooga, TN (United States)

    2015-10-16

    Research reactors are required (in accordance with the Safeguards Agreement between the State and the IAEA) to maintain a system of nuclear material accounting and control for reporting quantities of nuclear material received, shipped, and held on inventory. Enhancements to the existing accounting and control system can be made at little additional cost to the facility, and these enhancements can make nuclear material accounting and control useful for nuclear security. In particular, nuclear material accounting and control measures can be useful in protecting against an insider who is intent on unauthorized removal or misuse of nuclear material or misuse of equipment. An enhanced nuclear material accounting and control system that responds to nuclear security is described in NSS-25G, Use of Nuclear Material Accounting and Control for Nuclear Security Purposes at Facilities, which is scheduled for distribution by the IAEA Department of Nuclear Security later this year. Accounting and control measures that respond to the insider threat are also described in NSS-33, Establishing a System for Control of Nuclear Material for Nuclear Security Purposes at a Facility During Storage, Use and Movement, and in NSS-41, Preventive and Protective Measures against Insider Threats (originally issued as NSS-08), which are available in draft form. This paper describes enhancements to existing material control and accounting systems that are specific to research reactors, and shows how they are important to nuclear security and protecting against an insider.

  4. Nuclear threats and emergency preparedness in Finland; Ydinuhkat ja varautuminen

    Energy Technology Data Exchange (ETDEWEB)

    Mustonen, R.; Aaltonen, H.; Laaksonen, J.; Lahtinen, J.; Rantavaara, A.; Reponen, H.; Rytoemaa, T.; Suomela, M.; Toivonen, H.; Varjoranta, T.

    1995-10-01

    The political and economic upheavals which have taken place in Eastern Europe have had an impact on radiation and nuclear safety throughout Europe. Emergency preparedness systems for unexpected nuclear events have been developed further in all European countries, and prosperous western nations have invested in improving the safety of East European nuclear power plants. The economic crisis facing countries of the former Soviet Union has also promoted illicit trade in nuclear materials; this has made it necessary for various border guards and police authorities to intensify their collaboration and to tighten border controls. On 3-4 October 1995, Finnish Centre for Radiation and Nuclear Safety (STUK) arranged a seminar on nuclear threats and emergency preparedness in Finland. In addition to STUK experts, a wide range of rescue and civil defence authorities, environmental health specialists and other persons engaged in emergency preparedness attended the seminar. The publication contains a compilation of reports presented at the seminar. The reports cover a broad spectrum of nuclear threats analyzed at STUK, the impacts of radioactive fallout on human beings and on the environment, and preparedness systems by which the harmful effects of radiation or nuclear accidents can, if necessary, be minimized. (33 figs., 5 tabs.).

  5. Consideration on Measures against Insiders Threats in ROK

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Seungmin; Yim, Hobin; Hong, Yunjeong [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-05-15

    They can also threaten cyber security, safety measures, and material control and accountancy (MC and A). Insiders are likely to have the time to plan their actions. In addition, they may work with an external adversary who shares their objectives. Because of these reasons, IAEA published 'The Implementing Guide Preventive and Protective Measures against Insider Threats, IAEA Nuclear Security Series No. 8' to help understanding of the Member States. This paper focus on the current status of the measures to prevent, detect and respond to potential insiders at nuclear facilities in Republic of KOREA. Insiders are able to take advantage of their access rights and knowledge of facilities where they are working or have worked to bypass dedicated security measures. Therefore, insiders can be the most dangerous threats to cyber security, safety measures, and material control and accountancy of nuclear facilities. Preventive and protective measures against the potential insiders in the nuclear facilities are yet insufficient according to the security inspection results. Especially, preventive and protective measures for unauthorized removal of nuclear material by insiders are the weakest area of whole security systems and should be further strengthened.

  6. Hepatoprotective and Antioxidant Activities of Tribulus Terrestris

    NARCIS (Netherlands)

    Harraz, Fathalla M; Ghazy, Nabila M; Hammoda, Hala M; Nafeaa, Abeer A.; Abdallah, Ingy I.

    2015-01-01

    Tribulus terrestris L. has been used in folk medicine throughout history. The present study examined the acute toxicity of the total ethanolic extract of T. Terrestris followed by investigation of the hepatoprotective activity of the total ethanolic extract and different fractions of the aerial part

  7. Abundance of Terrestrial Planets by Microlensing

    OpenAIRE

    Yock, Philip

    2000-01-01

    Terrestrial planets may be detected using the gravitational microlensing technique. This was demonstrated in the high magnification event MACHO-98-BLG-35. Observing strategies aimed at measuring the abundance of terrestrial planets are discussed, using both existing telescopes and planned telescopes.

  8. Cooperative Threat Reduction: Cooperation Threat Reduction Program Liquid Propellant Disposition Project

    Science.gov (United States)

    2002-09-01

    This audit is one in a series of audits the Deputy Secretary of Defense requested. As part of the Cooperative Threat Reduction (CTR) Program, DoD agreed to assist the Russian Federation in disposing of its liquid rocket propellant. Public Law 102-228 (section 2551 NOTE, title 22, United States Code), the Soviet Nuclear Threat Reduction Act of 1991 designates DoD as the executive agent for the CTR Program. Specific objectives of the act are to destroy chemical, nuclear, and other weapons; transport, store, disable, and safeguard weapons in connection with their destruction; and establish verifiable safeguards against proliferation of weapons of mass destruction. The Office of the Assistant Secretary of Defense (International Security Policy), under the Office of the Under Secretary of Defense for Policy, develops, coordinates, and oversees implementation of policy for the CTR Program. The CTR Directorate, Defense Threat Reduction Agency operates the program.

  9. Protection without detection: a threat mitigation technique

    Science.gov (United States)

    White, Joshua; McCoy, Joseph R.; Ratazzi, Paul

    2012-05-01

    Networking systems and individual applications have traditionally been defended using signature-based tools that protect the perimeter, many times to the detriment of service, performance, and information flow. These tools require knowledge of both the system on which they run and the attack they are preventing. As such, by their very definition, they only account for what is known to be malicious and ignore the unknown. The unknown, or zero day threat, can occur when defenses have yet to be immunized via a signature or other identifier of the threat. In environments where execution of the mission is paramount, the networks and applications must perform their function of information delivery without endangering the enterprise or losing the salient information, even when facing zero day threats. In this paper we, describe a new defensive strategy that provides a means to more deliberately balance the oft mutually exclusive aspects of protection and availability. We call this new strategy Protection without Detection, since it focuses on network protection without sacrificing information availability. The current instantiation analyzes the data stream in real time as it passes through an in-line device. Critical files are recognized, and mission-specific trusted templates are applied as they are forwarded to their destination. The end result is a system which eliminates the opportunity for propagation of malicious or unnecessary payloads via the various containers that are inherent in the definition of standard file types. In some cases, this method sacrifices features or functionality that is typically inherent in these files. However, with the flexibility of the template approach, inclusion or exclusion of these features becomes a deliberate choice of the mission owners, based on their needs and amount of acceptable risk. The paper concludes with a discussion of future extensions and applications.

  10. Terrestrial Sediment Delivery to Coastal and Marine Environments: US Virgin Islands

    Science.gov (United States)

    Larson, R. A.; Brooks, G. R.; Devine, B.; Wallace, L. E.; Holmes, C. W.; Schwing, P. T.

    2007-05-01

    Understanding terrestrial sediment dynamics in high-relief, tropical island settings, such as St. Thomas and St. John, USVI, has become a critical issue, as sediments are a potential threat to the health of down-slope environments. The primary depositional sinks of terrestrial sediments are 1) coastal buffer zones such as salt ponds, which trap sediments and keep them from being input into the marine environment, and 2) near-shore marine environments (coral reefs, seagrasses, algal flats etc.), many of which are adversely affected by terrestrial sedimentation. Land use change by anthropogenic activities has been shown to alter terrestrial sediment dynamics and greatly increase sediment delivery and accumulation rates in coastal and marine environments. Sediment cores collected in salt ponds and the near-shore marine environment were used to determine the sedimentology (texture and composition) and geochronology (using 14C, and 210Pb) prior to anthropogenic activities to define the "natural signal", or "baseline", as well as recent deviations from the "natural signal", which may be attributed to anthropogenic activities. Salt pond and marine sediments in watersheds without anthropogenic activities exhibit no deviations from the "natural signal" in sedimentology or accumulation rate. Salt pond and marine sediments in watersheds with anthropogenic activities contain a deviation from the "natural signal" manifested as an increase in accumulation rate within the last 100 yrs (most likely within the last 25-50 yrs) ranging from 3 -10 times greater than the "natural" accumulation rate. Sedimentologically, salt ponds reflect no recent change, where as marine sediments do show a recent deviation in sedimentology. This marine deviation is represented by an increase in organic content, a decrease in grain size, and a decrease in carbonate content (marine-derived) compared to the "natural signal". This change reflects an increase in terrestrial (non- carbonate, finer

  11. Handsets Malware Threats and Facing Techniques

    Directory of Open Access Journals (Sweden)

    Marwa M. A. Elfattah

    2011-12-01

    Full Text Available Nowadays, mobile handsets combine the functionality of mobile phones and PDAs. Unfortunately, mobile handsets development process has been driven by market demand, focusing on new features and neglecting security. So, it is imperative to study the existing challenges that facing the mobile handsets threat containment process, and the different techniques and methodologies that used to face those challenges and contain the mobile handsets malwares. This paper also presents a new approach to group the different malware containment systems according to their typologies.

  12. Assessing the global threat from Zika virus.

    Science.gov (United States)

    Lessler, Justin; Chaisson, Lelia H; Kucirka, Lauren M; Bi, Qifang; Grantz, Kyra; Salje, Henrik; Carcelen, Andrea C; Ott, Cassandra T; Sheffield, Jeanne S; Ferguson, Neil M; Cummings, Derek A T; Metcalf, C Jessica E; Rodriguez-Barraquer, Isabel

    2016-08-12

    First discovered in 1947, Zika virus (ZIKV) infection remained a little-known tropical disease until 2015, when its apparent association with a considerable increase in the incidence of microcephaly in Brazil raised alarms worldwide. There is limited information on the key factors that determine the extent of the global threat from ZIKV infection and resulting complications. Here, we review what is known about the epidemiology, natural history, and public health effects of ZIKV infection, the empirical basis for this knowledge, and the critical knowledge gaps that need to be filled.

  13. Rethinking climate change as a security threat

    Energy Technology Data Exchange (ETDEWEB)

    Schoch, Corinne

    2011-10-15

    Once upon a time climate change was a strictly environment and development issue. Today it has become a matter of national and international security. Efforts to link climate change with violent conflict may not be based on solid evidence, but they have certainly captured the attention of governments. They have played a vital role in raising the much-needed awareness of climate change as an issue that deserves global action. But at what cost? Focusing on climate change as a security threat alone risks devolving humanitarian responsibilities to the military, ignoring key challenges and losing sight of those climate-vulnerable communities that stand most in need of protection.

  14. Assessing the global threat from Zika virus.

    Science.gov (United States)

    Lessler, Justin; Chaisson, Lelia H; Kucirka, Lauren M; Bi, Qifang; Grantz, Kyra; Salje, Henrik; Carcelen, Andrea C; Ott, Cassandra T; Sheffield, Jeanne S; Ferguson, Neil M; Cummings, Derek A T; Metcalf, C Jessica E; Rodriguez-Barraquer, Isabel

    2016-08-12

    First discovered in 1947, Zika virus (ZIKV) infection remained a little-known tropical disease until 2015, when its apparent association with a considerable increase in the incidence of microcephaly in Brazil raised alarms worldwide. There is limited information on the key factors that determine the extent of the global threat from ZIKV infection and resulting complications. Here, we review what is known about the epidemiology, natural history, and public health effects of ZIKV infection, the empirical basis for this knowledge, and the critical knowledge gaps that need to be filled. PMID:27417495

  15. Cybersecurity Public Sector Threats and Responses

    CERN Document Server

    Andreasson, Kim J

    2011-01-01

    The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the form of e-government. But with a rapidly growing user base globally and an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. An accessible primer, Cybersecurity: Public Sector Threats and Responses focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It identifies the challenges you need to be aware of and examines emerging trends and strategies from around

  16. Lyssaviruses and Bats: Emergence and Zoonotic Threat

    Directory of Open Access Journals (Sweden)

    Ashley C. Banyard

    2014-08-01

    Full Text Available The continued detection of zoonotic viral infections in bats has led to the microbial fauna of these mammals being studied at a greater level than ever before. Whilst numerous pathogens have been discovered in bat species, infection with lyssaviruses is of particular significance from a zoonotic perspective as, where human infection has been reported, it is invariably fatal. Here we review the detection of lyssaviruses within different bat species and overview what is understood regarding their maintenance and transmission following both experimental and natural infection. We discuss the relevance of these pathogens as zoonotic agents and the threat of newly discovered viruses to human populations.

  17. The circumpolar biodiversity monitoring program - Terrestrial plan

    DEFF Research Database (Denmark)

    Christensen, Tom; Payne, J.; Doyle, M.;

    The Circumpolar Biodiversity Monitoring Program, CBMP, Terrestrial Plan, www.caff.is/terrestrial, is a framework to focus and coordinate monitoring of terrestrial biodiversity across the Arctic. The goal of the plan is to improve the collective ability of Arctic traditional knowledge (TK) holders......, northern communities, and scientists to detect, understand and report on long-term change in Arctic terrestrial ecosystems and biodiversity. This presentation will outline the key management questions the plan aims to address and the proposed nested, multi-scaled approach linking targeted, research based...... monitoring with survey-based monitoring and remotely sensed data. The CBMP Terrestrial Plan intends to build upon and expand existing monitoring networks, engaging participants across a range of capacity and interests. The presentation will summarize the recommended focal soil ecosystem components...

  18. Insignificant solar-terrestrial triggering of earthquakes

    Science.gov (United States)

    Love, Jeffrey J.; Thomas, Jeremy N.

    2013-01-01

    We examine the claim that solar-terrestrial interaction, as measured by sunspots, solar wind velocity, and geomagnetic activity, might play a role in triggering earthquakes. We count the number of earthquakes having magnitudes that exceed chosen thresholds in calendar years, months, and days, and we order these counts by the corresponding rank of annual, monthly, and daily averages of the solar-terrestrial variables. We measure the statistical significance of the difference between the earthquake-number distributions below and above the median of the solar-terrestrial averages by χ2 and Student's t tests. Across a range of earthquake magnitude thresholds, we find no consistent and statistically significant distributional differences. We also introduce time lags between the solar-terrestrial variables and the number of earthquakes, but again no statistically significant distributional difference is found. We cannot reject the null hypothesis of no solar-terrestrial triggering of earthquakes.

  19. Village Level Tsunami Threat Maps for Tamil Nadu, SE Coast of India: Numerical Modeling Technique

    Science.gov (United States)

    MP, J.; Kulangara Madham Subrahmanian, D.; V, R. M.

    2014-12-01

    The Indian Ocean tsunami (IOT) devastated several countries of North Indian Ocean. India is one of the worst affected countries after Indonesia and Sri Lanka. In India, Tamil Nadu suffered maximum with fatalities exceeding 8,000 people. Historical records show that tsunami has invaded the shores of Tamil Nadu in the past and has made people realize that the tsunami threat looms over Tamil Nadu and it is necessary to evolve strategies for tsunami threat management. The IOT has brought to light that tsunami inundation and runup varied within short distances and for the disaster management for tsunami, large scale maps showing areas that are likely to be affected by future tsunami are identified. Therefore threat assessment for six villages including Mamallapuram (also called Mahabalipuram) which is famous for its rock-cut temples, from the northern part of Tamil Nadu state of India has been carried out and threat maps categorizing the coast into areas of different degree of threat are prepared. The threat was assessed by numerical modeling using TUNAMI N2 code considering different tsunamigenic sources along the Andaman - Sumatra trench. While GEBCO and C-Map data was used for bathymetry and for land elevation data was generated by RTK - GPS survey for a distance of 1 km from shore and SRTM for the inland areas. The model results show that in addition to the Sumatra source which generated the IOT in 2004, earthquakes originating in Car Nicobar and North Andaman can inflict more damage. The North Andaman source can generate a massive tsunami and an earthquake of magnitude more than Mw 9 can not only affect Tamil Nadu but also entire south east coast of India. The runup water level is used to demarcate the tsunami threat zones in the villages using GIS.

  20. Impact of non-native terrestrial mammals on the structure of the terrestrial mammal food web of Newfoundland, Canada.

    Directory of Open Access Journals (Sweden)

    Justin S Strong

    Full Text Available The island of Newfoundland is unique because it has as many non-native terrestrial mammals as native ones. The impacts of non-native species on native flora and fauna can be profound and invasive species have been identified as one of the primary drivers of species extinction. Few studies, however, have investigated the effects of a non-native species assemblage on community and ecosystem properties. We reviewed the literature to build the first terrestrial mammal food web for the island of Newfoundland and then used network analyses to investigate how the timing of introductions and trophic position of non-native species has affected the structure of the terrestrial mammal food web in Newfoundland. The first non-native mammals (house mouse and brown rat became established in Newfoundland with human settlement in the late 15th and early 16th centuries. Coyotes and southern red-backed voles are the most recent mammals to establish themselves on the island in 1985 and 1998, respectively. The fraction of intermediate species increased with the addition of non-native mammals over time whereas the fraction of basal and top species declined over time. This increase in intermediate species mediated by non-native species arrivals led to an overall increase in the terrestrial mammal food web connectance and generality (i.e. mean number of prey per predator. This diverse prey base and sources of carrion may have facilitated the natural establishment of coyotes on the island. Also, there is some evidence that the introduction of non-native prey species such as the southern red-backed vole has contributed to the recovery of the threatened American marten. Long-term monitoring of the food web is required to understand and predict the impacts of the diverse novel interactions that are developing in the terrestrial mammal food web of Newfoundland.

  1. Ongoing Threats to Emerging Financial Entities

    Directory of Open Access Journals (Sweden)

    Bryce Alexander LYNCH

    2016-06-01

    Full Text Available In the twenty-first century the pace of technological advancement shows no signs of stopping. Old technologies are being discarded as obsolete or are transformed in ways that nobody could have foreseen even a half-decade ago. Along with these radical changes come vulnerabilities and threats to infrastructure, including informational and financial which must be considered and protected. This is not to say that basic security measures must continue to be neglected in favor of rapid development and deployment to provide a Minimum Viable Product to customers; basic security protocols become all the more important under these circumstances. Improving faster are attacks against the new infrastructure; technique and technology tend to change along generally accepted sets of rules while attackers follow no rules or guidelines. This fundamental asymmetry leaves defenders at a distinct advantage in several ways, including ethical concerns (“There are some lines we will not cross” versus “By any means necessary”, monetary considerations (“Return on investment” versus “The resources aren’t ours to begin with, so who cares” and pragmatism (“We exist to make money to improve shareholder value” versus “Because it’s there”. That said, measurable, repeatable, and effective countermeasures exist which can be deployed on an enterprise-wide basis to help level the playing field by deterring attackers. This paper will discuss these threats along with active and passive countermeasures for same.

  2. Terrorism and global security: The nuclear threat

    International Nuclear Information System (INIS)

    In the seven years since this book was first published, the threat of nuclear terrorism has increased dramatically. The enormous destructive potential of nuclear technology inevitably raises the specter of the use of nuclear explosives or radioactivity by insurgent groups. The author explores the political bases of terrorism by considering the factors that might foster nuclear terrorism, the forms it could take, and the probable consequences of such acts. New to this edition is the author's examination of the essential distinctions between lawful insurgencies and terrorism, as well as his analysis of the impact of recent U.S. foreign policy. The author explores the United State's all-consuming rivalry with the Soviet Union, arguing that it has created an atmosphere ripe for anti-U.S. terrorism and that the only viable option for the super-powers is cooperation in an effort to control terrorist activities. He also discusses the ''Reagan doctrine,'' which he believes has increased the long-term threat of nuclear terrorism against the U.S. by its continuing support of authoritarian regimes and by its active opposition to Marxist regimes such as those in Nicaragua and Angola. The book concludes by presenting the first coherent strategy for countering nuclear terrorism-embracing both technological and behavioral measures. The proposal includes policies for deterrence and situation management on national and international scales and emphasizes the logic of a major reshaping of world order

  3. Threats to the consumer market of region

    Directory of Open Access Journals (Sweden)

    Gavriil Aleksandrovich Agarkov

    2012-09-01

    Full Text Available This papers reviews the main threats to the today's consumer market and offers a historic tour of their existence. The results of a comprehensive diagnostics technique of economic safety of the consumer market in the region taking into account the impact of threats are presented. In the basis of the procedure is an indicative method of analysis, in which diagnosis is carried out on a set of criterial parameters. Along with a comprehensive assessment, the paper offers a detailed analysis of one of the method's modules - evaluation of consumer protection as the most vulnerable category of participants in the consumer market. A classification of prejudice of consumers in accordance with international studies is considered. The conducted study showed that, in general, there is a positive trend of economic safety of the consumer market in the region for the period from 2003 to 2010, but, according to some modules (evaluation of consumer protection, the situation has worsened for the majority of the subjects discussed during the reviewed period. The results of economic safety diagnostics of the consumer market actors can be used in the formation of program-target events to neutralize the negative trends in the consumer market

  4. Passive acoustic threat detection in estuarine environments

    Science.gov (United States)

    Borowski, Brian; Sutin, Alexander; Roh, Heui-Seol; Bunin, Barry

    2008-04-01

    The Maritime Security Laboratory (MSL) at Stevens Institute of Technology supports research in a range of areas relevant to harbor security, including passive acoustic detection of underwater threats. The difficulties in using passive detection in an urban estuarine environment include intensive and highly irregular ambient noise and the complexity of sound propagation in shallow water. MSL conducted a set of tests in the Hudson River near Manhattan in order to measure the main parameters defining the detection distance of a threat: source level of a scuba diver, transmission loss of acoustic signals, and ambient noise. The source level of the diver was measured by comparing the diver's sound with a reference signal from a calibrated emitter placed on his path. Transmission loss was measured by comparing noise levels of passing ships at various points along their routes, where their distance from the hydrophone was calculated with the help of cameras and custom software. The ambient noise in the Hudson River was recorded under varying environmental conditions and amounts of water traffic. The passive sonar equation was then applied to estimate the range of detection. Estimations were done for a subset of the recorded noise levels, and we demonstrated how variations in the noise level, attenuation, and the diver's source level influence the effective range of detection. Finally, we provided analytic estimates of how an array improves upon the detection distance calculated by a single hydrophone.

  5. Estimating Exposure of Terrestrial Wildlife to Contaminants

    Energy Technology Data Exchange (ETDEWEB)

    Sample, B.E.

    1994-01-01

    This report presents a general model for exposure of terrestrial wildlife to contaminants (Sect. 2), methods for estimating parameters of the model (Sect. 3), species specific parameters for endpoint species on the Oak Ridge Reservation (ORR) (Sect. 4), and a sample application (Sect. 5). Exposure can be defined as the coincidence in both space and time of a receptor and a stressor, such that the receptor and stressor come into contact and interact (Risk Assessment Forum 1992). In the context of ecological risk assessment, receptors include all endpoint species or communities identified for a site [see Suter (1989) and Suter et al. (1994) for discussions of ecological endpoints for waste sites]. In the context of waste site assessments, stressors are chemical contaminations, and the contact and interaction are uptake of the contaminant by the receptor. Without sufficient exposure of the receptor to the contaminants, there is no ecological risk. Unlike some other endpoint assemblages, terrestrial wildlife are significantly exposed to contaminants in multiple media. They may drink or swim in contaminated water, ingest contaminated food and soil, and breath contaminated air. In addition, because most wildlife are mobile, moving among and within habitats, exposure is not restricted to a single location. They may integrate contamination from several spatially discrete sources. Therefore, exposure models for terrestrial wildlife must include multiple media. This document provides models and parameters for estimating exposure of birds and mammals. Reptiles and amphibians are not considered because few data exist with which to assess exposure to these organisms. In addition, because toxicological data are scarce for both classes, evaluation of the significance of exposure estimates is problematic. However, the general exposure estimation procedure developed herein for birds and mammals is applicable to reptiles and amphibians. Exposure models must be appropriate to the

  6. Portable Wireless Device Threat Assessment for Aircraft Navigation Radios

    Science.gov (United States)

    Nguyen, Truong X.; Koppen, Sandra V.; Ely, Jay J.; Williams, Reuben A.; Smith, Laura J.; Salud, Maria Theresa P.

    2004-01-01

    This paper addresses the concern for Wireless Local Area Network devices and two-way radios to cause electromagnetic interference to aircraft navigation radio systems. Spurious radiated emissions from various IEEE 802.11a, 802.11b, and Bluetooth devices are characterized using reverberation chambers. The results are compared with baseline emissions from standard laptop computer and personal digital assistants (PDAs) that are currently allowed for use on aircraft. The results indicate that the WLAN devices tested are not more of a threat to aircraft navigation radios than standard laptop computers and PDAs in most aircraft bands. In addition, spurious radiated emission data from seven pairs of two-way radios are provided. These two-way radios emit at much higher levels in the bands considered. A description of the measurement process, device modes of operation and the measurement results are reported.

  7. Beyond the amygdala: Linguistic threat modulates peri-sylvian semantic access cortices.

    Science.gov (United States)

    Weisholtz, Daniel S; Root, James C; Butler, Tracy; Tüscher, Oliver; Epstein, Jane; Pan, Hong; Protopopescu, Xenia; Goldstein, Martin; Isenberg, Nancy; Brendel, Gary; LeDoux, Joseph; Silbersweig, David A; Stern, Emily

    2015-12-01

    In this study, healthy volunteers were scanned using functional magnetic resonance imaging (fMRI) to investigate the neural systems involved in processing the threatening content conveyed via visually presented "threat words." The neural responses elicited by these words were compared to those elicited by matched neutral control words. The results demonstrate that linguistic threat, when presented in written form, can selectively engage areas of lateral temporal and inferior frontal cortex, distinct from the core language areas implicated in aphasia. Additionally, linguistic threat modulates neural activity in visceral/emotional systems (amygdala, parahippocampal gyrus and periaqueductal gray), and at earlier stages of the visual-linguistic processing stream involved in visual word form representations (ventral occipitotemporal cortex). We propose a model whereby limbic activation modulates activity at multiple nodes along the visual-linguistic-semantic processing stream, including a perisylvian "semantic access network" involved in decoding word meaning, suggesting a dynamic interplay between feedforward and feedback processes. PMID:26575986

  8. Comprehensive test ban treaty international monitoring system security threats and proposed security attributes

    Energy Technology Data Exchange (ETDEWEB)

    Draelos, T.J.; Craft, R.L.

    1996-03-01

    To monitor compliance with a Comprehensive Test Ban Treaty (CTBT), a sensing network, referred to as the International Monitoring System (IMS), is being deployed. Success of the IMS depends on both its ability to preform its function and the international community`s confidence in the system. To ensure these goals, steps must be taken to secure the system against attacks that would undermine it; however, it is not clear that consensus exists with respect to the security requirements that should be levied on the IMS design. In addition, CTBT has not clearly articulated what threats it wishes to address. This paper proposes four system-level threats that should drive IMS design considerations, identifies potential threat agents, and collects into one place the security requirements that have been suggested by various elements of the IMS community. For each such requirement, issues associated with the requirement are identified and rationale for the requirement is discussed.

  9. A Lesson Not to Be Learned? Understanding Stereotype Threat Does Not Protect Women from Stereotype Threat

    Science.gov (United States)

    Tomasetto, Carlo; Appoloni, Sara

    2013-01-01

    This research examines whether reading a text presenting scientific evidence concerning the phenomenon of stereotype threat improves or disrupts women's performance in a subsequent math task. In two experimental conditions participants (N=118 ) read a text summarizing an experiment in which stereotypes, and not biological differences, were shown…

  10. The appraisal, emotion, and coping responses to the threat of nuclear war

    Energy Technology Data Exchange (ETDEWEB)

    Panos-Savicky, B.

    1989-01-01

    The purpose of this dissertation was to evaluate adults' responses to the threat of nuclear war and to investigate the interrelationships between adults' appraisal, emotion and coping responses to this environmental stressor. It was hypothesized that high threat appraisals of nuclear war would relate to high feelings of anxiety and helplessness about nuclear war. In turn, high feelings of anxiety and helplessness were hypothesized to relate to the use of passive forms of coping in relation to this potential danger. Moderate feelings of anxiety about nuclear war were hypothesized to relate to the use of action oriented coping in regard to this external threat. In addition, it was hypothesized that trait personality characteristics would contribute to adults' responses to the threat of nuclear war. The sample of this study was comprised of ninety-five parents who were members of Parent-Teacher Associations (PTA) in Suffolk County, New York. Six self-report questionnaires were distributed to PTA members. Correlation coefficients, multiple regression analysis and analysis of variance was used to analyze the data. The findings confirmed the hypotheses of this study in that statistically significant relationships were found between the variables in each hypothesis. However, trait personality factors, for the most part, did not contribute to adults' responses to the threat of nuclear war. Implications for social work practice address the importance of these findings for clinical practice, social policy, education and research.

  11. Stereotype threat and racial differences in citizens' experiences of police encounters.

    Science.gov (United States)

    Najdowski, Cynthia J; Bottoms, Bette L; Goff, Phillip Atiba

    2015-10-01

    We conducted 2 studies to investigate how cultural stereotypes that depict Blacks as criminals affect the way Blacks experience encounters with police officers, expecting that such encounters induce Blacks to feel stereotype threat (i.e., concern about being judged and treated unfairly by police because of the stereotype). In Study 1, we asked Black and White participants to report how they feel when interacting with police officers in general. As predicted, Blacks, but not Whites, reported concern that police officers stereotype them as criminals simply because of their race. In addition, this effect was found for Black men but not Black women. In Study 2, we asked Black and White men to imagine a specific police encounter and assessed potential downstream consequences of stereotype threat. Consistent with Study 1, Black but not White men anticipated feeling stereotype threat in the hypothetical police encounter. Further, racial differences in anticipated threat translated into racial differences in anticipated anxiety, self-regulatory efforts, and behavior that is commonly perceived as suspicious by police officers. By demonstrating that Blacks might expect to be judged and treated unfairly by police because of the negative stereotype of Black criminality, this research extends stereotype threat theory to the new domain of criminal justice encounters. It also has practical implications for understanding how the stereotype could ironically contribute to bias-based policing and racial disparities in the justice system.

  12. Measuring and mapping threats to forests: issues and opportunities with an empirical study from Bangladesh

    Science.gov (United States)

    Mukul, S. A.; Herbohn, J.

    2015-12-01

    Spatially explicit tools for prioritizing conservation and land-use in human dominated landscapes are becoming common in recent years. Such efforts are also efficient in minimizing management costs and to provide future possible scenarios to aid management decisions. We propose and develop a spatially explicit framework and novel tool - Future Forest - for simulating scenarios for future forest management actions. We integrate both forest/vegetation characteristics, selected ecosystem services provided by corresponding forest/vegetation and nineteen possible threats and/or disturbances to forests that are either anthropogenic or occurring naturally, and may influence forest/vegetation characteristics and expected outcomes from forests. Our modelling framework provides options for necessary future actions either from conservation or from production forestry perspectives, and to ensure sustainable forest management in an area. In addition to that our threat assessment and mapping tool are useful in indentifying vulnerable zone of forests to specific anthropogenic, natural or other threats, and to take precautionary actions against each identified threats. We applied our modelling framework and spatial tool for measuring and mapping threats to a Bangladesh forest, with recommended actions to ensure sustainable forest management and to spatially prioritize zones for special management needs. We finally discuss issues and opportunities that our spatially explicit framework and novel tool may offer.

  13. Stereotype threat and racial differences in citizens' experiences of police encounters.

    Science.gov (United States)

    Najdowski, Cynthia J; Bottoms, Bette L; Goff, Phillip Atiba

    2015-10-01

    We conducted 2 studies to investigate how cultural stereotypes that depict Blacks as criminals affect the way Blacks experience encounters with police officers, expecting that such encounters induce Blacks to feel stereotype threat (i.e., concern about being judged and treated unfairly by police because of the stereotype). In Study 1, we asked Black and White participants to report how they feel when interacting with police officers in general. As predicted, Blacks, but not Whites, reported concern that police officers stereotype them as criminals simply because of their race. In addition, this effect was found for Black men but not Black women. In Study 2, we asked Black and White men to imagine a specific police encounter and assessed potential downstream consequences of stereotype threat. Consistent with Study 1, Black but not White men anticipated feeling stereotype threat in the hypothetical police encounter. Further, racial differences in anticipated threat translated into racial differences in anticipated anxiety, self-regulatory efforts, and behavior that is commonly perceived as suspicious by police officers. By demonstrating that Blacks might expect to be judged and treated unfairly by police because of the negative stereotype of Black criminality, this research extends stereotype threat theory to the new domain of criminal justice encounters. It also has practical implications for understanding how the stereotype could ironically contribute to bias-based policing and racial disparities in the justice system. PMID:26030449

  14. A molecular palaeobiological exploration of arthropod terrestrialization

    Science.gov (United States)

    Carton, Robert; Edgecombe, Gregory D.

    2016-01-01

    Understanding animal terrestrialization, the process through which animals colonized the land, is crucial to clarify extant biodiversity and biological adaptation. Arthropoda (insects, spiders, centipedes and their allies) represent the largest majority of terrestrial biodiversity. Here we implemented a molecular palaeobiological approach, merging molecular and fossil evidence, to elucidate the deepest history of the terrestrial arthropods. We focused on the three independent, Palaeozoic arthropod terrestrialization events (those of Myriapoda, Hexapoda and Arachnida) and showed that a marine route to the colonization of land is the most likely scenario. Molecular clock analyses confirmed an origin for the three terrestrial lineages bracketed between the Cambrian and the Silurian. While molecular divergence times for Arachnida are consistent with the fossil record, Myriapoda are inferred to have colonized land earlier, substantially predating trace or body fossil evidence. An estimated origin of myriapods by the Early Cambrian precedes the appearance of embryophytes and perhaps even terrestrial fungi, raising the possibility that terrestrialization had independent origins in crown-group myriapod lineages, consistent with morphological arguments for convergence in tracheal systems. This article is part of the themed issue ‘Dating species divergences using rocks and clocks’. PMID:27325830

  15. Does terrestrial epidemiology apply to marine systems?

    Science.gov (United States)

    McCallum, Hamish I.; Kuris, Armand M.; Harvell, C. Drew; Lafferty, Kevin D.; Smith, Garriet W.; Porter, James

    2004-01-01

    Most of epidemiological theory has been developed for terrestrial systems, but the significance of disease in the ocean is now being recognized. However, the extent to which terrestrial epidemiology can be directly transferred to marine systems is uncertain. Many broad types of disease-causing organism occur both on land and in the sea, and it is clear that some emergent disease problems in marine environments are caused by pathogens moving from terrestrial to marine systems. However, marine systems are qualitatively different from terrestrial environments, and these differences affect the application of modelling and management approaches that have been developed for terrestrial systems. Phyla and body plans are more diverse in marine environments and marine organisms have different life histories and probably different disease transmission modes than many of their terrestrial counterparts. Marine populations are typically more open than terrestrial ones, with the potential for long-distance dispersal of larvae. Potentially, this might enable unusually rapid propagation of epidemics in marine systems, and there are several examples of this. Taken together, these differences will require the development of new approaches to modelling and control of infectious disease in the ocean.

  16. Steroidal saponins from Tribulus terrestris.

    Science.gov (United States)

    Kang, Li-Ping; Wu, Ke-Lei; Yu, He-Shui; Pang, Xu; Liu, Jie; Han, Li-Feng; Zhang, Jie; Zhao, Yang; Xiong, Cheng-Qi; Song, Xin-Bo; Liu, Chao; Cong, Yu-Wen; Ma, Bai-Ping

    2014-11-01

    Sixteen steroidal saponins, including seven previously unreported compounds, were isolated from Tribulus terrestris. The structures of the saponins were established using 1D and 2D NMR spectroscopy, mass spectrometry, and chemical methods. They were identified as: 26-O-β-d-glucopyranosyl-(25R)-furost-4-en-2α,3β,22α,26-tetrol-12-one (terrestrinin C), 26-O-β-d-glucopyranosyl-(25R)-furost-4-en-22α,26-diol-3,12-dione (terrestrinin D), 26-O-β-d-glucopyranosyl-(25S)-furost-4-en-22α,26-diol-3,6,12-trione (terrestrinin E), 26-O-β-d-glucopyranosyl-(25R)-5α-furostan-3β,22α,26-triol-12-one (terrestrinin F), 26-O-β-d-glucopyranosyl-(25R)-furost-4-en-12β,22α,26-triol-3-one (terrestrinin G), 26-O-β-d-glucopyranosyl-(1→6)-β-d-glucopyranosyl-(25R)-furost-4-en-22α,26-diol-3,12-dione (terrestrinin H), and 24-O-β-d-glucopyranosyl-(25S)-5α-spirostan-3β,24β-diol-12-one-3-O-β-d-glucopyranosyl-(1→4)-β-d-galactopyranoside (terrestrinin I). The isolated compounds were evaluated for their platelet aggregation activities. Three of the known saponins exhibited strong effects on the induction of platelet aggregation. PMID:25172515

  17. Terrestrial cooling and solar variability

    Science.gov (United States)

    Agee, E. M.

    1982-01-01

    Observational evidence from surface temperature records is presented and discussed which suggests a significant cooling trend over the Northern Hemisphere from 1940 to the present. This cooling trend is associated with an increase of the latitudinal gradient of temperature and the lapse rate, as predicted by climate models with decreased solar input and feedback mechanisms. Evidence suggests that four of these 80- to 100-year cycles of global surface temperature fluctuation may have occurred, and in succession, from 1600 to the present. Interpretation of sunspot activity were used to infer a direct thermal response of terrestrial temperature to solar variability on the time scale of the Gleissberg cycle (90 years, an amplitude of the 11-year cycles). A physical link between the sunspot activity and the solar parameter is hypothesized. Observations of sensible heat flux by stationary planetary waves and transient eddies, as well as general circulation modeling results of these processes, were examined from the viewpoint of the hypothesis of cooling due to reduced insolation.

  18. Terrestrial Energy Storage SPS Systems

    Science.gov (United States)

    Brandhorst, Henry W., Jr.

    1998-01-01

    Terrestrial energy storage systems for the SSP system were evaluated that could maintain the 1.2 GW power level during periods of brief outages from the solar powered satellite (SPS). Short-term outages of ten minutes and long-term outages up to four hours have been identified as "typical" cases where the ground-based energy storage system would be required to supply power to the grid. These brief interruptions in transmission could result from performing maintenance on the solar power satellite or from safety considerations necessitating the power beam be turned off. For example, one situation would be to allow for the safe passage of airplanes through the space occupied by the beam. Under these conditions, the energy storage system needs to be capable of storing 200 MW-hrs and 4.8 GW-hrs, respectively. The types of energy storage systems to be considered include compressed air energy storage, inertial energy storage, electrochemical energy storage, superconducting magnetic energy storage, and pumped hydro energy storage. For each of these technologies, the state-of-the-art in terms of energy and power densities were identified as well as the potential for scaling to the size systems required by the SSP system. Other issues addressed included the performance, life expectancy, cost, and necessary infrastructure and site locations for the various storage technologies.

  19. Earth and Terrestrial Planet Formation

    CERN Document Server

    Jacobson, Seth A

    2015-01-01

    The growth and composition of Earth is a direct consequence of planet formation throughout the Solar System. We discuss the known history of the Solar System, the proposed stages of growth and how the early stages of planet formation may be dominated by pebble growth processes. Pebbles are small bodies whose strong interactions with the nebula gas lead to remarkable new accretion mechanisms for the formation of planetesimals and the growth of planetary embryos. Many of the popular models for the later stages of planet formation are presented. The classical models with the giant planets on fixed orbits are not consistent with the known history of the Solar System, fail to create a high Earth/Mars mass ratio, and, in many cases, are also internally inconsistent. The successful Grand Tack model creates a small Mars, a wet Earth, a realistic asteroid belt and the mass-orbit structure of the terrestrial planets. In the Grand Tack scenario, growth curves for Earth most closely match a Weibull model. The feeding zon...

  20. Transplant rejection in terrestrial molluscs

    Directory of Open Access Journals (Sweden)

    E Furuta

    2011-01-01

    Full Text Available To know whether or not molluscs are capable of recognizing tissue allo-antigens, dorsal skin-allografts were exchanged between adult terrestrial slug, Incilaria fruhstorferi. We succeeded for the first time in orthotopic transplantation of allografts and observed chronic rejection of allografts. Cellular changes in the rejection process continued over for 40 days. Two functional types of “effector” cells were recognized at the rejection site, but they were observed to be macrophages possessing perforin granules and phagocytosing damaged cells of the allograft. Three days after transplantation, the perforin-positive cells were recognized only in the recipient tissue surrounding the allograft. Five days after transplantation, these cells started to appear in the graft, while they disappeared from the host tissue. However, TUNEL-positive cells (apoptotic cells were not observed throughout the graft-rejection process. Electron microscopic examination of the graft tissue revealed autophagic degeneration of epithelial cells, mucous cells, pigment cells, fibroblasts, and muscle cells. These observations suggest that the slugs have the capability to recognize differences in cell-surface molecules between the allogeneic and recipient tissue, and that an allograft is chronically rejected due to a type of immunocyte (macrophage that can induce perforin-dependent cell death

  1. Sex ratio variation in the bumblebee Bombus terrestris

    DEFF Research Database (Denmark)

    Duchateau, Marie José; Velthuis, Hayo H. W.; Boomsma, Jacobus Jan

    2004-01-01

    Bombus terrestris, bumblebees, colony development, queen control, reproductive strategies, sex allocation......Bombus terrestris, bumblebees, colony development, queen control, reproductive strategies, sex allocation...

  2. Global threats from invasive alien species in the twenty-first century and national response capacities

    Science.gov (United States)

    Early, Regan; Bradley, Bethany A.; Dukes, Jeffrey S.; Lawler, Joshua J.; Olden, Julian D.; Blumenthal, Dana M.; Gonzalez, Patrick; Grosholz, Edwin D.; Ibañez, Ines; Miller, Luke P.; Sorte, Cascade J. B.; Tatem, Andrew J.

    2016-01-01

    Invasive alien species (IAS) threaten human livelihoods and biodiversity globally. Increasing globalization facilitates IAS arrival, and environmental changes, including climate change, facilitate IAS establishment. Here we provide the first global, spatial analysis of the terrestrial threat from IAS in light of twenty-first century globalization and environmental change, and evaluate national capacities to prevent and manage species invasions. We find that one-sixth of the global land surface is highly vulnerable to invasion, including substantial areas in developing economies and biodiversity hotspots. The dominant invasion vectors differ between high-income countries (imports, particularly of plants and pets) and low-income countries (air travel). Uniting data on the causes of introduction and establishment can improve early-warning and eradication schemes. Most countries have limited capacity to act against invasions. In particular, we reveal a clear need for proactive invasion strategies in areas with high poverty levels, high biodiversity and low historical levels of invasion. PMID:27549569

  3. Global threats from invasive alien species in the twenty-first century and national response capacities.

    Science.gov (United States)

    Early, Regan; Bradley, Bethany A; Dukes, Jeffrey S; Lawler, Joshua J; Olden, Julian D; Blumenthal, Dana M; Gonzalez, Patrick; Grosholz, Edwin D; Ibañez, Ines; Miller, Luke P; Sorte, Cascade J B; Tatem, Andrew J

    2016-01-01

    Invasive alien species (IAS) threaten human livelihoods and biodiversity globally. Increasing globalization facilitates IAS arrival, and environmental changes, including climate change, facilitate IAS establishment. Here we provide the first global, spatial analysis of the terrestrial threat from IAS in light of twenty-first century globalization and environmental change, and evaluate national capacities to prevent and manage species invasions. We find that one-sixth of the global land surface is highly vulnerable to invasion, including substantial areas in developing economies and biodiversity hotspots. The dominant invasion vectors differ between high-income countries (imports, particularly of plants and pets) and low-income countries (air travel). Uniting data on the causes of introduction and establishment can improve early-warning and eradication schemes. Most countries have limited capacity to act against invasions. In particular, we reveal a clear need for proactive invasion strategies in areas with high poverty levels, high biodiversity and low historical levels of invasion. PMID:27549569

  4. Global Threat Reduction Initiative Domestic Security Program

    International Nuclear Information System (INIS)

    The Global Threat Reduction Initiative (GTRI) is part of the Department of Energy’s National Nuclear Security Administration (DOE/NNSA). One of GTRI’s primary missions is to work throughout the United States to enhance security for radiological materials located at civilian sites such as hospitals and universities that could be potentially used in a radiological dispersal device (RDD). In partnership with other federal organizations such as the Nuclear Regulatory Commission (NRC), the Federal Bureau of Investigation (FBI), and the Department of Homeland Security (DHS), GTRI has assisted sites in enhancing security for thousands of radioactive sources located throughout the U.S. This paper provides an overview of GTRI’s partnership with the NRC, the FBI, DHS, and host sites to enhance the security of radioactive sources

  5. Threats from space: 20 years of progress

    CERN Document Server

    Remo, J L

    2014-01-01

    It has been 20 years since planning began for the 1995 United Nations International Conference on Near-Earth Objects. The conference proceedings established the scientific basis for an international organizational framework to support research and collective actions to mitigate a potential near-Earth object (NEO) threat to the planet. Since that time, researchers have conducted telescope surveys that should, within the coming decade, answer many questions about the size, number, and Earth impact probability of these objects. Space explorations to asteroids and comets have been successfully carried out, including sample recovery. Laboratory experiments and computer simulations at Sandia National Laboratories have analyzed the effects of soft X-ray radiation on meteorites - which might help researchers develop a way to redirect an incoming asteroid by vaporizing a thin layer of its surface. An Action Team on NEOs, established in 2001 in response to recommendations of the Third United Nations Conference on the E...

  6. The expectancy of threat and peritraumatic dissociation

    Directory of Open Access Journals (Sweden)

    Pamela McDonald

    2013-12-01

    Full Text Available Background: Peritraumatic dissociation is one of the most critical acute responses to a traumatic experience, partly because it predicts subsequent posttraumatic stress disorder. Despite this, there is little understanding about the factors that influence peritraumatic dissociation. This study investigated the extent to which peritraumatic dissociation is predicted by the amount of perceived warning that participants had of the impact of the trauma. Method: Randomized eligible admissions to four major trauma hospitals (N =243 were assessed during hospital admission with the Peritraumatic Dissociation Experiences Questionnaire (PDEQ and the perceived warning that participants had before the trauma impact occurred. Results: Whereas female gender predicted both Awareness and Derealization subscale scores on the PDEQ, perceived warning also predicted scores on the Derealization subscale. Conclusions: This finding suggests that the degree of anticipated threat may contribute to peritraumatic dissociation.

  7. Zika Virus: Old Rival, New Threat

    Directory of Open Access Journals (Sweden)

    Huanyu Wang

    2016-04-01

    Full Text Available Zika virus (ZIKV, originally isolated in 1947, caused a worldwide epidemic between January 2014 and February 2016 in which a total of 39 countries have reported autochthonous circulation (33 or indirect evidence of local transmission (6. The total area affected by ZIKV infection is expanding steadily. ZIKV has become a new threat to public health, and the recent cluster of microcephaly and other neurologic disorders suspected to be due to ZIKV has lead the World Health Organization to announce that it is a Public Health Emergency of International Concern. Because of its current importance, this review summarizes the currently available data on the etiology, epidemiology, clinical features, laboratory diagnosis, and transmission of ZIKV and its related diseases.

  8. Bluetooth Security Threats And Solutions: A Survey

    Directory of Open Access Journals (Sweden)

    Nateq Be-Nazir Ibn Minar

    2012-02-01

    Full Text Available Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the privacy of a user’s personal information. The security issues of Bluetooth have been an active area of research for the last few years. This paper presents the vulnerabilities in the security protocols of this technology along with some past security threats and possible countermeasures as reported in the literatures which have been surveyed and summarized in this paper. It also presents some tips that end-users can implement immediately to become more cautious about their private information.Finally, the paper concludes with some recommendations for future security enhancements that can be implemented in the Bluetooth standard.

  9. Biophysics and the Challenges of Emerging Threats

    CERN Document Server

    Puglisi, Joseph D

    2009-01-01

    This volume is a collection of articles from the proceedings of the International School of Structural Biology and Magnetic Resonance 8th Course: Biophysics and the Challenges of Emerging Threats. This NATO Advance Study Institute (ASI) was held in Erice at the Ettore Majorana Foundation and Centre for Scientific Culture on 19 through 30 June 2007. The ASI brought together a diverse group of experts who bridged the fields of virology and biology, biophysics, chemistry and physics. Prominent lecturers and students from around the world representant a total of 24 countries participated in the NATO ASI organized by Professors Joseph Puglisi (Stanford University, USA) and Alexander Arseniev (Moscow, RU). The central hypothesis underlying this ASI was that interdisciplinary research, merging principles of physics, chemistry and biology, can drive new discovery in detecting and fighting bioterrorism agents, lead to cleaner environments, and help propel development in NATO partner countries. The ASI merged the relat...

  10. Scientific performance estimation of robustness and threat

    Science.gov (United States)

    Hoffman, John R.; Sorensen, Eric; Stelzig, Chad A.; Mahler, Ronald P. S.; El-Fallah, Adel I.; Alford, Mark G.

    2002-07-01

    For the last three years at this conference we have been describing the implementation of a unified, scientific approach to performance estimation for various aspects of data fusion: multitarget detection, tracking, and identification algorithms; sensor management algorithms; and adaptive data fusion algorithms. The proposed approach is based on finite-set statistics (FISST), a generalization of conventional statistics to multisource, multitarget problems. Finite-set statistics makes it possible to directly extend Shannon-type information metrics to multisource, multitarget problems in such a way that information can be defined and measured even though any given end-user may have conflicting or even subjective definitions of what informative means. In this presentation, we will show how to extend our previous results to two new problems. First, that of evaluating the robustness of multisensor, multitarget algorithms. Second, that of evaluating the performance of multisource-multitarget threat assessment algorithms.

  11. The CBRNE Threat Needs New Dedicated Analysers

    International Nuclear Information System (INIS)

    Introduction: After the 9-11 attack by terrorists several governments realized their vulnerability towards creative asymmetric attacks. Due to increasing complexity of our society we create more vulnerability towards terror attacks. More chemical substances than we realize can be misused to destabilize our modern society. Recently aircraft passengers were confronted with new regulations, which limit the amount of fluid, which a passenger can bring on board with hand luggage. How far should we go limiting the allowance to bring liquids and substances on board? It indicates that we need new analytic instruments for screening the safety of luggage in all types of transport. Study Design: An inventory was made of the present demand for safe transport and its vulnerability to terror attacks. Also the safety and safety awareness in public buildings, offices and industrial complexes was assessed. Knowing the demand for a certain safety level, an inventory was made to identify analytical equipment, which can be used to check passengers and luggage on possible threats. The same can be used for protecting public areas, offices and industrial complexes. Results And Discussion: It is amazing how some governments, financially driven, underestimate the consequences of CBRNE incidences and disasters. Both threats due to release of dangerous substances just by accident and deliberate abuse of chemicals and/or biologicals by terror organizations is underestimated. Financial rationales are often the cause that the preparedness is less that technically could be possible. Still some commercial companies realize the importance of safety and preparedness towards terror attacks and take their precautions. Several detection systems are now under development and a new market of safety devices comes into existence. Conclusion: Key question is how far we would like to go with defending us with technical devices against potential terror attacks. Also the design of buildings, transport

  12. Terrestrial teleconnections link global rivers

    Science.gov (United States)

    O'Loughlin, F.; Howden, N. J.; Woods, R. A.; Bates, P. D.

    2013-12-01

    . Aside from these practical applications, the results also suggest teleconnections exist between terrestrial, as well as ocean and atmospheric water systems.

  13. When anticipation beats accuracy: Threat alters memory for dynamic scenes.

    Science.gov (United States)

    Greenstein, Michael; Franklin, Nancy; Martins, Mariana; Sewack, Christine; Meier, Markus A

    2016-05-01

    Threat frequently leads to the prioritization of survival-relevant processes. Much of the work examining threat-related processing advantages has focused on the detection of static threats or long-term memory for details. In the present study, we examined immediate memory for dynamic threatening situations. We presented participants with visually neutral, dynamic stimuli using a representational momentum (RM) paradigm, and manipulated threat conceptually. Although the participants in both the threatening and nonthreatening conditions produced classic RM effects, RM was stronger for scenarios involving threat (Exps. 1 and 2). Experiments 2 and 3 showed that this effect does not generalize to the nonthreatening objects within a threatening scene, and that it does not extend to arousing happy situations. Although the increased RM effect for threatening objects by definition reflects reduced accuracy, we argue that this reduced accuracy may be offset by a superior ability to predict, and thereby evade, a moving threat. PMID:26698159

  14. When anticipation beats accuracy: Threat alters memory for dynamic scenes.

    Science.gov (United States)

    Greenstein, Michael; Franklin, Nancy; Martins, Mariana; Sewack, Christine; Meier, Markus A

    2016-05-01

    Threat frequently leads to the prioritization of survival-relevant processes. Much of the work examining threat-related processing advantages has focused on the detection of static threats or long-term memory for details. In the present study, we examined immediate memory for dynamic threatening situations. We presented participants with visually neutral, dynamic stimuli using a representational momentum (RM) paradigm, and manipulated threat conceptually. Although the participants in both the threatening and nonthreatening conditions produced classic RM effects, RM was stronger for scenarios involving threat (Exps. 1 and 2). Experiments 2 and 3 showed that this effect does not generalize to the nonthreatening objects within a threatening scene, and that it does not extend to arousing happy situations. Although the increased RM effect for threatening objects by definition reflects reduced accuracy, we argue that this reduced accuracy may be offset by a superior ability to predict, and thereby evade, a moving threat.

  15. Terrestrial Ecosystems of the Conterminous United States

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — The U.S. Geological Survey (USGS) modeled the distribution of terrestrial ecosystems for the contiguous United States using a standardized, deductive approach to...

  16. The Circumpolar Biodiversity Monitoring Program Terrestrial Plan

    DEFF Research Database (Denmark)

    Christensen, Tom; Payne, J.; Doyle, M.;

    The Conservation of Arctic Flora and Fauna (CAFF), the biodiversity working group of the Arctic Council, established the Circumpolar Biodiversity Monitoring Program (CBMP) to address the need for coordinated and standardized monitoring of Arctic environments in terrestrial, marine, freshwater...... and coastal environments. The CBMP Terrestrial Plan is a framework to focus and coordinate monitoring of terrestrial biodiversity across the Arctic. The goal of the plan is to improve the collective ability of Arctic traditional knowledge (TK) holders, northern communities, and scientists to detect......, understand and report on long-term change in Arctic terrestrial ecosystems and biodiversity, and to identify knowledge gaps and priorities. This poster will outline the key management questions the plan aims to address and the proposed nested, multi-scaled approach linking targeted, research based monitoring...

  17. The Diversity of Extrasolar Terrestrial Planets

    CERN Document Server

    Bond, J C; O'Brien, D P

    2010-01-01

    Extrasolar planetary host stars are enriched in key planet-building elements. These enrichments have the potential to drastically alter the building blocks available for terrestrial planet formation. Here we report on the combination of dynamical models of late-stage terrestrial planet formation within known extrasolar planetary systems with chemical equilibrium models of the composition of solid material within the disk. This allows us to constrain the bulk elemental composition of extrasolar terrestrial planets. A wide variety of resulting planetary compositions exist, ranging from those that are essentially "Earth-like", containing metallic Fe and Mg-silicates, to those that are dominated by graphite and SiC. This implies that a diverse range of terrestrial planets are likely to exist within extrasolar planetary systems.

  18. Dynamical Stability and Habitability of a Terrestrial Planet in HD74156

    Science.gov (United States)

    Gino, M. C.

    2003-12-01

    The detection of extrasolar terrestrial planets located in the habitable regions of a star system is presently beyond our observational technologies. However, systems with multiple Jupiter-like extrasolar planets may prove to be candidates for supporting terrestrial planets provided that stable regions exist. The results of numerical integrations for the systems HD74156 and HD12661, each of which have two Jovian-type planets orbiting their parent star, demonstrates that a region exists in HD74156 where a terrestrial planet can remain in orbit on a timescale of 10\\^5 years, while HD12661 cannot support additional planets. The Swinburne Supercluster running the SWIFT computer code is used for the simulation of both massless test particles and Earth-mass planets to investigate their short-term dynamical stability. These results can be used to constrain the search region within HD74156 in which habitable terrestrial planets are most likely to be found.

  19. The NASA-Lewis terrestrial photovoltaics program

    Science.gov (United States)

    Bernatowicz, D. T.

    1974-01-01

    Those parts of the present NASA-Lewis research and technology effort on solar cells and arrays having relevance to terrestrial uses are outlined. These include raising cell efficiency, developing the FEP-covered module concept, and exploring low-cost cell concepts. Solar cell-battery power systems for remote weather stations have been built to demonstrate the capabilities of solar cells for terrestrial applications.

  20. Utilization of the terrestrial cyanobacterial sheet

    Science.gov (United States)

    Katoh, Hiroshi; Tomita-Yokotani, Kaori; Furukawa, Jun; Kimura, Shunta; Yamaguchi, Yuji; Takenaka, Hiroyuki; Kohno, Nobuyuki

    2016-07-01

    The terrestrial nitrogen-fixing cyanobacterium, Nostoc commune, is living ranging from polar to desert. N. commune makes visible colonies composed extracellular polymeric substances. N. commune has expected to utilize for agriculture, food and terraforming cause of its extracellular polysaccharide, desiccation tolerance and nitrogen fixation. To exhibit the potential abilities, the N. commune sheet is made to use convenient and evaluated by plant growth and radioactive accumulation. We will discuss utilization of terrestrial cyanobacteria under closed environment.

  1. Solar-Terrestrial Relations and Geomagnetic Variations

    Science.gov (United States)

    Ogunade, S. O.

    1995-01-01

    An overview of the solar environment and terrestrial magnetism is presented. The interactions of the solar environment and terrestrial magnetism are then discussed as they result in the creation of the magnetosphere and ionosphere with their corresponding current systems. Geomagnetic variations resulting from these current systems are discussed with regards to the observations made on the Earth's surface. Some useful and disruptive effects of the geomagnetic variations on navigation, shortwave radio communication, space satellite orbits and other technological systems are discussed.

  2. The effects of takeover threats of shareholders and firm value

    OpenAIRE

    Haan, Marco; Riyanto, Yohanes

    2000-01-01

    We study the role of takeover threats as a corporate control mechanism using Aghion and Tirole's (1997) model of formal and real authority. Shareholders do not monitor the manager's actions, since ownership is widely dispersed. A corporate raider may monitor, and steps in if a profit opportunity exists. In our model, a takeover threat decreases the manager's effort and does not benefit shareholders. The effect of a takeover threat on the expected value of the firm is ambiguous. It is in the i...

  3. Analysis of industrial threats on the chosen example

    OpenAIRE

    R. Nowosielski; M. Spilka; A. Kania

    2011-01-01

    Purpose: In this paper the analysis of influence of threats on the safety level in plastic processing industry was carried out. The effect of the proper risk management is increase of work safety and psychical comfort of employers. The necessity of threats monitoring and minimization of the occupational risk were showed.Design/methodology/approach: In this article the essence of industrial safety was presented. Identification of threats on the work position and determination of the risk accep...

  4. On the relationship between social distance and threat

    OpenAIRE

    Astrid C. Buba; de Hoog, Natascha

    2009-01-01

    We investigated the dependence of threat perception and reaction on social distance estimation. Social identity threat was imposed within a 2x2 between subjects design, with N=163 students reading a criticising comment about their ingroup assigned to originate from one of two possible outgroups. The participants completed parts of the scale Overlap of self, ingroup and outgroup (OSIO, Schubert and Otten, 2002) as a measure of social distance either before or after the threat manipulation. Res...

  5. The Reliability to Predict Threat in Social Networks

    Directory of Open Access Journals (Sweden)

    Aleksandrs Larionovs

    2014-11-01

    Full Text Available During the analysis and study it will be possible to create and describe information damping mechanism for transition of threats from one user group to another (within the parameters of portraits, which is the main cause of the massively spreading threat on social networks. Threat predictability in social networks is associated with an adequate scrutiny of system and user portrait, which has a direct correlation.

  6. Anthropogenic transformation of the terrestrial biosphere.

    Science.gov (United States)

    Ellis, Erle C

    2011-03-13

    Human populations and their use of land have transformed most of the terrestrial biosphere into anthropogenic biomes (anthromes), causing a variety of novel ecological patterns and processes to emerge. To assess whether human populations and their use of land have directly altered the terrestrial biosphere sufficiently to indicate that the Earth system has entered a new geological epoch, spatially explicit global estimates of human populations and their use of land were analysed across the Holocene for their potential to induce irreversible novel transformation of the terrestrial biosphere. Human alteration of the terrestrial biosphere has been significant for more than 8000 years. However, only in the past century has the majority of the terrestrial biosphere been transformed into intensively used anthromes with predominantly novel anthropogenic ecological processes. At present, even were human populations to decline substantially or use of land become far more efficient, the current global extent, duration, type and intensity of human transformation of ecosystems have already irreversibly altered the terrestrial biosphere at levels sufficient to leave an unambiguous geological record differing substantially from that of the Holocene or any prior epoch. It remains to be seen whether the anthropogenic biosphere will be sustained and continue to evolve.

  7. Update on terrestrial ages of Antarctic meteorites

    Energy Technology Data Exchange (ETDEWEB)

    Welten, K C; Nishiizumi, K; Caffee, M W

    2000-01-14

    Terrestrial ages of Antarctic meteorites are one of the few parameters that will help us to understand the meteorite concentration mechanism on blue-ice fields. Traditionally, terrestrial ages were determined on the basis of {sup 36}Cl in the metal phase, which has an uncertainty of about 70 ky. For young meteorites (< 40 ky), the terrestrial age is usually and most accurately determined using {sup 14}C in the stone phase. In recent years two methods have been developed which are independent of shielding effects, the {sup 10}Be-{sup 36}Cl/{sup 10}Be method and the {sup 41}Ca/{sup 36}Cl method. These methods have reduced the typical uncertainties in terrestrial ages by a factor of 2, to about 30 ky. The {sup 10}Be-{sup 36}Cl/{sup 10}Be method is quite dependent on the exposure age, which is unknown for most Antarctic meteorites. The authors therefore also attempt to use the relation between {sup 26}Al and {sup 36}Cl/{sup 26}Al to derive a terrestrial age less dependent on the exposure age. The authors have measured the concentrations of cosmogenic {sup 10}Be, {sup 26}Al and {sup 36}Cl in the metal phase of {approximately} 70 Antarctic meteorites, from more than 10 different ice-fields, including many new ones. They then discuss the trends in terrestrial ages of meteorites from different ice-fields.

  8. Wetland Preservation in Australia: The Administrative and Policital Threats

    Institute of Scientific and Technical Information of China (English)

    Mark Yaolin Wang

    2008-01-01

    The wetlands in Australia are of great physical, chemical and biological variety due to the continent's age, geological history and climate. The traditional physical and biological threats remain as the main challenges for wetland preservation in Australia. However, it has been increasingly recognized that the immediate survival of wetlands are being affected by more subtle threats, such as administrative and political threats. This paper identifies these non-physical threats and discusses how and why they have become the major barriers for sustainable wetland preservation in Australia. Finally, this paper calls for more practical policies and solutions to be implemented for sustainable wetland preservation in Australia.

  9. Reverse Modeling and Autonomous Extrapolation of RF Threats

    Directory of Open Access Journals (Sweden)

    Sanguk Noh

    2015-11-01

    Full Text Available This paper addresses the investigation of the basic components of reverse modeling and autonomous extrapolation of radio frequency (RF threats in electronic warfare settings. To design and test our system, we first model RF threats using the radioactive parameters received. The enemy radar simulated with a transponder or emitter transmits electronic signals; next, the sensors of the system intercept those signals as radioactive parameters. We generate the attributes of RF threats during communication between the electronic emissions of RF threats and the receivers of our system in various electronic warfare scenarios. We then utilize the data acquired through our system to reversely model RF threats. Our system carries out the reverse extrapolation process for the purpose of identifying and classifying threats by using profiles compiled through a series of machine learning algorithms, i.e., naive Bayesian classifier, decision tree, and k-means clustering algorithms. This compilation technique, which is based upon the inductive threat model, could be used to analyze and predict what a real-time threat is. We summarize empirical results that demonstrate our system capabilities of reversely modeling and autonomously extrapolating RF threats in simulated electronic warfare settings.

  10. Synergistic Antimicrobial Effect of Tribulus terrestris and Bitter Almond Extracts

    Directory of Open Access Journals (Sweden)

    Hamid Abtahi

    2014-12-01

    Full Text Available Background: The antimicrobial effects of the extracts of different kinds of plants have been demonstrated in several studies. However, no study has been conducted so far on the synergistic effects of two herbal extracts on their germicidal effects. In this study, in addition to antibacterial effects of the aqueous, methanol or ethanol extracts of Tribulus terrestris and bitter almond on some bacteria, the synergistic effects of the extracts of these two plants were also evaluated. Materials and Methods: In this experimental study, water, methanol and ethanol extracts of seeds were screened against some bacterial strains. Seeds were extracted by percolation method. Aliquots of the extracts at variable concentrations were then incubated with different bacterial strains, and the antimicrobial activities of the extracts from seeds were determined by MIC. Three antibiotics were used as reference compounds for antibacterial activities. Seeds extract inhibited significantly the growth of the tested bacterial strains. Results: The greatest synergistic effect of T. terrestris and bitter almond extracts is detected in methanol and aqueous extracts. Among the bacterial strains tested, Staphylococcus aureus was most susceptibility. Conclusion: The results showed the highest antibacterial effect in the combination of methanol extract of T. terrestris and the aqueous extract of the bitter almond.

  11. Characterizing Earth-like Planets with Terrestrial Planet Finder

    CERN Document Server

    Seager, S; Turner, E L

    2002-01-01

    For the first time in human history the possibility of detecting and studying Earth-like planets is on the horizon. Terrestrial Planet Finder (TPF), with a launch date in the 2015 timeframe, is being planned by NASA to find and characterize planets in the habitable zones of nearby stars. The mission Darwin from ESA has similar goals. The motivation for both of these space missions is the detection and spectroscopic characterization of extrasolar terrestrial planet atmospheres. Of special interest are atmospheric biomarkers--such as O2, O3, H2O, CO and CH4--which are either indicative of life as we know it, essential to life, or can provide clues to a planet's habitability. A mission capable of measuring these spectral features would also obtain sufficient signal-to-noise to characterize other terrestrial planet properties. For example, physical characteristics such as temperature and planetary radius can be constrained from low- resolution spectra. In addition, planet characteristics such as weather, rotation...

  12. Accelerated Sequestration of Terrestrial Plant Biomass in the Deep Ocean

    Science.gov (United States)

    Strand, S. E.

    2010-12-01

    One of the most efficient uses of aboveground agricultural residues to reduce atmospheric CO2 is burial in sites removed from contact with the atmosphere and in which degradation of lignocellulose is inhibited (Strand and Benford 2009). Similarly by burying forest residues greater benefits for atmospheric carbon accrue compared to incineration or bioethanol production. Accessible planetary sites that are most removed from contact with the atmosphere are primarily the deep ocean sediments. Many deep ocean sediment ecologies are acclimated to massive inputs of terrestrial plant biomass. Nonetheless, marine degradation rates of lignocellulose are slower than terrestrial rates (Keil et al. 2010). Additionally, anaerobic conditions are easily achieved in many deep ocean sediments, inhibiting lignocellulose degradation further, while the dominance of sulfate in the water column as electron acceptor prevents the release of methane from methanogenesis to the atmosphere. The potential benefit of massive removal of excess terrestrial biomass to the deep ocean will be estimated and compared to other uses including biochar and BECS. The impact of the biomass on the marine environment will be discussed and potential sequestration sites in the Gulf of Mexico and the Atlantic compared. Keil, R. G., J. M. Nuwer, et al. (2010). "Burial of agricultural byproducts in the deep sea as a form of carbon sequestration: A preliminary experiment." Marine Chemistry (In Press, online 6 August 2010). Strand, S. E. and G. Benford (2009). "Ocean sequestration of crop residue carbon: recycling fossil fuel carbon back to deep sediments." Environ. Sci. Technol. 43(4): 1000-1007.

  13. Relative importance of multiple factors on terrestrial loading of DOC to Arctic river networks

    Energy Technology Data Exchange (ETDEWEB)

    Kicklighter, David W. [Ecosystem Center, The; Hayes, Daniel J [ORNL; Mcclelland, James W [University of Texas; Peterson, Bruce [Marine Biological Laboratory; Mcguire, David [University of Alaska; Melillo, Jerry [Marine Biological Laboratory

    2014-01-01

    Terrestrial carbon dynamics influence the contribution of dissolved organic carbon (DOC) to river networks in addition to controlling carbon fluxes between the land surface and the atmosphere. In this study, we use a biogeochemical process model to simulate the lateral transfer of DOC from land to the Arctic Ocean via riverine transport. We estimate that the pan-arctic watershed has contributed, on average, 32 Tg C/yr of DOC to the Arctic Ocean over the 20th century with most coming from the extensive area of boreal deciduous needle-leaved forests and forested wetlands in Eurasian watersheds. We also estimate that the rate of terrestrial DOC loading has been increasing by 0.037 Tg C/yr2 over the 20th century primarily as a result of increases in air temperatures and precipitation. These increases have been partially compensated by decreases in terrestrial DOC loading caused by wildfires. Other environmental factors (CO2 fertilization, ozone pollution, atmospheric nitrogen deposition, timber harvest, agriculture) are estimated to have relatively small effects on terrestrial DOC loading to arctic rivers. The effects of the various environmental factors on terrestrial carbon dynamics have both compensated and enhanced concurrent effects on hydrology to influence terrestrial DOC loading. Future increases in riverine DOC concentrations and export may occur from warming-induced increases in terrestrial DOC production associated with enhanced microbial metabolism and the exposure of additional organic matter from permafrost degradation along with decreases in water yield associated with warming-induced increases in evapotranspiration. Improvements in simulating terrestrial DOC loading to pan-arctic rivers in the future will require better information on the spatial distribution of precipitation and its temporal trends, carbon dynamics of larch-dominated ecosystems in eastern Siberia, and the role of industrial organic effluents on carbon budgets of rivers in western

  14. The Use of Mineral Facies Models of Terrestrial Saline Lakes as Potential Guides to the Origin of Martian Phyllosilicates

    Science.gov (United States)

    Bristow, T. F.; Milliken, R. E.

    2011-03-01

    Physiochemical controls on the spatial and stratigraphic trends of clay minerals in terrestrial saline lakes are presented with the aim of providing additional criteria for determining the origins of martian phyllosilicates.

  15. Solar Terrestrial Relations Observatory (STEREO)

    Science.gov (United States)

    Davila, Joseph M.; Rust, David M.; Pizzo, Victor J.; Liewer, Paulett C.

    1996-11-01

    The solar output changes on a variety of timescales, from minutes, to years, to tens of years and even to hundreds of years. The dominant timescale of variation is, of course, the 11-year solar cycle. Observational evidence shows that the physics of solar output variation is strongly tied to changes in the magnetic field, and perhaps the most dramatic manifestation of a constantly changing magnetic field is the Coronal Mass Ejection (CME). On August 5 - 6, 1996 the Second Workshop to discuss missions to observe these phenomena from new vantage points, organized by the authors, was held in Boulder, Colorado at the NOAA Space Environmental Center. The workshop was attended by approximately 20 scientists representing 13 institutions from the United States and Europe. The purpose of the Workshop was to discuss the different concepts for multi- spacecraft observation of the Sun which have been proposed, to develop a list of scientific objectives, and to arrive at a consensus description of a mission to observe the Sun from new vantage points. The fundamental goal of STEREO is to discover how coronal mass ejections start at the Sun and propagate in interplanetary space. The workshop started with the propositions that coronal mass ejections are fundamental manifestations of rapid large-scale change in the global magnetic structure of the Sun, that CME's are a major driver of coronal evolution, and that they may play a major role in the solar dynamo. Workshop participants developed a mission concept that will lead to a comprehensive characterization of CME disturbances through build-up, initiation, launch, and propagation to Earth. It will also build a clear picture of long-term evolution of the corona. Participants in the workshop recommended that STEREO be a joint mission with the European scientific community and that it consist of four spacecraft: `East' at 1 AU near L4, 60 deg from EArth to detect active regions 5 days before they can be seen by terrestrial telescopes

  16. Threats to sandy beach ecosystems: A review

    Science.gov (United States)

    Defeo, Omar; McLachlan, Anton; Schoeman, David S.; Schlacher, Thomas A.; Dugan, Jenifer; Jones, Alan; Lastra, Mariano; Scapini, Felicita

    2009-01-01

    We provide a brief synopsis of the unique physical and ecological attributes of sandy beach ecosystems and review the main anthropogenic pressures acting on the world's single largest type of open shoreline. Threats to beaches arise from a range of stressors which span a spectrum of impact scales from localised effects (e.g. trampling) to a truly global reach (e.g. sea-level rise). These pressures act at multiple temporal and spatial scales, translating into ecological impacts that are manifested across several dimensions in time and space so that today almost every beach on every coastline is threatened by human activities. Press disturbances (whatever the impact source involved) are becoming increasingly common, operating on time scales of years to decades. However, long-term data sets that describe either the natural dynamics of beach systems or the human impacts on beaches are scarce and fragmentary. A top priority is to implement long-term field experiments and monitoring programmes that quantify the dynamics of key ecological attributes on sandy beaches. Because of the inertia associated with global climate change and human population growth, no realistic management scenario will alleviate these threats in the short term. The immediate priority is to avoid further development of coastal areas likely to be directly impacted by retreating shorelines. There is also scope for improvement in experimental design to better distinguish natural variability from anthropogenic impacts. Sea-level rise and other effects of global warming are expected to intensify other anthropogenic pressures, and could cause unprecedented ecological impacts. The definition of the relevant scales of analysis, which will vary according to the magnitude of the impact and the organisational level under analysis, and the recognition of a physical-biological coupling at different scales, should be included in approaches to quantify impacts. Zoning strategies and marine reserves, which have not

  17. When a threat to the brand is a threat to the self: the importance of brand identification and implicit self-esteem in predicting defensiveness.

    Science.gov (United States)

    Lisjak, Monika; Lee, Angela Y; Gardner, Wendi L

    2012-09-01

    This research examines how people respond when a commercial brand they identify with is threatened. Across four studies, the authors found that among participants who identified with a brand, a threat to the brand elicited the same responses as a threat to the self. Specifically, participants with low implicit self-esteem defended the brand when the self was activated, unlike their high implicit self-esteem counterparts. In addition, brand defense was reduced when individuals had the opportunity to affirm a valued aspect of their self-concept. These findings suggest that when a brand that people identify with is threatened, they may defend the brand to preserve the integrity of the self. More broadly, these findings are consistent with the notion that brands may be included into the extended self-concept, which supports William James's original ideas concerning the breadth and heterogeneity of the self.

  18. Terrestrial biomarker records in Seomjin Estuary in the South Sea of Korea: Implication for terrestrial flux and environmental changes

    Science.gov (United States)

    kim, Songyi; hyun, Sangmin; Kim, Wonnyon; Hyeong, Kiseong

    2016-04-01

    High-resolution records of terrestrial biomarkers, n-alkane compounds, were investigated in two gravity cores (SJP-2 and SJP-4) to evaluate variations in terrestrial organic matter influx. Based on 14C dating, sediments in both cores were deposited during the mid-Holocene; the ages of the bottom sediments of SJP-2 and SJP-4 reached 5,500 Cal yr BP and 5,000 Cal yr BP, respectively. High concentrations of total n-alkanes (nC25-35) in the two cores showed an increasing tendency from 4,500 yr to ca. 2,000 yr. The composition changed at the boundary of 2,500 yr in both cores, suggesting a variation in terrestrial biomarker influx at this time. Several indices including average chain length (ACL), carbon preference index (ICP), and paleo-vegetation index (Paq) showed coincident variations in both cores; ACL exhibited a narrow range of variations with a slight shift at 2,500 yr, CPI showed a decreasing tendency from 4,000 yr to 2,500 yr, and Paq increased during these intervals. Furthermore, the ratios of C23/C31 and C25/C31, indicate a relative abundance of epicuticular wax from vascular plants with coincident variations in both cores, and this also marched well with Paq. CPI excursions suggested that the total n-alkane proxy of the two cores might not only be linked to local climatic variability but also to local oceanographic conditions due to the different sedimentation rates. Variations in paleovegetation and paleoclimate around the study area might be strongly associated with the influx of terrestrial organic compounds derived from vascular plants. Additional 14C dating and isotope study of individual n-alkane biomarkers will provide detailed information on paleoclimatic and paleovegetation changes.

  19. Biological control of the terrestrial carbon sink

    Directory of Open Access Journals (Sweden)

    E.-D. Schulze

    2006-01-01

    Full Text Available This lecture reviews the past (since 1964 when the International Biological Program began and the future of our understanding of terrestrial carbon fluxes with focus on photosynthesis, respiration, primary-, ecosystem-, and biome-productivity. Photosynthetic capacity is related to the nitrogen concentration of leaves, but the capacity is only rarely reached under field conditions. Average rates of photosynthesis and stomatal conductance are closely correlated and operate near 50% of their maximal rate, with light being the limiting factor in humid regions and air humidity and soil water the limiting factor in arid climates. Leaf area is the main factor to extrapolate from leaves to canopies, with maximum surface conductance being dependent on leaf level stomatal conductance. Additionally, gas exchange depends also on rooting depth which determines the water and nutrient availability and on mycorrhizae which regulate the nutrient status. An important anthropogenic disturbance is the nitrogen uptake from air pollutants, which is not balanced by cation uptake from roots and this may lead to damage and breakdown of the plant cover. Photosynthesis is the main carbon input into ecosystems, but it alone does not represent the ecosystem carbon balance, which is determined by respiration of various kinds. Plant respiration and photosynthesis determine growth (net primary production and microbial respiration balances the net ecosystem flux. In a spruce forest, 30% of the assimilatory carbon gain is used for respiration of needles, 20% is used for respiration in stems. Soil respiration is about 50% the carbon gain, half of which is root respiration, half is microbial respiration. In addition, disturbances lead to carbon losses, where fire, harvest and grazing bypass the chain of respiration. In total, the carbon balance at the biome level is only about 1% of the photosynthetic carbon input, or may indeed become negative. The recent observed increase in

  20. The nuclear threat; La menace nucleaire

    Energy Technology Data Exchange (ETDEWEB)

    Tertrais, Bruno

    2011-01-26

    For a long time, a small group of big powers has been the only holder of nuclear weapons (US, USSR, Great Britain, France and China). Since then, new weapons have come out on the geopolitical scene: Israel, India, Pakistan, and some others remain uncertain and generate a worrying atmosphere (North Korea, Iran..). But what is the real risk with nuclear proliferation? Should we dread about it? Is nuclear terrorism a real threat? What are the political stakes of nuclear weapons? Is disarmament a real solution? These are some of the questions that the author answers in a precise and clear manner in this book. Contents: 1 - from monopoly to proliferation: who owns nuclear weapons today, why is it so coveted, is it easy to make one?; 2 - the newcomers: what do we really know about the Iranian nuclear programme, Iran and North Korea: between negotiation and confrontation; 3 - international control and regulation: do we have reliable information, how do we know what we know, Iraq: was there a 'lie' somewhere, who are the states who have renounced nuclear weapons?; 4 - the future: is there still a nuclear warfare risk, what if Pakistani weapons fall into islamic hands, is nuclear terrorism a fantasy or a real risk?

  1. Fructose; a Hidden Threat for Chronic Diseases

    Directory of Open Access Journals (Sweden)

    Ahmet Korkmaz

    2008-08-01

    Full Text Available Incremental usage of the fructose derived from corn by processed-food manufacturers has become a crucial threat in terms of human health. Although it is known as fruit sugar, the most important source of dietary fructose is now, processed-food prepared by using high-fructose corn syrup. Basically, fructose is metabolized within liver and its energy load is equal to glucose. Nevertheless, it does not make up satiety and fullness. Therefore, fructose-rich foods and beverages can be consumed in large amount because the absence of satiety. Studies performed recently unveil a connection between amount of fructose consumed and metabolic disorders such as cardiovascular diseases, type 2 diabetes, hypertension and obesity. The incidence of metabolic diseases which are already affecting more than half of the adults has been increasing among children. Moreover, these types of foods are generally consumed by children. Therefore, in order to reduce the frequency of metabolic disorders in all ages, the amount of fructose in processed-foods and beverages should also be taken into consideration. [TAF Prev Med Bull 2008; 7(4.000: 343-346

  2. Nuclear threat. A clear and present danger

    International Nuclear Information System (INIS)

    It was disappointed at the discussion in the review conference of the NPT held in 2005. The fact may be caused by the estrangement between the international urgent issues related to the non-proliferation and the effectiveness of archaic measures through the NPT. However, it should not be recognized that the international obligation and worth of NPT has been gone. The NPT referred the typical international situation under the cold war era. Although several permanent issues of the nuclear non-proliferation exist in current discussions, the activities relevant to the NPT may not be effect against newly unstable situations after the September 11th of 2001. Urgent challenges to be taken are that we must strictly analyze the interventions between 'the clear and present danger' of our world and the nuclear herms, and must take appropriate actions toward them without influences from previous international situations that might be subsisted in current international treaties and agreements. This paper identified the features of nuclear threats based on the four categories and examined the possibilities of nuclear terrorism from previous facts with the inductive inference. The results identified the possibility of nuclear facility attack and of radioactive materials theft by the Polico-Religious Groups and others are stood out. The authors would suggest the important of urgent recognition to establish the certain security system against nuclear terrorism. (author)

  3. Gonococcal endocarditis: an ever-present threat

    Science.gov (United States)

    Kawabata, Vitor Sérgio; Bittencourt, Márcio Sommer; Lovisolo, Silvana Maria; Felipe-Silva, Aloísio; de Lemos, Ana Paula Silva

    2016-01-01

    The incidence of severe complications of the Neisseria gonorrhoeae infection has presented variations over recent decades since the advent of penicillin. Gonococcal endocarditis (GE) still remains an ever-present threat afflicting the society’s poor and sexually active young population. This entity frequently requires surgical intervention and usually exhibits a poor outcome. The interval between the onset of symptoms and the diagnosis does not usually exceed 4 weeks. One of the characteristics of GE is a proclivity for aortic valve involvement with large vegetation and valve ring abscess formation. The authors report the case of a young man with a 2-week history of fever, malaise, weakness, and progressive heart failure symptoms, who had no previous history of genital complaints or cardiopathy. The physical examination was consistent with acute aortic insufficiency, which was most probably of an infectious origin. The echocardiogram showed thickened aortic cusps and valve insufficiency. After hospital admission, the patient’s clinical status worsened rapidly and he died on the second day. The autopsy findings disclosed aortic valve destruction with vegetation and a ring abscess besides signs of septic shock, such as diffuse alveolar damage, acute tubular necrosis, and zone 3 hepatocellular necrosis. The blood culture isolated N. gonorrhoeae resistant to penicillin and ciprofloxacin. The authors call attention to the pathogen of this particular infectious endocarditis, and the need for early diagnosis and evaluation by a cardiac surgery team. PMID:27547739

  4. Gonococcal endocarditis: an ever-present threat.

    Science.gov (United States)

    de Campos, Fernando Peixoto Ferraz; Kawabata, Vitor Sérgio; Bittencourt, Márcio Sommer; Lovisolo, Silvana Maria; Felipe-Silva, Aloísio; de Lemos, Ana Paula Silva

    2016-01-01

    The incidence of severe complications of the Neisseria gonorrhoeae infection has presented variations over recent decades since the advent of penicillin. Gonococcal endocarditis (GE) still remains an ever-present threat afflicting the society's poor and sexually active young population. This entity frequently requires surgical intervention and usually exhibits a poor outcome. The interval between the onset of symptoms and the diagnosis does not usually exceed 4 weeks. One of the characteristics of GE is a proclivity for aortic valve involvement with large vegetation and valve ring abscess formation. The authors report the case of a young man with a 2-week history of fever, malaise, weakness, and progressive heart failure symptoms, who had no previous history of genital complaints or cardiopathy. The physical examination was consistent with acute aortic insufficiency, which was most probably of an infectious origin. The echocardiogram showed thickened aortic cusps and valve insufficiency. After hospital admission, the patient's clinical status worsened rapidly and he died on the second day. The autopsy findings disclosed aortic valve destruction with vegetation and a ring abscess besides signs of septic shock, such as diffuse alveolar damage, acute tubular necrosis, and zone 3 hepatocellular necrosis. The blood culture isolated N. gonorrhoeae resistant to penicillin and ciprofloxacin. The authors call attention to the pathogen of this particular infectious endocarditis, and the need for early diagnosis and evaluation by a cardiac surgery team. PMID:27547739

  5. Weapons of mass destruction - current security threat

    International Nuclear Information System (INIS)

    This publication brings a complex and comprehensive view of the weapons of mass destruction phenomenon in the context of present military and political situation. It emphasizes the threat posed by proliferation of these destructive devices and their carriers as well as the threat present in their possession by unpredictable totalitarian regimes or terrorist groups. The publication is structured into four basic parts: Introduction Into The Topic, Nuclear Weapons, Chemical Weapons and Biological Weapons. The Introduction reflects the latest developments on the field of military technologies, which lead to the development of new destructive devices with characteristics comparable to basic types of WMDs - nuclear, chemical and biological. Based on the definition of WMD as 'weapon systems with enormous impact causing mass destruction, population, equipment and material losses', the modern mass destruction devices are assorted here, such as ecological, radiological and beam weapons, aerosol and container intelligent ammunition, the outburst of dangerous chemical substances from infrastructure, non-conventional weapons and military devices. The Nuclear Weapons part depicts the most destructive device of mass destruction mankind ever invented in close detail. It maps the history of most significant discoveries in nuclear physics, development and construction of the first nuclear weapons, accumulation of nuclear warheads and their carriers in the Cold war era, attempts of nuclear disarmament and reducing the number of nuclear weapons in possession of superpowers and their proliferation in the world's crisis regions including North Korea and Iran. The chapters devoted to theoretical grounds and physical principles of nuclear and thermonuclear weapons' functioning, the main categories and types, as well as destructive effects and consequences of use contain an adequate mathematical apparatus. This chapter's conclusion brings the overview of nuclear armament of states that

  6. Superluminous Supernovae: No Threat from Eta Carinae

    Science.gov (United States)

    Thomas, Brian; Melott, A. L.; Fields, B. D.; Anthony-Twarog, B. J.

    2008-05-01

    Recently Supernova 2006gy was noted as the most luminous ever recorded, with a total radiated energy of 1044 Joules. It was proposed that the progenitor may have been a massive evolved star similar to η Carinae, which resides in our own galaxy at a distance of about 2.3 kpc. η Carinae appears ready to detonate. Although it is too distant to pose a serious threat as a normal supernova, and given its rotation axis is unlikely to produce a Gamma-Ray Burst oriented toward the Earth, η Carinae is about 30,000 times nearer than 2006gy, and we re-evaluate it as a potential superluminous supernova. We find that given the large ratio of emission in the optical to the X-ray, atmospheric effects are negligible. Ionization of the atmosphere and concomitant ozone depletion are unlikely to be important. Any cosmic ray effects should be spread out over 104 y, and similarly unlikely to produce any serious perturbation to the biosphere. We also discuss a new possible effect of supernovae, endocrine disruption induced by blue light near the peak of the optical spectrum. This is a possibility for nearby supernovae at distances too large to be considered "dangerous” for other reasons. However, due to reddening and extinction by the interstellar medium, η Carinae is unlikely to trigger such effects to any significant degree.

  7. Superluminous supernovae: No threat from Eta Carinae

    CERN Document Server

    Thomas, Brian C; Fields, Brian D; Anthony-Twarog, Barbara J

    2007-01-01

    Recently Supernova 2006gy was noted as the most luminous ever recorded, with a total radiated energy of ~10^44 Joules. It was proposed that the progenitor may have been a massive evolved star similar to Eta Carinae, which resides in our own galaxy at a (poorly determined) distance of ~2.5 kpc. Eta Carinae appears ready to detonate, and in fact had an outburst in 1843. Although it is too distant to pose a serious threat as a normal supernova, and given its rotation axis is unlikely to produce a Gamma Ray Burst oriented toward the Earth, Eta Carinae is about 30,000 times nearer than 2006gy, and we re-evaluate it as a potential superluminous supernova. We find that given the large ratio of emission in the optical to the X-ray, atmospheric effects are negligible. Ionization of the atmosphere and concomitant ozone depletion are unlikely to be important. Any cosmic ray effects should be spread out over ~10^4 y, and similarly unlikely to produce any serious perturbation to the biosphere. We also discuss a new possib...

  8. A Probabilistic Analysis Framework for Malicious Insider Threats

    DEFF Research Database (Denmark)

    Chen, Taolue; Kammuller, Florian; Nemli, Ibrahim;

    2015-01-01

    Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining behaviour exist, but there is little work to relate them to formal approaches to insider threat detection. In this work we present a general formal framework to perform analysis for malicious insider...

  9. Anxiety and threat perception abnormalities in normal children.

    NARCIS (Netherlands)

    P. Muris; M. Kindt; S. Boegels; H. Merckelbach; B, Gadet; V. Moulaert

    2000-01-01

    Examined the relationship between childhood anxiety and threat perception abnormalities. 105 children (aged 8-13 yrs) were exposed to stories reflecting 3 types of anxiety: social anxiety, separation anxiety, and generalized anxiety. From children's reactions to the stories, a number of threat perce

  10. Threat Level High (School): Curriculum Reform with Violence in Mind

    Science.gov (United States)

    Hawkes, T. Elijah; Twemlow, Stuart W.

    2015-01-01

    When school communities are troubled by violence, or threats of violence, at the hands of young people, educators have an opportunity to learn about aggression and adolescent identity development. A disturbing threat incident provides the point of departure for this principal's reflection on how high school curriculum can better meet the identity…

  11. 78 FR 46782 - Federal Acquisition Regulation; Iran Threat Reduction

    Science.gov (United States)

    2013-08-01

    ... RIN 9000-AM44 Federal Acquisition Regulation; Iran Threat Reduction AGENCIES: Department of Defense... Revolutionary Guard Corps, as contained in titles II and III of the Iran Threat Reduction and Syria Human Rights... Federal Register at 77 FR 73516, on December 10, 2012, to implement sections of titles II and III of...

  12. 75 FR 60430 - Federal Advisory Committee; Threat Reduction Advisory Committee

    Science.gov (United States)

    2010-09-30

    ... of the Secretary Federal Advisory Committee; Threat Reduction Advisory Committee AGENCY: Office of... announces a meeting of the Threat Reduction Advisory Committee (hereafter referred to as ``the Committee..., October 21, 2010, from 9 a.m. to 5 p.m. ADDRESSES: The meeting will be held at the Heritage...

  13. Threat Detection in Tweets with Trigger Patterns and Contextual Cues

    NARCIS (Netherlands)

    Spitters, M.M.; Eendebak, P.T.; Worm, D.T.H.; Bouma, H.

    2014-01-01

    Many threats in the real world can be related to activities in open sources on the internet. Early detection of threats based on internet information could assist in the prevention of incidents. However, the amount of data in social media, blogs and forums rapidly increases and it is time consuming

  14. Superior Detection of Threat-Relevant Stimuli in Infancy

    Science.gov (United States)

    LoBue, Vanessa; DeLoache, Judy S.

    2010-01-01

    The ability to quickly detect potential threat is an important survival mechanism for humans and other animals. Past research has established that adults have an attentional bias for the detection of threat-relevant stimuli, including snakes and spiders as well as angry human faces. Recent studies have documented that preschool children also…

  15. Protected Areas in Tropical Africa: Assessing Threats and Conservation Activities

    Science.gov (United States)

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M.; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A.; Davenport, Tim R. B.; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A.; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C.; Holbech, Lars H.; Huijbregts, Bas; Kühl, Hjalmar S.; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K.; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G.; Petre, Charles-Albert; Rainey, Hugo J.; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M.; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration. PMID:25469888

  16. Threats and protection for electronically-steered array radars

    NARCIS (Netherlands)

    Janssen, J.P.B.; Monni, S.; Maas, A.P.M.; Vliet, F.E. van

    2008-01-01

    Front-end power overload protection is a vital issue in any electro-magnetic sensor. The issues around active electronically-steered arrays are more recent and pose new threats. Different categories of threats can damage the sensitive electronics in the phased-array radar, like hostile high power el

  17. Investigating Hypervigilance for Social Threat of Lonely Children

    Science.gov (United States)

    Qualter, Pamela; Rotenberg, Ken; Barrett, Louise; Henzi, Peter; Barlow, Alexandra; Stylianou, Maria; Harris, Rebecca A.

    2013-01-01

    The hypothesis that lonely children show hypervigilance for social threat was examined in a series of three studies that employed different methods including advanced eye-tracking technology. Hypervigilance for social threat was operationalized as hostility to ambiguously motivated social exclusion in a variation of the hostile attribution…

  18. A Stereotype Threat Account of Boys' Academic Underachievement

    Science.gov (United States)

    Hartley, Bonny L.; Sutton, Robbie M.

    2013-01-01

    Three studies examined the role of stereotype threat in boys' academic underachievement. Study 1 (children aged 4-10, n = 238) showed that girls from age 4 years and boys from age 7 years believed, and thought adults believed, that boys are academically inferior to girls. Study 2 manipulated stereotype threat, informing children aged…

  19. Asymmetric Threat Assessment Using Electro-Optical Image Systems

    NARCIS (Netherlands)

    Schwering, P.B.W.; Schutte, K.

    2010-01-01

    Asymmetric threat assessment from military platforms, including early detection and classification by electro-optical means, is a complicated matter. These threats can be for instance explosives-packed rubber boats, minecarrying swimmers and divers in a marine environment or terrorists, improvised e

  20. Protected areas in tropical Africa: assessing threats and conservation activities.

    Directory of Open Access Journals (Sweden)

    Sandra Tranquilli

    Full Text Available Numerous protected areas (PAs have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  1. 41 CFR 60-300.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60-300.22 Section 60-300.22 Public Contracts and Property Management Other Provisions Relating to Public... VETERANS Discrimination Prohibited § 60-300.22 Direct threat defense. The contractor may use as...

  2. Personality, threat and affective responses to cultural diversity

    NARCIS (Netherlands)

    Van der Zee, Karen; Van der Gang, Ineke

    2007-01-01

    The present study tried to reconcile assumptions from Terror Management Theory that individual differences in openness to diversity are enhanced by existential threat with own recent findings suggesting that individual differences are diminished by threat. A model was supported assuming that it is t

  3. 41 CFR 60-250.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60-250.22 Section 60-250.22 Public Contracts and Property Management Other Provisions Relating to Public... VETERANS Discrimination Prohibited § 60-250.22 Direct threat defense. The contractor may use as...

  4. 41 CFR 60-741.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60-741.22 Section 60-741.22 Public Contracts and Property Management Other Provisions Relating to Public... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor...

  5. Terrestrial gamma radiation levels outdoors in Cantabria, Spain

    Energy Technology Data Exchange (ETDEWEB)

    Quindos, L.S.; Fernandez, P.L.; Soto, J.; Rodenas, C. (Cantabria Univ., Santander (Spain). Faculty of Medicine and Sciences)

    1991-06-01

    Terrestrial gamma-ray dose rates have been measured outdoors throughout the region of Cantabria, located in the north of Spain. Results obtained are shown in tabular and cartographical form and are related to the nature of the ground and other influencing factors. The mean absorbed dose rate in air outdoors is 35.46 nGy h{sup -1}. The mean annual effective dose equivalent, when the duration of outdoor exposure and distribution of the population are considered, is about 32 {mu}Sv. This dose is in addition to those doses received from other sources of natural radiation, principally from the presence of radon gas indoors. (author).

  6. Microplastics in the terrestrial ecosystem: Implications for Lumbricus terrestris (Oligochaeta, Lumbricidae)

    NARCIS (Netherlands)

    Huerta Lwanga, Esperanza; Gertsen, H.F.; Gooren, H.; Peters, P.D.; Salanki, T.E.; Ploeg, van der M.J.C.; Besseling, E.; Koelmans, A.A.; Geissen, V.

    2016-01-01

    Plastic debris is widespread in the environment, but information on the effects of microplastics on terrestrial fauna is completely lacking. Here, we studied the survival and fitness of the earthworm Lumbricus terrestris (Oligochaeta, Lumbricidae) exposed to microplastics (Polyethylene, <150 μm)

  7. Perceived control qualifies the effects of threat on prejudice.

    Science.gov (United States)

    Greenaway, Katharine H; Louis, Winnifred R; Hornsey, Matthew J; Jones, Janelle M

    2014-09-01

    People sometimes show a tendency to lash out in a prejudiced manner when they feel threatened. This research shows that the relationship between threat and prejudice is moderated by people's levels of perceived control: Threat leads to prejudice only when people feel concurrently low in control. In two studies, terrorist threat was associated with heightened prejudice among people who were low in perceived control over the threat (Study 1; N = 87) or over their lives in general (Study 2; N = 2,394), but was not associated with prejudice among people who were high in perceived control. Study 3 (N = 139) replicated this finding experimentally in the context of the Global Financial Crisis. The research identifies control as an important ingredient in threatening contexts that, if bolstered, can reduce general tendencies to lash out under threat.

  8. Terrestrial planets across space and time

    CERN Document Server

    Zackrisson, E; Gonzalez, J; Benson, A; Johansen, A; Janson, M

    2016-01-01

    The study of cosmology, galaxy formation and exoplanetary systems has now advanced to a stage where a cosmic inventory of terrestrial planets may be attempted. By coupling semi-analytic models of galaxy formation to a recipe that relates the occurrence of planets to the mass and metallicity of their host stars, we trace the population of terrestrial planets around both solar-mass (FGK type) and lower-mass (M dwarf) stars throughout all of cosmic history. We find that the mean age of terrestrial planets in the local Universe is $8\\pm1$ Gyr and that the typical planet of this type is located in a spheroid-dominated galaxy with total stellar mass about twice that of the Milky Way. We estimate that hot Jupiters have depleted the population of terrestrial planets around FGK stars at redshift $z=0$ by no more than $\\approx 10\\%$, and predict that $\\approx 1/3$ of the terrestrial planets in the local Universe are orbiting stars in a metallicity range for which such planets have yet to be been detected. When looking ...

  9. Numerical simulations for terrestrial planets formation

    Directory of Open Access Journals (Sweden)

    Ji J.

    2011-07-01

    Full Text Available We investigate the formation of terrestrial planets in the late stage of planetary formation using two-planet model. At that time, the protostar has formed for about 3 Myr and the gas disk has dissipated. In the model, the perturbations from Jupiter and Saturn are considered. We also consider variations of the mass of outer planet, and the initial eccentricities and inclinations of embryos and planetesimals. Our results show that, terrestrial planets are formed in 50 Myr, and the accretion rate is about 60%–80%. In each simulation, 3–4 terrestrial planets are formed inside “Jupiter” with masses of 0.15–3.6 M⊕. In the 0.5–4 AU, when the eccentricities of planetesimals are excited, planetesimals are able to accrete material from wide radial direction. The plenty of water material of the terrestrial planet in the Habitable Zone may be transferred from the farther places by this mechanism. Accretion may also happen a few times between two giant planets only if the outer planet has a moderate mass and the small terrestrial planet could survive at some resonances over time scale of 108 yr.

  10. Identifying key conservation threats to Alpine birds through expert knowledge.

    Science.gov (United States)

    Chamberlain, Dan E; Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  11. Comparative analyses of olfactory systems in terrestrial crabs (Brachyura): evidence for aerial olfaction?

    Science.gov (United States)

    Krieger, Jakob; Braun, Philipp; Rivera, Nicole T; Schubart, Christoph D; Müller, Carsten H G; Harzsch, Steffen

    2015-01-01

    Adaptations to a terrestrial lifestyle occurred convergently multiple times during the evolution of the arthropods. This holds also true for the "true crabs" (Brachyura), a taxon that includes several lineages that invaded land independently. During an evolutionary transition from sea to land, animals have to develop a variety of physiological and anatomical adaptations to a terrestrial life style related to respiration, reproduction, development, circulation, ion and water balance. In addition, sensory systems that function in air instead of in water are essential for an animal's life on land. Besides vision and mechanosensory systems, on land, the chemical senses have to be modified substantially in comparison to their function in water. Among arthropods, insects are the most successful ones to evolve aerial olfaction. Various aspects of terrestrial adaptation have also been analyzed in those crustacean lineages that evolved terrestrial representatives including the taxa Anomala, Brachyura, Amphipoda, and Isopoda. We are interested in how the chemical senses of terrestrial crustaceans are modified to function in air. Therefore, in this study, we analyzed the brains and more specifically the structure of the olfactory system of representatives of brachyuran crabs that display different degrees of terrestriality, from exclusively marine to mainly terrestrial. The methods we used included immunohistochemistry, detection of autofluorescence- and confocal microscopy, as well as three-dimensional reconstruction and morphometry. Our comparative approach shows that both the peripheral and central olfactory pathways are reduced in terrestrial members in comparison to their marine relatives, suggesting a limited function of their olfactory system on land. We conclude that for arthropod lineages that invaded land, evolving aerial olfaction is no trivial task.

  12. Insights and issues with simulating terrestrial DOC loading of Arctic river networks.

    Science.gov (United States)

    Kicklighter, David W; Hayes, Daniel J; McClelland, James W; Peterson, Bruce J; McGuire, A David; Melillo, Jerry M

    2013-12-01

    Terrestrial carbon dynamics influence the contribution of dissolved organic carbon (DOC) to river networks in addition to hydrology. In this study, we use a biogeochemical process model to simulate the lateral transfer of DOC from land to the Arctic Ocean via riverine transport. We estimate that, over the 20th century, the pan-Arctic watershed has contributed, on average, 32 Tg C/yr of DOC to river networks emptying into the Arctic Ocean with most of the DOC coming from the extensive area of boreal deciduous needle-leaved forests and forested wetlands in Eurasian watersheds. We also estimate that the rate of terrestrial DOC loading has been increasing by 0.037 Tg C/yr2 over the 20th century primarily as a result of climate-induced increases in water yield. These increases have been offset by decreases in terrestrial DOC loading caused by wildfires. Other environmental factors (CO2 fertilization, ozone pollution, atmospheric nitrogen deposition, timber harvest, agriculture) are estimated to have relatively small effects on terrestrial DOC loading to Arctic rivers. The effects of the various environmental factors on terrestrial carbon dynamics have both offset and enhanced concurrent effects on hydrology to influence terrestrial DOC loading and may be changing the relative importance of terrestrial carbon dynamics on this carbon flux. Improvements in simulating terrestrial DOC loading to pan-Arctic rivers in the future will require better information on the production and consumption of DOC within the soil profile, the transfer of DOC from land to headwater streams, the spatial distribution of precipitation and its temporal trends, carbon dynamics of larch-dominated ecosystems in eastern Siberia, and the role of industrial organic effluents on carbon budgets of rivers in western Russia. PMID:24555311

  13. Combating the Triple Threat: The Need for a One Health Approach.

    Science.gov (United States)

    King, Lonnie J

    2013-10-01

    We live in a world that is rapidly changing, complex, and progressively interconnected. The convergence of people, animals, and their products embedded in an ever-changing environment has created a new dynamic. This dynamic is characterized by new threats to the health of humans, animals, and the environment. In addition, the health of each of these three domains is profoundly and inextricably linked and elaborately connected. Our interconnectedness strongly suggests that our future success in improving health will be based on a new integrative, holistic, and collaborative approach termed One Health. One Health demands that we work across professions, disciplines, and old boundaries. The challenges to our health are unique and profound, and old solutions to our new "wicked" problems are no longer as relevant or effective as in the past. The concept of One Health is not new but has reemerged as a concept to both better understand the triple threats to health and to better address these contemporary challenges using new approaches. This article discusses the health threats to each domain and calls for a new model to confront these challenges by shifting strategies and interventions upstream, closer to the origins of the threats. One Health is a new paradigm that can be used to improve the health of people, animals, and our environment as a collective rather than restricting our actions to any single domain.

  14. Working Memory Training and CBT Reduces Anxiety Symptoms and Attentional Biases to Threat: A Preliminary Study.

    Science.gov (United States)

    Hadwin, Julie A; Richards, Helen J

    2016-01-01

    Research indicates that cognitive processes linked to the detection of threat stimuli are associated with poor attentional control, placing children and adolescents at increased risk for the development of anxious affect. The current study aimed to provide preliminary data to assess whether an intervention designed to improve attentional control (via working memory; WM) would lead to better performance in tests of WM and would be associated with positive changes in symptoms of trait and test anxiety, increased inhibitory control and reduced attention to threat. Forty adolescents aged 11-14 years who reported elevated anxiety and low attentional control were randomly allocated to a WM training or an active cognitive behavioural therapy (CBT) control group. Post intervention, WM training was associated with greater improvements (versus. CBT) in trained WM tasks. Both groups, however, reported fewer anxiety symptoms, demonstrated increased inhibitory control and a reduction in attentional biases to threat post intervention and these results were maintained at follow up. The study provides indicative evidence which suggests that WM training has similar benefits to a more traditional CBT intervention on reduced anxiety and attentional biases for threat. Future research should aim to replicate the findings in a large sample size and explore the broader impact of training on day-to-day functioning. In addition, further research is needed to identify which participants benefit most from different interventions (using baseline characteristics) on treatment compliance and outcome.

  15. Threat from Rubble-Pile Asteroids

    Science.gov (United States)

    Schultz, P. H.

    2015-12-01

    While chondrites are the most common meteoroids to enter our atmosphere, they represent a small fraction of recovered falls. Most stony meteorites disrupt during entry, consumed by ablation or lost by weathering; in contrast, small iron meteorites (entry at altitude; (c) no accessory meteorite falls; (d) "explosion" (not low-speed compression) crater; (e) infrasound/seismic data indicating a high-speed entry/collision; and (f) petrologic evidence for shock deformation/melting in breccias indicative of speeds >4 km/s. Although a monolithic chondrite (~ 10 m across) might allow surviving entry, most objects of this size contain multiple flaws, ensuring atmospheric disruption. Hence, an alternative "needle model" was proposed wherein a small rubble-pile object gradually re-shaped itself during entry [Schultz, 2008], a process that minimizes drag, thermal signatures of entry, and catastrophic disruption. First proposed to account for smaller than expected craters on Venus [Schultz, 1992], such a process resembles subsequent Shoemaker-Levy entry models [Boslough and Crawford, 1997] that predicted much deeper entry than standard models. Laboratory experiments at the NASA Ames Vertical Gun Range simulated this process by breaking-up hypervelocity projectiles into a cloud of debris and tracking its path at near-full atmospheric pressure. The resulting cloud of fragments exhibited less deceleration than a solid sphere at the same speed. Moreover, shadowgraphs revealed constituent fragments "surfing" the pressure jump within the mach cone/column. Previous models proposed that crater-forming impacts must be >50-100 m in diameter in order to survive entry [Bland and Artemieva, 2004]. The "needle model" for the Carancas meteorite entry, however, raises questions about this lower limit for threats by rubble-pile asteroids, e.g., Itokawa. Consequently, we modeled the fate of a rubble-pile entering earth's atmosphere using GEODYN, an Eulerian code with adaptive mesh refinement

  16. Obliquity evolution of extrasolar terrestrial planets

    CERN Document Server

    Atobe, K; Atobe, Keiko; Ida, Shigeru

    2006-01-01

    We have investigated the obliquity evolution of terrestrial planets in habitable zones (at ~ 1AU) in extrasolar planetary systems, due to tidal interactions with their satellite and host star with wide varieties of satellite-to-planet mass ratio and initial obliquity, through numerical calculations and analytical arguments. The obliquity, the angle between planetary spin axis and its orbit normal, of a terrestrial planet is one of the key factors in determining the planetary surface environments. A recent scenario of terrestrial planet accretion implies that giant impacts of Mars-sized bodies determine the planetary spin and form satellites. With isotropic giant impacts, tilted spins are more likely to be produced than straight ones and satellites with various mass are formed. However, most of previous studies have focused on a particular case of the Earth-Moon systems or the two-body planar problem. We numerically integrated the evolution of planetary spin and a satellite orbit with various satellite mass an...

  17. Terrestrial age dating of antarctic meteorites

    International Nuclear Information System (INIS)

    During the last three antarctic field seasons, US and Japanese teams have collected several thousand meteorites. The terrestrial age of these objects is of interest because such knowledge enables the setting of lower bounds on the lower age of the ice sheet, provides information about ice movement, and aids understanding of the accumulation mechanism of the meteorites. Terrestrial ages can be established by measuring the decay of radioactive species produced by bombardment of cosmic rays while the objects are in space. After entering the Earth's atmosphere the meteorites essentially are completely shielded from cosmic rays. The radioactive products that exist at saturation values in space then decay exponentially toward zero activity. By the end of 1980, data will be established on 150 to 200 selected samples. With that large a data base we should have a fairly clear picture of the terrestrial age distribution of antarctic meteorites

  18. A knowledge-based approach to estimating the magnitude and spatial patterns of potential threats to soil biodiversity.

    Science.gov (United States)

    Orgiazzi, Alberto; Panagos, Panos; Yigini, Yusuf; Dunbar, Martha B; Gardi, Ciro; Montanarella, Luca; Ballabio, Cristiano

    2016-03-01

    Because of the increasing pressures exerted on soil, below-ground life is under threat. Knowledge-based rankings of potential threats to different components of soil biodiversity were developed in order to assess the spatial distribution of threats on a European scale. A list of 13 potential threats to soil biodiversity was proposed to experts with different backgrounds in order to assess the potential for three major components of soil biodiversity: soil microorganisms, fauna, and biological functions. This approach allowed us to obtain knowledge-based rankings of threats. These classifications formed the basis for the development of indices through an additive aggregation model that, along with ad-hoc proxies for each pressure, allowed us to preliminarily assess the spatial patterns of potential threats. Intensive exploitation was identified as the highest pressure. In contrast, the use of genetically modified organisms in agriculture was considered as the threat with least potential. The potential impact of climate change showed the highest uncertainty. Fourteen out of the 27 considered countries have more than 40% of their soils with moderate-high to high potential risk for all three components of soil biodiversity. Arable soils are the most exposed to pressures. Soils within the boreal biogeographic region showed the lowest risk potential. The majority of soils at risk are outside the boundaries of protected areas. First maps of risks to three components of soil biodiversity based on the current scientific knowledge were developed. Despite the intrinsic limits of knowledge-based assessments, a remarkable potential risk to soil biodiversity was observed. Guidelines to preliminarily identify and circumscribe soils potentially at risk are provided. This approach may be used in future research to assess threat at both local and global scale and identify areas of possible risk and, subsequently, design appropriate strategies for monitoring and protection of soil

  19. A knowledge-based approach to estimating the magnitude and spatial patterns of potential threats to soil biodiversity.

    Science.gov (United States)

    Orgiazzi, Alberto; Panagos, Panos; Yigini, Yusuf; Dunbar, Martha B; Gardi, Ciro; Montanarella, Luca; Ballabio, Cristiano

    2016-03-01

    Because of the increasing pressures exerted on soil, below-ground life is under threat. Knowledge-based rankings of potential threats to different components of soil biodiversity were developed in order to assess the spatial distribution of threats on a European scale. A list of 13 potential threats to soil biodiversity was proposed to experts with different backgrounds in order to assess the potential for three major components of soil biodiversity: soil microorganisms, fauna, and biological functions. This approach allowed us to obtain knowledge-based rankings of threats. These classifications formed the basis for the development of indices through an additive aggregation model that, along with ad-hoc proxies for each pressure, allowed us to preliminarily assess the spatial patterns of potential threats. Intensive exploitation was identified as the highest pressure. In contrast, the use of genetically modified organisms in agriculture was considered as the threat with least potential. The potential impact of climate change showed the highest uncertainty. Fourteen out of the 27 considered countries have more than 40% of their soils with moderate-high to high potential risk for all three components of soil biodiversity. Arable soils are the most exposed to pressures. Soils within the boreal biogeographic region showed the lowest risk potential. The majority of soils at risk are outside the boundaries of protected areas. First maps of risks to three components of soil biodiversity based on the current scientific knowledge were developed. Despite the intrinsic limits of knowledge-based assessments, a remarkable potential risk to soil biodiversity was observed. Guidelines to preliminarily identify and circumscribe soils potentially at risk are provided. This approach may be used in future research to assess threat at both local and global scale and identify areas of possible risk and, subsequently, design appropriate strategies for monitoring and protection of soil

  20. Standalone Terrestrial Laser Scanning for Efficiently Capturing Aec Buildings for As-Built Bim

    Science.gov (United States)

    Bassier, M.; Vergauwen, M.; Van Genechten, B.

    2016-06-01

    With the increasing popularity of as-built building models for the architectural, engineering and construction (AEC) industry, the demand for highly accurate and dense point cloud data is rising. The current data acquisition methods are labour intensive and time consuming. In order to compete with indoor mobile mapping systems (IMMS), surveyors are now opting to use terrestrial laser scanning as a standalone solution. However, there is uncertainty about the accuracy of this approach. The emphasis of this paper is to determine the scope for which terrestrial laser scanners can be used without additional control. Multiple real life test cases are evaluated in order to identify the boundaries of this technique. Furthermore, this research presents a mathematical prediction model that provides an indication of the data accuracy given the project dimensions. This will enable surveyors to make informed discussions about the employability of terrestrial laser scanning without additional control in mid to large-scale projects.

  1. Numerical simulations for terrestrial planets formation

    OpenAIRE

    Ji J; Zhang N.

    2011-01-01

    We investigate the formation of terrestrial planets in the late stage of planetary formation using two-planet model. At that time, the protostar has formed for about 3 Myr and the gas disk has dissipated. In the model, the perturbations from Jupiter and Saturn are considered. We also consider variations of the mass of outer planet, and the initial eccentricities and inclinations of embryos and planetesimals. Our results show that, terrestrial planets are formed in 50 Myr, and the accretion ra...

  2. Terrestrial propagation of long electromagnetic waves

    CERN Document Server

    Galejs, Janis; Fock, V A

    2013-01-01

    Terrestrial Propagation of Long Electromagnetic Waves deals with the propagation of long electromagnetic waves confined principally to the shell between the earth and the ionosphere, known as the terrestrial waveguide. The discussion is limited to steady-state solutions in a waveguide that is uniform in the direction of propagation. Wave propagation is characterized almost exclusively by mode theory. The mathematics are developed only for sources at the ground surface or within the waveguide, including artificial sources as well as lightning discharges. This volume is comprised of nine chapte

  3. Information fusion: telling the story (or threat narrative)

    Science.gov (United States)

    Fenstermacher, Laurie

    2014-06-01

    Today's operators face a "double whammy" - the need to process increasing amounts of information, including "Twitter-INT"1 (social information such as Facebook, You-Tube videos, blogs, Twitter) as well as the need to discern threat signatures in new security environments, including those in which the airspace is contested. To do this will require the Air Force to "fuse and leverage its vast capabilities in new ways."2 For starters, the integration of quantitative and qualitative information must be done in a way that preserves important contextual information since the goal increasingly is to identify and mitigate violence before it occurs. To do so requires a more nuanced understanding of the environment being sensed, including the human environment, ideally from the "emic" perspective; that is, from the perspective of that individual or group. This requires not only data and information that informs the understanding of how the individuals and/or groups see themselves and others (social identity) but also information on how that identity filters information in their environment which, in turn, shapes their behaviors.3 The goal is to piece together the individual and/or collective narratives regarding threat, the threat narrative, from various sources of information. Is there a threat? If so, what is it? What is motivating the threat? What is the intent of those who pose the threat and what are their capabilities and their vulnerabilities?4 This paper will describe preliminary investigations regarding the application of prototype hybrid information fusion method based on the threat narrative framework.

  4. Comparison of high resolution terrestrial laser scanning and terrestrial photogrammetry for modeling applications

    Science.gov (United States)

    Özdemir, Samed; Bayrak, Temel

    2016-04-01

    3D documentation of cultural heritage and engineering projects is an important matter. These documentation applications, requires highest possible accuracy and detail to represent the actual surface correctly. Terrestrial photogrammetric method which is employed to produce 3D models to day, now can obtain dense point clouds thanks to advancements in computer technology. Terrestrial laser scanners gained popularity in the last decade because of their high capacity and today they are being widely used in many applications. However every application has its own requirements that depend on the type of application, modeling environment, accuracy and budget limitations. This means, for every application highest accuracy instruments are not always best, considering the facts that mentioned before. In this study, laser scanner and terrestrial photogrammetric methods' spatial and model accuracies investigated under various conditions which include measuring targets at different instrument to object distances then investigating the accuracy of these measurements, modeling an irregular shaped surface to compare two surfaces volume and surface areas, at last comparing dimensions of known geometrical shaped small objects. Also terrestrial laser scanners and terrestrial photogrammetric methods most suitable application conditions investigated in terms of cost, time, mobility and accuracy. Terrestrial laser scanner has the ability to, measure distances under cm accuracy and directly measuring 3D world but there is also some drawbacks like sensitive, bulky and expensive equipment. When it comes to terrestrial photogrammetry, it has above cm accuracy, comparatively fast (considering the image acquisition stage), inexpensive but it can be affected by the coarse geometry, surface texture and the environmental lighting. Key Words: Accuracy, Comparison, Model, Terrestrial Photogrammetry, Terrestrial Laser Scanning,.

  5. A Physicist Looks at the Terrorist Threat

    Science.gov (United States)

    Muller, Richard

    2009-05-01

    Many people fear a terrorist nuclear device, smuggled into the United States, as the one weapon that could surpass the destruction and impact of 9-11. I'll review the design of nuclear weapons, with emphasis on the kinds that can be developed by rogue nations, terrorist groups, and high-school students. Saddam, prior to the first gulf war, was developing a uranium bomb, similar to the one that destroyed Hiroshima. His calutrons (named after my university) were destroyed by the United Nations. The North Korean nuclear weapon was, like the U.S. bomb used on Nagasaki, based on plutonium. Its test released the energy equivalent of about 400 tons of TNT. Although some people have speculated that they were attempting to build a small bomb, it is far more likely that this weapon was a fizzle, with less than 1 percent of the plutonium exploded. In contrast, the energy released from burning jet fuel at the 9-11 World Trade Center attack was the equivalent of 900 tons of TNT for each plane -- over twice that of the North Korean Nuke. The damage came from the fact that gasoline delivers 10 kilocalories per gram, about 15 times the energy of an equal weight of TNT. It is this huge energy per gram that also accounts for our addiction to gasoline; per gram, high performance lithium-ion computer batteries carry only 1 percent as much energy. A dirty bomb (radiological weapon) is also unattractive to terrorists because of the threhold effect: doses less than 100 rem produce no radiation illness and will leave no dead bodies at the scene. That may be why al Qaeda instructed Jose Padilla to abandon his plans for a dirty bomb attack in Chicago, and to try a fossil fuel attack (natural gas) instead. I will argue that the biggest terrorist threat is the conventional low-tech one, such as an airplane attack on a crowded stadium using the explosive fuel that they can legally buy at the corner station.

  6. Geochemistry of the Rare Earth Elements in Natural Terrestrial Waters:A Review of What Is Currently Knows

    Institute of Scientific and Technical Information of China (English)

    KEVIN,H,JOHANNESSON; ZHOUXIAOPING

    1997-01-01

    The range of observed chemical compositions of natural terrestrial waters varies greatly especially when compared to the essentially constant global composition of the oceans.The concentrations of the REEs in natural terrestrial waters also exhibit more variation than what was reported in seawater,In terrestrial waters ,pH values span the range from acid up to alkaline,In addition,terrestrial waters can range from very dilute waters through to highly concentrated brines.The REE concentrations and their behavior in natural terrestrial waters reflect these compositional ranges,Chemical weathering of rocks represents the source of the REEs to natural terrestrial waters and ,consequently,the REE signature of rocks can impart their REE signature to associated waters,In addition,Because of the typical low solubilities of the REEs both surface and solution complexation can be important in fractionating REEs in aqueous solution.Both of these processes are important in all natural terrestrial waters,however,their relative importance varies as a function of the overall solution composition,In alkaline waters,for example,Solution complexation of the REEs with carbonate ions appears to control their aqueous distributions whereas in acid waters,the REE signature of the labile fraction of the REEs is readily leached from the rocks.In circumneutral pH waters,both processes appear to be important and their relative significance has not yet been determined.

  7. West Nile virus and USUTU--a threat to Poland.

    Science.gov (United States)

    Moniuszko-Malinowska, Anna; Czupryna, Piotr; Dunaj, Justyna; Zajkowska, Joanna; Siemieniako, Agnieszka; Pancewicz, Sławomir

    2016-01-01

    In recent years emergence of new infectious diseases and the growing spread of pathogens to new areas is observed. Most of these pathogens are zoonotic viruses and their transmission route is from animals to humans and vice versa. These so called emerging and re-emerging pathogens that were present previously only in Africa and Asia are becoming a threat to European countries. These include, e.g. West Nile virus and USUTU virus. The aim of the study is to present the clinical course of infections caused by WVN and USUTU, diagnostic and therapeutic possibilities and, above all, the current epidemiological situation of these infections in the world. We also tried to answer the question whether, there is a risk of infection with these viruses in Poland. After analyzing the available literature we venture a conclusion that in Poland there is a risk of WNV and USUTU infection. Global warming, change of socio-economic conditions, travelling greatly affect the spread of these viruses. In addition there are confirmed human cases of these diseases in countries neighboring Poland, as well as presence of both viruses and the presence of vectors (Culex pipiens sl and Culex torrentium (Diptera: Culicidae)) in our country. All these facts indicate that there is a necessity of epidemiological studies and consideration of these pathogens in the differential diagnosis of febrile illness and neuroinfection. PMID:27344466

  8. Assessing Database and Network Threats in Traditional and Cloud Computing

    Directory of Open Access Journals (Sweden)

    Katerina Lourida

    2015-05-01

    Full Text Available Cloud Computing is currently one of the most widely-spoken terms in IT. While it offers a range of technological and financial benefits, its wide acceptance by organizations is not yet wide spread. Security concerns are a main reason for this and this paper studies the data and network threats posed in both traditional and cloud paradigms in an effort to assert in which areas cloud computing addresses security issues and where it does introduce new ones. This evaluation is based on Microsoft’s STRIDE threat model and discusses the stakeholders, the impact and recommendations for tackling each threat.

  9. Animal Botulism Outcomes in the AniBioThreat Project

    DEFF Research Database (Denmark)

    Woudstra, Cédric; Tevell Åberg, Annica; Skarin, Hanna;

    2013-01-01

    and botulinum neurotoxins are considered potential weapons for bioterrorism and have been included in the Australia Group List of Biological Agents. In 2010 the European Commission (DG Justice, Freedom and Security) funded a 3-year project named AniBioThreat to improve the EU's capacity to counter animal...... bioterrorism threats. A detection portfolio with screening methods for botulism agents and incidents was needed to improve tracking and tracing of accidental and deliberate contamination of the feed and food chain with botulinum neurotoxins and other Clostridia. The complexity of this threat required acquiring...

  10. The biodiversity of the Mediterranean Sea: estimates, patterns, and threats.

    Directory of Open Access Journals (Sweden)

    Marta Coll

    Full Text Available The Mediterranean Sea is a marine biodiversity hot spot. Here we combined an extensive literature analysis with expert opinions to update publicly available estimates of major taxa in this marine ecosystem and to revise and update several species lists. We also assessed overall spatial and temporal patterns of species diversity and identified major changes and threats. Our results listed approximately 17,000 marine species occurring in the Mediterranean Sea. However, our estimates of marine diversity are still incomplete as yet-undescribed species will be added in the future. Diversity for microbes is substantially underestimated, and the deep-sea areas and portions of the southern and eastern region are still poorly known. In addition, the invasion of alien species is a crucial factor that will continue to change the biodiversity of the Mediterranean, mainly in its eastern basin that can spread rapidly northwards and westwards due to the warming of the Mediterranean Sea. Spatial patterns showed a general decrease in biodiversity from northwestern to southeastern regions following a gradient of production, with some exceptions and caution due to gaps in our knowledge of the biota along the southern and eastern rims. Biodiversity was also generally higher in coastal areas and continental shelves, and decreases with depth. Temporal trends indicated that overexploitation and habitat loss have been the main human drivers of historical changes in biodiversity. At present, habitat loss and degradation, followed by fishing impacts, pollution, climate change, eutrophication, and the establishment of alien species are the most important threats and affect the greatest number of taxonomic groups. All these impacts are expected to grow in importance in the future, especially climate change and habitat degradation. The spatial identification of hot spots highlighted the ecological importance of most of the western Mediterranean shelves (and in particular

  11. The biodiversity of the Mediterranean Sea: estimates, patterns, and threats.

    Science.gov (United States)

    Coll, Marta; Piroddi, Chiara; Steenbeek, Jeroen; Kaschner, Kristin; Ben Rais Lasram, Frida; Aguzzi, Jacopo; Ballesteros, Enric; Bianchi, Carlo Nike; Corbera, Jordi; Dailianis, Thanos; Danovaro, Roberto; Estrada, Marta; Froglia, Carlo; Galil, Bella S; Gasol, Josep M; Gertwagen, Ruthy; Gil, João; Guilhaumon, François; Kesner-Reyes, Kathleen; Kitsos, Miltiadis-Spyridon; Koukouras, Athanasios; Lampadariou, Nikolaos; Laxamana, Elijah; López-Fé de la Cuadra, Carlos M; Lotze, Heike K; Martin, Daniel; Mouillot, David; Oro, Daniel; Raicevich, Sasa; Rius-Barile, Josephine; Saiz-Salinas, Jose Ignacio; San Vicente, Carles; Somot, Samuel; Templado, José; Turon, Xavier; Vafidis, Dimitris; Villanueva, Roger; Voultsiadou, Eleni

    2010-01-01

    The Mediterranean Sea is a marine biodiversity hot spot. Here we combined an extensive literature analysis with expert opinions to update publicly available estimates of major taxa in this marine ecosystem and to revise and update several species lists. We also assessed overall spatial and temporal patterns of species diversity and identified major changes and threats. Our results listed approximately 17,000 marine species occurring in the Mediterranean Sea. However, our estimates of marine diversity are still incomplete as yet-undescribed species will be added in the future. Diversity for microbes is substantially underestimated, and the deep-sea areas and portions of the southern and eastern region are still poorly known. In addition, the invasion of alien species is a crucial factor that will continue to change the biodiversity of the Mediterranean, mainly in its eastern basin that can spread rapidly northwards and westwards due to the warming of the Mediterranean Sea. Spatial patterns showed a general decrease in biodiversity from northwestern to southeastern regions following a gradient of production, with some exceptions and caution due to gaps in our knowledge of the biota along the southern and eastern rims. Biodiversity was also generally higher in coastal areas and continental shelves, and decreases with depth. Temporal trends indicated that overexploitation and habitat loss have been the main human drivers of historical changes in biodiversity. At present, habitat loss and degradation, followed by fishing impacts, pollution, climate change, eutrophication, and the establishment of alien species are the most important threats and affect the greatest number of taxonomic groups. All these impacts are expected to grow in importance in the future, especially climate change and habitat degradation. The spatial identification of hot spots highlighted the ecological importance of most of the western Mediterranean shelves (and in particular, the Strait of

  12. Dental anomaly in Tapirus terrestris (L.)

    NARCIS (Netherlands)

    Hooijer, D.A.

    1961-01-01

    A male skull of Tapirus terrestris (L.) originating from Dutch Guiana (Leiden Museum, reg. no. 11632), received from the Rotterdam Zoological Garden through the kind intermediary of Mr. F. J. APPELMAN on July 15, 1952, is remarkable for the abnormal development of its right P1. The full permanent de

  13. Extraterrestrial amino acids and terrestrial life

    Science.gov (United States)

    Chyba, Christopher F.

    1996-07-01

    Since the Swedish chemist Baron Jöns Jacob Berzelius first analysed the Alais meteorite for organic molecules' in 1834, attempts to forge a link between extraterrestrial organic materials and terrestrial life have remained alluring, but often deceptive. New studies reported in this and last week's issues hold the promise of important advances in both endeavours. (AIP)

  14. Forest inventory with terrestrial LiDAR

    NARCIS (Netherlands)

    Bauwens, Sébastien; Bartholomeus, Harm; Calders, Kim; Lejeune, Philippe

    2016-01-01

    The application of static terrestrial laser scanning (TLS) in forest inventories is becoming more effective. Nevertheless, the occlusion effect is still limiting the processing efficiency to extract forest attributes. The use of a mobile laser scanner (MLS) would reduce this occlusion. In this st

  15. Furostanol and Spirostanol Saponins from Tribulus terrestris

    OpenAIRE

    Zhen-Fang Wang; Bing-Bing Wang; Yang Zhao; Fang-Xu Wang; Yan Sun; Rui-Jie Guo; Xin-Bo Song; Hai-Li Xin; Xin-Guang Sun

    2016-01-01

    Twelve new steroidal saponins, including eleven furostanol saponins, terrestrinin J–T (1–11), and one spirostanol saponin, terrestrinin U (12), together with seven known steroidal saponins 13–19 were isolated from T. terrestris. The structures of the new compounds were established on the basis of spectroscopic data, including 1D and 2D NMR and HRESIMS, and comparisons with published data.

  16. Terrestrial plant methane production and emission

    DEFF Research Database (Denmark)

    Bruhn, Dan; Møller, Ian M.; Mikkelsen, Teis Nørgaard;

    2012-01-01

    In this minireview, we evaluate all experimental work published on the phenomenon of aerobic methane (CH4) generation in terrestrial plants and plant. Clearly, despite much uncertainty and skepticism, we conclude that the phenomenon is true. Four stimulating factors have been observed to induce a...

  17. Trackways Produced by Lungfish During Terrestrial Locomotion

    Science.gov (United States)

    Falkingham, Peter L.; Horner, Angela M.

    2016-01-01

    Some primarily aquatic vertebrates make brief forays onto land, creating traces as they do. A lack of studies on aquatic trackmakers raises the possibility that such traces may be ignored or misidentified in the fossil record. Several terrestrial Actinopterygian and Sarcopterygian species have previously been proposed as possible models for ancestral tetrapod locomotion, despite extant fishes being quite distinct from Devonian fishes, both morphologically and phylogenetically. Although locomotion has been well-studied in some of these taxa, trackway production has not. We recorded terrestrial locomotion of a 35 cm African lungfish (Protopterus annectens; Dipnoi: Sarcopterygii) on compliant sediment. Terrestrial movement in the lungfish is accomplished by planting the head and then pivoting the trunk. Impressions are formed where the head impacts the substrate, while the body and fins produce few traces. The head leaves a series of alternating left-right impressions, where each impact can appear as two separate semi-circular impressions created by the upper and lower jaws, bearing some similarity to fossil traces interpreted as footprints. Further studies of trackways of extant terrestrial fishes are necessary to understand the behavioural repertoire that may be represented in the fossil track record. PMID:27670758

  18. High efficiency, long life terrestrial solar panel

    Science.gov (United States)

    Chao, T.; Khemthong, S.; Ling, R.; Olah, S.

    1977-01-01

    The design of a high efficiency, long life terrestrial module was completed. It utilized 256 rectangular, high efficiency solar cells to achieve high packing density and electrical output. Tooling for the fabrication of solar cells was in house and evaluation of the cell performance was begun. Based on the power output analysis, the goal of a 13% efficiency module was achievable.

  19. A molecular palaeobiological exploration of arthropod terrestrialization

    DEFF Research Database (Denmark)

    Lozano-Fernandez, Jesus; Carton, Robert; Tanner, Alastair R.;

    2016-01-01

    to the colonization of land is the most likely scenario.Molecular clock analyses confirmed an origin for the three terrestrial lineages bracketed between the Cambrian and the Silurian. While molecular divergence times for Arachnida are consistent with the fossil record,Myriapoda are inferred to have colonized land...

  20. The effect of job insecurity on employee health complaints: A within-person analysis of the explanatory role of threats to the manifest and latent benefits of work.

    Science.gov (United States)

    Vander Elst, Tinne; Näswall, Katharina; Bernhard-Oettel, Claudia; De Witte, Hans; Sverke, Magnus

    2016-01-01

    The current study contributes to the literature on job insecurity by highlighting threat to the benefits of work as an explanation of the effect of job insecurity on health complaints. Building on the latent deprivation model, we predicted that threats to both manifest (i.e., financial income) and latent benefits of work (i.e., collective purpose, social contacts, status, time structure, activity) mediate the relationships from job insecurity to subsequent mental and physical health complaints. In addition, in line with the conservation of resources theory, we proposed that financial resources buffer the indirect effect of job insecurity on health complaints through threat to the manifest benefit. Hypotheses were tested using a multilevel design, in which 3 measurements (time lag of 6 months between subsequent measurements) were clustered within 1,994 employees (in Flanders, Belgium). This allowed for the investigation of within-person processes, while controlling for variance at the between-person level. The results demonstrate that job insecurity was related to subsequent threats to both manifest and latent benefits, and that these threats in turn were related to subsequent health complaints (with an exception for threat to the manifest benefit that did not predict mental health complaints). Three significant indirect effects were found: threat to the latent benefits mediated the relationships between job insecurity and both mental and physical health complaints, and threat to the manifest benefit mediated the relationship between job insecurity and physical health complaints. Unexpectedly, the latter indirect effect was exacerbated by financial resources. PMID:25894197

  1. The meaning of collective terrorist threat: understanding the subjective causes of terrorism reduces its negative psychological impact.

    Science.gov (United States)

    Fischer, Peter; Postmes, Tom; Koeppl, Julia; Conway, Lianne; Fredriksson, Tom

    2011-05-01

    This article hypothesized that the possibility to construct intellectual meaning of a terrorist attack (i.e., whether participants can cognitively understand why the perpetrators did their crime) reduces the negative psychological consequences typically associated with increased terrorist threat. Concretely, the authors investigated the effect of intellectual meaning (induced by providing additional information about potential economic, cultural, and historical reasons for the terrorist attack) on perceived terrorist threat and associated emotional well-being. Study 1 revealed that pictures of terrorist attacks elicited less experienced terrorist threat when they were presented with background information about the terrorists' motives (meaning provided) rather than without additional background information (no meaning provided). Study 2 replicated this effect with a different manipulation of terrorist threat (i.e., newspaper article) and clarified the underlying psychological process: Participants in the high terror salience condition with meaning provided experienced less terrorist threat and thus more emotional well-being in the face of crisis than participants in the high terror salience condition without meaning provided. Theoretical and practical implications in the context of psychological health and mass media effects are discussed. PMID:20587476

  2. Reducing the nuclear threat in the 21st century

    International Nuclear Information System (INIS)

    The focus of this paper is related to rising public concern - the threat of terrorism and the threat from poorly protected nuclear weapons materials. Governments, the press, and the public need to understand that the IAEA is responsible for monitoring more than 900 facilities to make sure no nuclear materials at those facilities are diverted to military use. They need to know that during 15 years of zero real growth in the IAEA's safeguards budget, the number of states who are part of the nonproliferation regime, the number of safeguarded facilities in those states, and the amount of plutonium and HEU requiring safeguards have all increased dramatically. The IAEA's safeguards system is facing a 'quiet crisis'. There is already a gap between the nuclear threat and our global response. Zero growth budgets at IAEA widen the gap. This total budget is less than ten percent of the cost of building a single nuclear power plant - and a tiny fraction of the economic cost of the non-nuclear terrorist strikes of September 11. The time has come, for member states to agree to a substantial real increase in the IAEA's regular safeguards budget. The discovery in Iraq in 1991 of a substantial covert nuclear weapons program led to the establishment, for the first time, of an Additional Protocol, with wide-ranging new inspection authorities and information access that will give the IAEA what it needs to conclude that there are no covert nuclear activities in states subject to the protocol. The adoption of this Additional Protocol is a great advance in nuclear security, but Governments, the press and public need to understand that the Board has approved Additional Protocols for only 58 member states, and only 22 of those have entered into force or are being provisionally applied. A decade after the Iraq discovery of the weakness in its safeguards regime, the IAEA does not yet have the full authority it needs to detect and expose any covert nuclear programs that may be underway around

  3. Threat, prejudice and the impact of the riots in England.

    Science.gov (United States)

    de Rooij, Eline A; Goodwin, Matthew J; Pickup, Mark

    2015-05-01

    This paper examines how a major outbreak of rioting in England in 2011 impacted on prejudice toward three minority groups in Britain: Muslims, Black British and East Europeans. We test whether the riots mobilized individuals by increasing feelings of realistic and symbolic threat and ultimately prejudice, or whether the riots galvanized those already concerned about minorities, thus strengthening the relationship between threat and prejudice. We conducted three national surveys - before, after and one year on from the riots - and show that after the riots individuals were more likely to perceive threats to society's security and culture, and by extension express increased prejudice toward Black British and East European minorities. We find little evidence of a galvanizing impact. One year later, threat and prejudice had returned to pre-riots levels; however, results from a survey experiment show that priming memories of the riots can raise levels of prejudice.

  4. Stereotype threat and arousal: effects on women's math performance.

    Science.gov (United States)

    O'Brien, Laurie T; Crandall, Christian S

    2003-06-01

    Theories of arousal suggest that arousal should decrease performance on difficult tasks and increase performance on easy tasks. An experiment tested the hypothesis that the effects of stereotype threat on performance are due to heightened arousal. The authors hypothesized that telling participants that a math test they are about to take is known to have gender differences would cause stereotype threat in women but not in men. In the experiment, each participant took two tests--a difficult math test and an easy math test. Compared to women in a "no differences" condition, women in the "gender differences" condition scored better on the easy math test and worse on the difficult math test. Men's performance was unaffected by the manipulation. These data are consistent with an arousal-based explanation of stereotype threat effects. Data were inconsistent with expectancy, evaluation apprehension, and persistence explanations of the stereotype threat phenomenon.

  5. Puerto Rico Land-Based Threat to Benthic Habitats

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set describes the potential threat of sediment delivery and land-based sources of pollution to benthic habitats. This dataset is derived from NOAA's...

  6. Perceived threats of individuals recovering from myocardial infarction.

    Science.gov (United States)

    Bennett, S J

    1992-01-01

    Lazarus' phenomenological theory of stress and coping provided the basis for this descriptive study of perceived threats after myocardial infarction (MI). Sixty-four post-MI subjects enrolled in phase II cardiac rehabilitation programs identified threats they had experienced in the past month. Perceived threats were defined as situations that were difficult or troubling to the individual and were described by respondents in narrative form. Degree of threat was then measured by one item on which subjects indicated the degree of concern the threatening event had caused them. Responses to the one item were analyzed and categorized into the following five areas: physical problems; medical therapy/self-care; work/physical activity; interpersonal/family; and financial. The results provide an overview of the multiple concerns individuals deal with after a major life-threatening cardiac event.

  7. THE SOCIAL-CULTURAL ENVIRONMENT: THREATS, OPPORTUNITIES AND RESPONSES

    OpenAIRE

    Буряк Наталья Юрьевна

    2015-01-01

    In this article the author turns to the problems of social-cultural environment: threats, opportunities, responses, and cultural values (primary and secondary). The examples of both primary and secondary cultural values are given in the article as well.

  8. Assessment of Containment Structures Against Missile Impact Threats

    Institute of Scientific and Technical Information of China (English)

    LI Q M

    2006-01-01

    In order to ensure the highest safety requirements,nuclear power plant structures (the containment structures,the fuel storages and transportation systems) should be assessed against all possible internal and external impact threats.The internal impact threats include kinetic missiles generated by the failure of high pressure vessels and pipes,the failure of high speed rotating machineries and accidental drops.The external impact threats may come from airborne missiles,aircraft impact,explosion blast and fragments.The impact effects of these threats on concrete and steel structures in a nuclear power plant are discussed.Methods and procedures for the impact assessment of nuclear power plants are introduced.Recent studies on penetration and perforation mechanics as well as progresses on dynamic properties of concrete-like materials are presented to increase the understanding of the impact effects on concrete containment structures.

  9. New Frontiers of Network Security: The Threat Within

    CERN Document Server

    Sanyal, Sugata; Gupta, Amit

    2010-01-01

    Nearly 70% of information security threats originate from inside an organization. Opportunities for insider threats have been increasing at an alarming rate with the latest trends of mobility (portable devices like Laptop, smart phones etc.), ubiquitous connectivity (wireless or through 3G connectivity) and this trend increases as more and more web-based applications are made available over the Internet. Insider threats are generally caused by current or ex-employees, contractors or partners, who have authorized access to the organization's network and servers. Theft of confidential information is often for either material gain or for willful damage. Easy availability of hacking tools on the Internet, USB devices and wireless connectivity provide for easy break-ins. The net result is losses worth millions of dollars in terms of IP theft, leakage of customer / individual information, etc. This paper presents an understanding of Insider threats, attackers and their motives and suggests mitigation techniques at ...

  10. Little Threat of Zika Spread from Rio Olympics

    Science.gov (United States)

    ... html Little Threat of Zika Spread From Rio Olympics: Study Because it's winter in Brazil, mosquito activity ... HealthDay News) -- Travelers and competitors at the 2016 Olympic Games in Brazil are not likely to contract ...

  11. Racial Threat Theory: Assessing the Evidence, Requesting Redesign

    Directory of Open Access Journals (Sweden)

    Cindy Brooks Dollar

    2014-01-01

    Full Text Available Racial threat theory was developed as a way to explain how population composition influences discriminatory social control practices and has become one of the most acknowledged frameworks for explaining racial disparity in criminal justice outcomes. This paper provides a thorough review of racial threat theory and empirical assessments of the theory and demonstrates that while scholars often cite inconsistent support for the theory, empirical discrepancies may be due to insufficient attention to the conceptual complexity of racial threat. I organize and present the following review around 4 forms of state-sanctioned control mechanisms: police expenditures, arrests, sentencing, and capital punishment. Arguing that the pervasiveness of racialization in state controls warrants continued inquiry, I provide suggestions for future scholarship that will help us develop enhanced understanding of how racial threat may be operating.

  12. Wireless Security Threats, Vulnerabilities and Their Defense Mechanisms

    Directory of Open Access Journals (Sweden)

    Ankur Bawiskar

    2013-01-01

    Full Text Available In today’s world means of communications has changed rapidly and the main focus is on wireless communications. Communication in wireless mode has many threats. This paper discusses a brief overview of various threats to wireless networks at various layers and also presents a survey of the defense mechanisms. The main aim is to discuss attacks on MANET and their defense mechanisms. Communication in wireless mode is more challenging as compared to wired mode because of dynamically changing network topology. Wireless networks are mostly used in military applications and commercial applications. This paper also discusses internal threats and external threats. It also gives an overview of routing protocols being used in wireless networks and various attacks that take place against these routing protocols and their counter measures.

  13. USVI Land-Based Threat to Benthic Habitats

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set describes the potential threat of sediment delivery and land-based sources of pollution to benthic habitats. This dataset is derived from NOAA's...

  14. Contaminant exposure and potential effects on terrestrial vertebrates residing in the National Capital Region network and Mid-Atlantic network

    Science.gov (United States)

    Rattner, B.A.; Ackerson, B.K.

    2006-01-01

    Part of the mission of the National Park Service is to preserve the natural resources, processes, systems, and associated values of its units in an unimpaired condition. Environmental contamination and pollution processes are well recognized stressors addressed by its management policies and plans. A recent study indicates that contemporary terrestrial vertebrate ecotoxicological data are lacking for 59 of 126 Park Service units located in coastal watersheds exhibiting serious water quality problems or high vulnerability to pollution. Based upon these findings, a more in-depth evaluation of contaminant threats and ecotoxicological data gaps related to terrestrial vertebrates was undertaken at 23 Inventory and Monitoring National Park units in National Capital Region and Mid-Atlantic Networks.

  15. Biogeochemical signals from deep microbial life in terrestrial crust.

    Directory of Open Access Journals (Sweden)

    Yohey Suzuki

    Full Text Available In contrast to the deep subseafloor biosphere, a volumetrically vast and stable habitat for microbial life in the terrestrial crust remains poorly explored. For the long-term sustainability of a crustal biome, high-energy fluxes derived from hydrothermal circulation and water radiolysis in uranium-enriched rocks are seemingly essential. However, the crustal habitability depending on a low supply of energy is unknown. We present multi-isotopic evidence of microbially mediated sulfate reduction in a granitic aquifer, a representative of the terrestrial crust habitat. Deep meteoric groundwater was collected from underground boreholes drilled into Cretaceous Toki granite (central Japan. A large sulfur isotopic fractionation of 20-60‰ diagnostic to microbial sulfate reduction is associated with the investigated groundwater containing sulfate below 0.2 mM. In contrast, a small carbon isotopic fractionation (<30‰ is not indicative of methanogenesis. Except for 2011, the concentrations of H2 ranged mostly from 1 to 5 nM, which is also consistent with an aquifer where a terminal electron accepting process is dominantly controlled by ongoing sulfate reduction. High isotopic ratios of mantle-derived 3He relative to radiogenic 4He in groundwater and the flux of H2 along adjacent faults suggest that, in addition to low concentrations of organic matter (<70 µM, H2 from deeper sources might partly fuel metabolic activities. Our results demonstrate that the deep biosphere in the terrestrial crust is metabolically active and playing a crucial role in the formation of reducing groundwater even under low-energy fluxes.

  16. Land use effects on terrestrial carbon sources and sinks

    Institute of Scientific and Technical Information of China (English)

    Josep; G.; Canadell

    2002-01-01

    Current and past land use practices are critical in determining the distribution and size of global terrestrial carbon (C) sources and sinks. Althoughfossil fuel emissions dominate the anthropogenic perturbation of the global C cycle, land use still drives the largest portion of anthropogenic emissions in a number of tropical regions of Asia. The size of the emission flux owing to land use change is still the biggest uncertainty in the global C budget. The Intergovernmental Panel on Climate Change (IPCC) reported a flux term of 1.7 PgC@a-1 for 1990-1995 but more recent estimates suggest the magnitude of this source may be only of 0.96 PgC@a-1 for the 1990s. In addition, current and past land use practices are now thought to contribute to a large degree to the northern hemisphere terrestrial sink, and are the dominant driver for some regional sinks. However, mechanisms other than land use change need to be invoked in order to explain the inferred C sink in the tropics. Potential candidates are the carbon dioxide (CO2) fertilization and climate change; fertilization due to nitrogen (N) deposition is believed to be small or nil. Although the potential for managing C sinks is limited, improved land use management and new land uses such as reforestation and biomass fuel cropping, can further enhance current terrestrial C sinks. Best management practices in agriculture alone could sequester 0.4-0.8 PgC per year in soils if implemented globally. New methodologies to ensure verification and permanency of C sequestration need to be developed.

  17. Terrestrial vegetation carbon sinks in China, 1981―2000

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Using China's ground observations, e.g., forest inventory, grassland resource, agricultural statistics, climate, and satellite data, we estimate terrestrial vegetation carbon sinks for China's major biomes between 1981 and 2000. The main results are in the following: (1) Forest area and forest biomass carbon (C) stock increased from 116.5×106 ha and 4.3 Pg C (1 Pg C = 1015 g C) in the early 1980s to 142.8×106 ha and 5.9 Pg C in the early 2000s, respectively. Forest biomass carbon density increased form 36.9 Mg C/ha (1 Mg C = 106 g C) to 41.0 Mg C/ha, with an annual carbon sequestration rate of 0.075 Pg C/a. Grassland, shrub, and crop biomass sequestrate carbon at annual rates of 0.007 Pg C/a, 0.014―0.024 Pg C/a, and 0.0125―0.0143 Pg C/a, respectively. (2) The total terrestrial vegetation C sink in China is in a range of 0.096―0.106 Pg C/a between 1981 and 2000, accounting for 14.6%―16.1% of carbon dioxide (CO2) emitted by China's industry in the same period. In addition, soil carbon sink is estimated at 0.04―0.07 Pg C/a. Accordingly, carbon sequestration by China's terrestrial ecosystems (vegetation and soil) offsets 20.8%―26.8% of its industrial CO2 emission for the study period. (3) Considerable uncertainties exist in the present study, especially in the estimation of soil carbon sinks, and need further intensive investigation in the future.

  18. Costa Rica - An Army-less Nation Facing External Threats

    OpenAIRE

    Dall, Nana; Hammer Holm, Lasse; Kaas-Claesson, Kristina; McCay Martinez, Eamonn

    2013-01-01

    This project aims to explain how Costa Rica deal with external threats. Having abolished their military in 1948, the small state of Costa Rica situated in the conflict-ridden region of Central America, is internationally portrayed as an inspirational nation upholding peace and high morality. This has raised questions in regards to how Costa Rica upholds security in the event of threat. The project applies the International Relations theories of neo-liberalism and neo-realism to two cases: the...

  19. Survey of threat studies related to the nuclear power industry

    International Nuclear Information System (INIS)

    A considerable effort has been directed toward the determination of threat characteristics, resulting in a voluminous collection of documents. This report summarizes several of the major studies in order to make the information more accessible. This summary includes only studies involving attacks on nuclear material, plus those incidents which because of their objectives, resources, or motivations may lend insight into potential threat against nuclear facilities or material

  20. Understanding and managing human threats to the coastal marine environment.

    Science.gov (United States)

    Crain, Caitlin M; Halpern, Benjamin S; Beck, Mike W; Kappel, Carrie V

    2009-04-01

    Coastal marine habitats at the interface of land and sea are subject to threats from human activities in both realms. Researchers have attempted to quantify how these various threats impact different coastal ecosystems, and more recently have focused on understanding the cumulative impact from multiple threats. Here, the top threats to coastal marine ecosystems and recent efforts to understand their relative importance, ecosystem-level impacts, cumulative effects, and how they can best be managed and mitigated, are briefly reviewed. Results of threat analysis and rankings will differ depending on the conservation target (e.g., vulnerable species, pristine ecosystems, mitigatable threats), scale of interest (local, regional, or global), whether externalities are considered, and the types of management tools available (e.g., marine-protected areas versus ecosystem-based management). Considering the cumulative effect of multiple threats has only just begun and depends on spatial analysis to predict overlapping threats and a better understanding of multiple-stressor effects and interactions. Emerging conservation practices that hold substantial promise for protecting coastal marine systems include multisector approaches, such as ecosystem-based management (EBM), that account for ecosystem service valuation; comprehensive spatial management, such as ocean zoning; and regulatory mechanisms that encourage or require cross-sector goal setting and evaluation. In all cases, these efforts require a combination of public and private initiatives for success. The state of our ecological understanding, public awareness, and policy initiatives make the time ripe for advancing coastal marine management and improving our stewardship of coastal and marine ecosystems. PMID:19432644

  1. Current and Future Threats Framework in Smart Grid Domain

    OpenAIRE

    Procopiou, A.; Komninos, N.

    2015-01-01

    Due to smart grid’s complex nature and criticality as an infrastructure, it is important to understand the key actors on each domain in depth so the potential vulnerabilities that can rise are identified. Furthermore, the correct identification of threats affecting the smart grid’s normal functionality must be realised, as well as what impact these threats can have so appropriate countermeasures are implemented. In this paper a list of vulnerabilities that weaken the smart grid is outlined. A...

  2. Biological warfare agents as threats to potable water.

    OpenAIRE

    Burrows, W D; Renner, S E

    1999-01-01

    Nearly all known biological warfare agents are intended for aerosol application. Although less effective as potable water threats, many are potentially capable of inflicting heavy casualties when ingested. Significant loss of mission capability can be anticipated even when complete recovery is possible. Properly maintained field army water purification equipment can counter this threat, but personnel responsible for the operation and maintenance of the equipment may be most at risk of exposur...

  3. 76 FR 22878 - Closed Meeting of the Threat Reduction Advisory Committee

    Science.gov (United States)

    2011-04-25

    ... of the Secretary Closed Meeting of the Threat Reduction Advisory Committee AGENCY: Office of the... Defense announces the following Federal advisory committee meeting of the Threat Reduction Advisory... 22206. ] FOR FURTHER INFORMATION CONTACT: Contact Mr. William Hostyn, Defense Threat Reduction...

  4. Understanding changes in terrestrial water storage over West Africa between 2002 and 2014

    Science.gov (United States)

    Ndehedehe, Christopher; Awange, Joseph; Agutu, Nathan; Kuhn, Michael; Heck, Bernhard

    2016-02-01

    With the vast water resources of West Africa coming under threat due to the impacts of climate variability and human influence, the need to understand its terrestrial water storage (TWS) changes becomes very important. Due to the lack of consistent in-situ hydrological data to assist in the monitoring of changes in TWS, this study takes advantage of the Gravity Recovery and Climate Experiment (GRACE) monthly gravity fields to provide estimates of vertically integrated changes in TWS over the period 2002-2014, in addition to satellite altimetry data for the period 1993-2014. In order to understand TWS variability over West Africa, Principal Component Analysis (PCA), a second order statistical technique, and Multiple Linear Regression Analysis (MLRA) are employed. Results show that dominant patterns of GRACE-derived TWS changes are observed mostly in the West Sahel, Guinea Coast, and Middle Belt regions of West Africa. This is probably caused by high precipitation rates at seasonal and inter-annual time scales induced by ocean circulations, altitude and physiographic features. While the linear trend for the spatially averaged GRACE-derived TWS changes over West Africa for the study period shows an increase of 6.85 ± 1.67 mm/yr, the PCA result indicates a significant increase of 20.2 ± 5.78 mm/yr in Guinea, a region with large inter-annual variability in seasonal rainfall, heavy river discharge, and huge groundwater potentials. The increase in GRACE-derived TWS during this period in Guinea, though inconsistent with the lack of a significant positive linear trend in TRMM based precipitation, is attributed to a large water surplus from prolonged wet seasons and lower evapotranspiration rates, leading to an increase in storage and inundated areas over the Guinea region. This increase in storage, which is also the aftermath of cumulative increase in the volume of water not involved in surface runoff, forms the huge freshwater availability in this region. However, the

  5. 77 FR 18271 - Terrestrial Environmental Studies for Nuclear Power Stations

    Science.gov (United States)

    2012-03-27

    ... COMMISSION Terrestrial Environmental Studies for Nuclear Power Stations AGENCY: Nuclear Regulatory Commission... revision to Regulatory Guide (RG) 4.11, ``Terrestrial Environmental Studies for Nuclear Power Stations... environmental studies and analyses supporting licensing decisions for nuclear power reactors. ADDRESSES:...

  6. Louisiana ESI: T_MAMMAL (Terrestrial Mammal Polygons)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains sensitive biological resource data for terrestrial mammals in Louisiana. Vector polygons in this data set represent terrestrial mammal...

  7. Pacific Remote Islands MNM: Initial Survey Instructions for Terrestrial Arthropods

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purposes of the terrestrial arthropod surveys are to: develop a species list of native and non-native terrestrial arthropods on land portions of the refuge;...

  8. Attentional bias to threat: a perceptual accuracy approach.

    Science.gov (United States)

    Van Damme, Stefaan; Crombez, Geert; Notebaert, Lies

    2008-12-01

    To investigate attentional bias to threatening information, the authors propose a new version of the spatial cueing paradigm in which the focus is on perceptual accuracy instead of response speed. In two experiments, healthy volunteers made unspeeded discriminations between three visual targets presented left or right. Each target was preceded by a visual cue (colored rectangle) at either the same (valid) or opposite (invalid) location. By means of differential classical conditioning with aversive white noise, a threat cue and a control cue were created. Analyses of error rates showed that cueing effects (lower proportion of errors in valid trials relative to invalid trials) were more pronounced in threat trials than in neutral trials. This threat-related bias was particularly because of threat cues reducing accuracy in invalid trials, indicating difficulty disengaging attention from threatening information. Engagement of attention was not affected by threat, as threat cues did not facilitate the processing of targets in valid trials. The findings are discussed in light of the strengths and limitations of spatial cueing tasks.

  9. Does stereotype threat affect women in academic medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists. PMID:22361794

  10. Exciting fear in adolescence: Does pubertal development alter threat processing?

    Directory of Open Access Journals (Sweden)

    Jeffrey M. Spielberg

    2014-04-01

    Full Text Available Adolescent development encompasses an ostensible paradox in threat processing. Risk taking increases dramatically after the onset of puberty, contributing to a 200% increase in mortality. Yet, pubertal maturation is associated with increased reactivity in threat-avoidance systems. In the first part of this paper we propose a heuristic model of adolescent affective development that may help to reconcile aspects of this paradox, which focuses on hypothesized pubertal increases in the capacity to experience (some fear-evoking experiences as an exciting thrill. In the second part of this paper, we test key features of this model by examining brain activation to threat cues in a longitudinal study that disentangled pubertal and age effects. Pubertal increases in testosterone predicted increased activation to threat cues, not only in regions associated with threat avoidance (i.e., amygdala, but also regions associated with reward pursuit (i.e., nucleus accumbens. These findings are consistent with our hypothesis that puberty is associated with a maturational shift toward more complex processing of threat cues—which may contribute to adolescent tendencies to explore and enjoy some types of risky experiences.

  11. Feature based passive acoustic detection of underwater threats

    Science.gov (United States)

    Stolkin, Rustam; Sutin, Alexander; Radhakrishnan, Sreeram; Bruno, Michael; Fullerton, Brian; Ekimov, Alexander; Raftery, Michael

    2006-05-01

    Stevens Institute of Technology is performing research aimed at determining the acoustical parameters that are necessary for detecting and classifying underwater threats. This paper specifically addresses the problems of passive acoustic detection of small targets in noisy urban river and harbor environments. We describe experiments to determine the acoustic signatures of these threats and the background acoustic noise. Based on these measurements, we present an algorithm for robustly discriminating threat presence from severe acoustic background noise. Measurements of the target's acoustic radiation signal were conducted in the Hudson River. The acoustic noise in the Hudson River was also recorded for various environmental conditions. A useful discriminating feature can be extracted from the acoustic signal of the threat, calculated by detecting packets of multi-spectral high frequency sound which occur repetitively at low frequency intervals. We use experimental data to show how the feature varies with range between the sensor and the detected underwater threat. We also estimate the effective detection range by evaluating this feature for hydrophone signals, recorded in the river both with and without threat presence.

  12. A Bayesian belief network of threat anticipation and terrorist motivations

    Science.gov (United States)

    Olama, Mohammed M.; Allgood, Glenn O.; Davenport, Kristen M.; Schryver, Jack C.

    2010-04-01

    Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) as well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.

  13. The Meaning of Collective Terrorist Threat: Understanding the Subjective Causes of Terrorism Reduces Its Negative Psychological Impact

    OpenAIRE

    Fischer, Peter; Postmes, Tom; Koeppl, Julia; Conway, Lianne; Fredriksson, Tom

    2011-01-01

    This article hypothesized that the possibility to construct intellectual meaning of a terrorist attack (i.e., whether participants can cognitively understand why the perpetrators did their crime) reduces the negative psychological consequences typically associated with increased terrorist threat. Concretely, the authors investigated the effect of intellectual meaning (induced by providing additional information about potential economic, cultural, and historical reasons for the terrorist attac...

  14. Shock-implanted noble gases. II - Additional experimental studies and recognition in naturally shocked terrestrial materials

    Science.gov (United States)

    Bogard, Donald; Horz, Friedrich; Johnson, Pratt

    1989-01-01

    The process by which ambient gases can be implanted into silicates by shocks was investigated by analyzing the noble-gas content of several experimentally and naturally shocked silicate samples. The retentivity of shock-implanted gas during stepwise heating in the laboratory was defined in terms of two parameters, namely, the activation energy for diffusion and the extraction temperature at which 50 percent of the gas is released, both of which correlate with the shock pressure. The experiments indicate that, with increasing shock pressure, gas implantation occurs through an increasing production of microcracks/defects in the silicate lattice. The degree of annealing of these defects control the degree of diffusive loss of implanted gas.

  15. Observed Oceanic and Terrestrial Drivers of North African Climate

    Science.gov (United States)

    Yu, Y.; Notaro, M.; Wang, F.; Mao, J.; Shi, X.; Wei, Y.

    2015-12-01

    Hydrologic variability can pose a serious threat to the poverty-stricken regions of North Africa. Yet, the current understanding of oceanic versus terrestrial drivers of North African droughts/pluvials is largely model-based, with vast disagreement among models. In order to identify the observed drivers of North African climate and develop a benchmark for model evaluations, the multivariate Generalized Equilibrium Feedback Assessment (GEFA) is applied to observations, remotely sensed data, and reanalysis products. The identified primary oceanic drivers of North African rainfall variability are the Atlantic, tropical Indian, and tropical Pacific Oceans and Mediterranean Sea. During the summer monsoon, positive tropical eastern Atlantic sea-surface temperature (SST) anomalies are associated with a southward shift of the Inter-Tropical Convergence Zone, enhanced ocean evaporation, and greater precipitable water across coastal West Africa, leading to increased West African monsoon (WAM) rainfall and decreased Sahel rainfall. During the short rains, positive SST anomalies in the western tropical Indian Ocean and negative anomalies in the eastern tropical Indian Ocean support greater easterly oceanic flow, evaporation over the western ocean, and moisture advection to East Africa, thereby enhancing rainfall. The sign, magnitude, and timing of observed vegetation forcing on rainfall vary across North Africa. The positive feedback of leaf area index (LAI) on rainfall is greatest during DJF for the Horn of Africa, while it peaks in autumn and is weakest during the summer monsoon for the Sahel. Across the WAM region, a positive LAI anomaly supports an earlier monsoon onset, increased rainfall during the pre-monsoon, and decreased rainfall during the wet season. Through unique mechanisms, positive LAI anomalies favor enhanced transpiration, precipitable water, and rainfall across the Sahel and Horn of Africa, and increased roughness, ascent, and rainfall across the WAM region

  16. Non fisheries threats - Risk, status and trends of non-fisheries threats in the California Current to groundfish species

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — We are calculating the risk of focal groundfish species to non-fisheries related threats (e.g. shipping activity, inorganic pollution) and comparing the relative...

  17. Vegetated landslide monitoring: target tracking with terrestrial laser scanner

    Science.gov (United States)

    Franz, Martin; Carrea, Dario; Abellan, Antonio; Derron, Marc-Henri; Jaboyedoff, Michel

    2013-04-01

    this method. The low cost of the additional field equipment and the relatively low time of installation makes it interesting and deserve to be further developed. The automatic data analysis method considerably lowered the errors and was way faster than a manual operation. Those combined methods offer new application field for vegetated landslide monitoring using terrestrial laser scanner, including a more accurate and faster treatment.

  18. Monitoring stream bluff erosion using repeat terrestrial laser scanning

    Science.gov (United States)

    Neitzel, G.; Gran, K. B.

    2012-12-01

    Terrestrial laser scanning (TLS) technology provides high-resolution topographic data that can be used to detect geomorphic change in fluvial environments. In this study, we utilize successive terrestrial laser scans to investigate the relationship between peak flow rates and stream bluff erosion in the Amity Creek watershed in Duluth, Minnesota. We also combine TLS scan results with bluff inventories from airborne lidar to estimate the volume of sediment erosion from bluffs in the watershed, which is an important source of fine sediment contributing to the creek's turbidity impairment. We selected nine study bluffs to conduct terrestrial laser scans on after all significant flood events over a two-year time period. The study employs a Faro Focus 3D phase-shift laser to collect data. Post-processing of the TLS-point cloud data sets involves: (1) removal of vegetation and objects other than the erosional surface of interest; (2) decimation of the point cloud in PC Tools and extraction of zmin values to produce a data set manageable in GIS; (3) creation of a bare earth digital elevation model (DEM) for each set of scans using ArcMap; and (4) utilization of Geomorphic Change Detection (GCD) software to generate DEMs of Difference (DODs) from subsequent terrestrial laser scans. Preliminary results from three flooding events indicate significant erosional activity at all field sites. Slumps were observed at two bluffs following spring melt and freeze/thaw cycling. Two major precipitation events in late spring and early summer provided a unique opportunity to observe the impact of extreme high flow events on bluff erosion throughout the watershed using TLS technology. 4.75 inches of intermittent rain over a six-day period in late May 2012 (May 23-28) resulted in slumping at many bluffs and one major failure. The ≥100-year flood that occurred on June 19-20 (7.25 inches), 2012 was powerful enough to induce considerable channel change. Slumps occurred at six study sites

  19. Terrestrial matter effects on reactor antineutrino oscillations at JUNO or RENO-50: how small is small?

    CERN Document Server

    Li, Yu-Feng; Xing, Zhi-zhong

    2016-01-01

    We have carefully examined, in both analytical and numerical ways, how small the terrestrial matter effects can be in a given medium-baseline reactor antineutrino oscillation experiment like JUNO or RENO-50. Taking the ongoing JUNO experiment for example, we show that the inclusion of terrestrial matter effects may reduce the sensitivity of the neutrino mass ordering measurement by \\Delta \\chi^2_{\\rm MO} \\simeq 0.6, and a neglect of such effects may shift the best-fit values of the flavor mixing angle \\theta_{12} and the neutrino mass-squared difference \\Delta_{21} by about 1\\sigma to 2\\sigma in the future data analysis. In addition, a preliminary estimate indicates that a 2\\sigma sensitivity of establishing the terrestrial matter effects can be achieved for about 10 years of data taking at JUNO with the help of a proper near detector implementation.

  20. Aquatic carbon cycling in the conterminous United States and implications for terrestrial carbon accounting.

    Science.gov (United States)

    Butman, David; Stackpoole, Sarah; Stets, Edward; McDonald, Cory P; Clow, David W; Striegl, Robert G

    2016-01-01

    Inland water ecosystems dynamically process, transport, and sequester carbon. However, the transport of carbon through aquatic environments has not been quantitatively integrated in the context of terrestrial ecosystems. Here, we present the first integrated assessment, to our knowledge, of freshwater carbon fluxes for the conterminous United States, where 106 (range: 71-149) teragrams of carbon per year (TgC⋅y(-1)) is exported downstream or emitted to the atmosphere and sedimentation stores 21 (range: 9-65) TgC⋅y(-1) in lakes and reservoirs. We show that there is significant regional variation in aquatic carbon flux, but verify that emission across stream and river surfaces represents the dominant flux at 69 (range: 36-110) TgC⋅y(-1) or 65% of the total aquatic carbon flux for the conterminous United States. Comparing our results with the output of a suite of terrestrial biosphere models (TBMs), we suggest that within the current modeling framework, calculations of net ecosystem production (NEP) defined as terrestrial only may be overestimated by as much as 27%. However, the internal production and mineralization of carbon in freshwaters remain to be quantified and would reduce the effect of including aquatic carbon fluxes within calculations of terrestrial NEP. Reconciliation of carbon mass-flux interactions between terrestrial and aquatic carbon sources and sinks will require significant additional research and modeling capacity.

  1. Aquatic carbon cycling in the conterminous United States and implications for terrestrial carbon accounting

    Science.gov (United States)

    Butman, David; Stackpoole, Sarah; Stets, Edward; McDonald, Cory P.; Clow, David W.; Striegl, Robert G.

    2016-01-01

    Inland water ecosystems dynamically process, transport, and sequester carbon. However, the transport of carbon through aquatic environments has not been quantitatively integrated in the context of terrestrial ecosystems. Here, we present the first integrated assessment, to our knowledge, of freshwater carbon fluxes for the conterminous United States, where 106 (range: 71–149) teragrams of carbon per year (TgC⋅y−1) is exported downstream or emitted to the atmosphere and sedimentation stores 21 (range: 9–65) TgC⋅y−1 in lakes and reservoirs. We show that there is significant regional variation in aquatic carbon flux, but verify that emission across stream and river surfaces represents the dominant flux at 69 (range: 36–110) TgC⋅y−1 or 65% of the total aquatic carbon flux for the conterminous United States. Comparing our results with the output of a suite of terrestrial biosphere models (TBMs), we suggest that within the current modeling framework, calculations of net ecosystem production (NEP) defined as terrestrial only may be overestimated by as much as 27%. However, the internal production and mineralization of carbon in freshwaters remain to be quantified and would reduce the effect of including aquatic carbon fluxes within calculations of terrestrial NEP. Reconciliation of carbon mass–flux interactions between terrestrial and aquatic carbon sources and sinks will require significant additional research and modeling capacity. PMID:26699473

  2. Estimating Tropical Forest Structure Using a Terrestrial Lidar

    Science.gov (United States)

    Palace, Michael; Sullivan, Franklin B; Ducey, Mark; Herrick, Christina

    2016-01-01

    Forest structure comprises numerous quantifiable biometric components and characteristics, which include tree geometry and stand architecture. These structural components are important in the understanding of the past and future trajectories of these biomes. Tropical forests are often considered the most structurally complex and yet least understood of forested ecosystems. New technologies have provided novel avenues for quantifying biometric properties of forested ecosystems, one of which is LIght Detection And Ranging (lidar). This sensor can be deployed on satellite, aircraft, unmanned aerial vehicles, and terrestrial platforms. In this study we examined the efficacy of a terrestrial lidar scanner (TLS) system in a tropical forest to estimate forest structure. Our study was conducted in January 2012 at La Selva, Costa Rica at twenty locations in a predominantly undisturbed forest. At these locations we collected field measured biometric attributes using a variable plot design. We also collected TLS data from the center of each plot. Using this data we developed relative vegetation profiles (RVPs) and calculated a series of parameters including entropy, Fast Fourier Transform (FFT), number of layers and plant area index to develop statistical relationships with field data. We developed statistical models using a series of multiple linear regressions, all of which converged on significant relationships with the strongest relationship being for mean crown depth (r2 = 0.88, p measured structure. Models for biomass estimation included structural canopy variables in addition to height metrics. Our work indicates that vegetation profiles from TLS data can provide useful information on forest structure. PMID:27124295

  3. Stratospheric sulfate geoengineering could enhance the terrestrial photosynthesis rate

    Science.gov (United States)

    Xia, L.; Robock, A.; Tilmes, S.; Neely, R. R., III

    2016-02-01

    Stratospheric sulfate geoengineering could impact the terrestrial carbon cycle by enhancing the carbon sink. With an 8 Tg yr-1 injection of SO2 to produce a stratospheric aerosol cloud to balance anthropogenic radiative forcing from the Representative Concentration Pathway 6.0 (RCP6.0) scenario, we conducted climate model simulations with the Community Earth System Model - the Community Atmospheric Model 4 fully coupled to tropospheric and stratospheric chemistry (CAM4-chem). During the geoengineering period, as compared to RCP6.0, land-averaged downward visible (300-700 nm) diffuse radiation increased 3.2 W m-2 (11 %). The enhanced diffuse radiation combined with the cooling increased plant photosynthesis by 0.07 ± 0.02 µmol C m-2 s-1, which could contribute to an additional 3.8 ± 1.1 Gt C yr-1 global gross primary productivity without explicit nutrient limitation. This increase could potentially increase the land carbon sink. Suppressed plant and soil respiration due to the cooling would reduce natural land carbon emission and therefore further enhance the terrestrial carbon sink during the geoengineering period. This potentially beneficial impact of stratospheric sulfate geoengineering would need to be balanced by a large number of potential risks in any future decisions about the implementation of geoengineering.

  4. Stratospheric sulfate geoengineering enhances terrestrial gross primary productivity

    Science.gov (United States)

    Xia, L.; Robock, A.; Tilmes, S.; Neely, R. R., III

    2015-09-01

    Stratospheric sulfate geoengineering could impact the terrestrial carbon cycle by enhancing the carbon sink. With an 8 Tg yr-1 injection of SO2 to balance a Representative Concentration Pathway 6.0 (RCP6.0) scenario, we conducted climate model simulations with the Community Earth System Model, with the Community Atmospheric Model 4 fully coupled to tropospheric and stratospheric chemistry (CAM4-chem). During the geoengineering period, as compared to RCP6.0, land-averaged downward visible diffuse radiation increased 3.2 W m-2 (11 %). The enhanced diffuse radiation combined with the cooling increased plant photosynthesis by 2.4 %, which could contribute to an additional 3.8 ± 1.1 Gt C yr-1 global gross primary productivity without nutrient limitation. This increase could potentially increase the land carbon sink. Suppressed plant and soil respiration due to the cooling would reduce natural land carbon emission and therefore further enhance the terrestrial carbon sink during the geoengineering period. This beneficial impact of stratospheric sulfate geoengineering would need to be balanced by a large number of potential risks in any future decisions about implementation of geoengineering.

  5. Stratospheric sulfate geoengineering enhances terrestrial gross primary productivity

    Directory of Open Access Journals (Sweden)

    L. Xia

    2015-09-01

    Full Text Available Stratospheric sulfate geoengineering could impact the terrestrial carbon cycle by enhancing the carbon sink. With an 8 Tg yr−1 injection of SO2 to balance a Representative Concentration Pathway 6.0 (RCP6.0 scenario, we conducted climate model simulations with the Community Earth System Model, with the Community Atmospheric Model 4 fully coupled to tropospheric and stratospheric chemistry (CAM4-chem. During the geoengineering period, as compared to RCP6.0, land-averaged downward visible diffuse radiation increased 3.2 W m−2 (11 %. The enhanced diffuse radiation combined with the cooling increased plant photosynthesis by 2.4 %, which could contribute to an additional 3.8 ± 1.1 Gt C yr−1 global gross primary productivity without nutrient limitation. This increase could potentially increase the land carbon sink. Suppressed plant and soil respiration due to the cooling would reduce natural land carbon emission and therefore further enhance the terrestrial carbon sink during the geoengineering period. This beneficial impact of stratospheric sulfate geoengineering would need to be balanced by a large number of potential risks in any future decisions about implementation of geoengineering.

  6. Leo-Based Optical/Microwave Terrestrial Communications

    CERN Document Server

    Meulenberg, Andrew; Ramanathan, Shivram

    2010-01-01

    We propose a LEO-based communication system that is built by deploying circum-terra, optic fibers connecting hundreds of small (perhaps) phased-array-communications and RF-signal-transfer antennas around the earth on multiple rings. The proposed LEO-earth connection will be through microwave links (Ku or low-Ka band) and many of the ISL's through the optic-fiber rings. Inter-ring connectivity could be with either high-Ka band or optical (laser) links. The initial ring would serve to complement existing terrestrial fiber networks; but, the system would expand with additional rings into non-equatorial planes to provide global connectivity. The proposed system would make use of connectivity & broadcasting capability of satellite constellations as well as the high throughput point-to-point capability of optic-fiber systems. The advantages, options, and economics of the proposed LEO optic-fiber / microwave communication system over existing terrestrial- and space-communication systems (of similar functionality...

  7. Biophysical constraints on gross primary production by the terrestrial biosphere

    Directory of Open Access Journals (Sweden)

    H. Wang

    2014-02-01

    Full Text Available Persistent divergences among the predictions of complex carbon cycle models include differences in the sign as well as the magnitude of the response of global terrestrial primary production to climate change. This and other problems with current models indicate an urgent need to re-assess the principles underlying the environmental controls of primary production. The global patterns of annual and maximum monthly terrestrial gross primary production (GPP by C3 plants are explored here using a simple first-principles model based on the light-use efficiency formalism and the Farquhar model for C3 photosynthesis. The model is driven by incident photosynthetically active radiation (PAR and remotely sensed green vegetation cover, with additional constraints imposed by low-temperature inhibition and CO2 limitation. The ratio of leaf-internal to ambient CO2 concentration in the model responds to growing-season mean temperature, atmospheric dryness (indexed by the cumulative water deficit, ΔE and elevation, based on optimality theory. The greatest annual GPP is predicted for tropical moist forests, but the maximum (summer monthly GPP can be as high or higher in boreal or temperate forests. These findings are supported by a new analysis of CO2 flux measurements. The explanation is simply based on the seasonal and latitudinal distribution of PAR combined with the physiology of photosynthesis. By successively imposing biophysical constraints, it is shown that partial vegetation cover – driven primarily by water shortage – represents the largest constraint on global GPP.

  8. The terrestrial bioluminescent animals of Japan.

    Science.gov (United States)

    Oba, Yuichi; Branham, Marc A; Fukatsu, Takema

    2011-11-01

    Light production by organisms, or bioluminescence, has fascinated not only scientists but also ordinary people all over the world, and it has been especially so in Japan. Here we review the biological information available to date for all luminous terrestrial animals known from Japan, particularly focusing on their diversity and systematics, their biology and ecology in Japan, and putative function and biochemistry of their luminescence. In total 58 luminous terrestrial animals have been described from Japan, which consist of 50 fireflies (Coleoptera: Lampyridae), one glowworm beetle (Coleoptera: Phengodidae), two fungus gnats (Diptera: Keroplatidae), one springtail (Collembola), one millipede (Diplopoda), one centipede (Chilopoda) and two earthworms (Oligochaeta). For all except some firefly species, the DNA "barcode" sequences of a cytochrome oxidase subunit I region are provided. We also introduce how intricately the seasonal appearance and glimmering of luminous insects, in particular those of fireflies, have been interwoven into the culture, art, literature and mentality of Japanese people. PMID:22035300

  9. Microbial diversity drives multifunctionality in terrestrial ecosystems.

    Science.gov (United States)

    Delgado-Baquerizo, Manuel; Maestre, Fernando T; Reich, Peter B; Jeffries, Thomas C; Gaitan, Juan J; Encinar, Daniel; Berdugo, Miguel; Campbell, Colin D; Singh, Brajesh K

    2016-01-01

    Despite the importance of microbial communities for ecosystem services and human welfare, the relationship between microbial diversity and multiple ecosystem functions and services (that is, multifunctionality) at the global scale has yet to be evaluated. Here we use two independent, large-scale databases with contrasting geographic coverage (from 78 global drylands and from 179 locations across Scotland, respectively), and report that soil microbial diversity positively relates to multifunctionality in terrestrial ecosystems. The direct positive effects of microbial diversity were maintained even when accounting simultaneously for multiple multifunctionality drivers (climate, soil abiotic factors and spatial predictors). Our findings provide empirical evidence that any loss in microbial diversity will likely reduce multifunctionality, negatively impacting the provision of services such as climate regulation, soil fertility and food and fibre production by terrestrial ecosystems. PMID:26817514

  10. Application of Terrestrial Environments in Orion Assessments

    Science.gov (United States)

    Barbre, Robert E.

    2016-01-01

    This presentation summarizes the Marshall Space Flight Center Natural Environments Terrestrial and Planetary Environments (TPE) Team support to the NASA Orion space vehicle. The TPE utilizes meteorological data to assess the sensitivities of the vehicle due to the terrestrial environment. The Orion vehicle, part of the Multi-Purpose Crew Vehicle Program, is designed to carry astronauts beyond low-earth orbit and is currently undergoing a series of tests including Exploration Test Flight (EFT) - 1. The presentation describes examples of TPE support for vehicle design and several tests, as well as support for EFT-1 and planning for upcoming Exploration Missions while emphasizing the importance of accounting for the natural environment's impact to the vehicle early in the vehicle's program.

  11. Microbial diversity drives multifunctionality in terrestrial ecosystems.

    Science.gov (United States)

    Delgado-Baquerizo, Manuel; Maestre, Fernando T; Reich, Peter B; Jeffries, Thomas C; Gaitan, Juan J; Encinar, Daniel; Berdugo, Miguel; Campbell, Colin D; Singh, Brajesh K

    2016-01-28

    Despite the importance of microbial communities for ecosystem services and human welfare, the relationship between microbial diversity and multiple ecosystem functions and services (that is, multifunctionality) at the global scale has yet to be evaluated. Here we use two independent, large-scale databases with contrasting geographic coverage (from 78 global drylands and from 179 locations across Scotland, respectively), and report that soil microbial diversity positively relates to multifunctionality in terrestrial ecosystems. The direct positive effects of microbial diversity were maintained even when accounting simultaneously for multiple multifunctionality drivers (climate, soil abiotic factors and spatial predictors). Our findings provide empirical evidence that any loss in microbial diversity will likely reduce multifunctionality, negatively impacting the provision of services such as climate regulation, soil fertility and food and fibre production by terrestrial ecosystems.

  12. Threat affects risk preferences in movement decision making

    Directory of Open Access Journals (Sweden)

    Megan K. O'Brien

    2015-06-01

    Full Text Available Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching and whole-body leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory. Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the whole-body task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the whole-body movements than in arm-reaching at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects’ inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  13. Effects of threat management interactions on conservation priorities.

    Science.gov (United States)

    Auerbach, Nancy A; Wilson, Kerrie A; Tulloch, Ayesha I T; Rhodes, Jonathan R; Hanson, Jeffrey O; Possingham, Hugh P

    2015-12-01

    Decisions need to be made about which biodiversity management actions are undertaken to mitigate threats and about where these actions are implemented. However, management actions can interact; that is, the cost, benefit, and feasibility of one action can change when another action is undertaken. There is little guidance on how to explicitly and efficiently prioritize management for multiple threats, including deciding where to act. Integrated management could focus on one management action to abate a dominant threat or on a strategy comprising multiple actions to abate multiple threats. Furthermore management could be undertaken at sites that are in close proximity to reduce costs. We used cost-effectiveness analysis to prioritize investments in fire management, controlling invasive predators, and reducing grazing pressure in a bio-diverse region of southeastern Queensland, Australia. We compared outcomes of 5 management approaches based on different assumptions about interactions and quantified how investment needed, benefits expected, and the locations prioritized for implementation differed when interactions were taken into account. Managing for interactions altered decisions about where to invest and in which actions to invest and had the potential to deliver increased investment efficiency. Differences in high priority locations and actions were greatest between the approaches when we made different assumptions about how management actions deliver benefits through threat abatement: either all threats must be managed to conserve species or only one management action may be required. Threatened species management that does not consider interactions between actions may result in misplaced investments or misguided expectations of the effort required to mitigate threats to species.

  14. Ebola Virus ─ A Global Threat

    OpenAIRE

    Mejbah Uddin Ahmed; Sushmita Roy

    2015-01-01

    Ebola virus is a filamentous, enveloped, non-segmented, single-stranded, negative-sense RNA virus. It belongs to the Filoviridae and was first recognized near the Ebola River valley in Zaire in 1976. Since then most of the outbreaks have occurred to both human and nonhuman primates in sub-Saharan Africa. Ebola virus causes highly fatal hemorrhagic fever in human and nonhuman primates. In addition to hemorrhagic fever, it could be used as a bioterrorism agent. Although its natural reservoir is...

  15. A toy terrestrial carbon flow model

    Science.gov (United States)

    Parton, William J.; Running, Steven W.; Walker, Brian

    1992-01-01

    A generalized carbon flow model for the major terrestrial ecosystems of the world is reported. The model is a simplification of the Century model and the Forest-Biogeochemical model. Topics covered include plant production, decomposition and nutrient cycling, biomes, the utility of the carbon flow model for predicting carbon dynamics under global change, and possible applications to state-and-transition models and environmentally driven global vegetation models.

  16. Furostanol and Spirostanol Saponins from Tribulus terrestris.

    Science.gov (United States)

    Wang, Zhen-Fang; Wang, Bing-Bing; Zhao, Yang; Wang, Fang-Xu; Sun, Yan; Guo, Rui-Jie; Song, Xin-Bo; Xin, Hai-Li; Sun, Xin-Guang

    2016-01-01

    Twelve new steroidal saponins, including eleven furostanol saponins, terrestrinin J-T (1-11), and one spirostanol saponin, terrestrinin U (12), together with seven known steroidal saponins 13-19 were isolated from T. terrestris. The structures of the new compounds were established on the basis of spectroscopic data, including 1D and 2D NMR and HRESIMS, and comparisons with published data. PMID:27043512

  17. Terrestrial VLF transmitter injection into the magnetosphere

    OpenAIRE

    İnan, Umran Savaş; Cohen, M. B.

    2012-01-01

    Terrestrial VLF transmitter injection into the magnetosphere M. B. Cohen1 and U. S. Inan1,2 Received 1 June 2012; revised 15 June 2012; accepted 18 June 2012; published 9 August 2012. [1] Very Low Frequency (VLF, 3–30 kHz) radio waves emitted from ground sources (transmitters and lightning) strongly impact the radiation belts, driving electron precipitation via whistler-electron gyroresonance, and contributing to the formation of the slot region. However, calculations of the...

  18. Antarctic terrestrial ecosystems: responses to environmental change

    OpenAIRE

    Convey, Peter

    2006-01-01

    The consequences of climate change are exciting considerable concern worldwide. Parts of Antarctica are facing the most rapid rates of anthropogenic climate change currently seen on the planet. This paper sets out to introduce contemporary ecosystems of the Antarctic, and the factors that have influenced them and their biodiversity over evolutionary timescales. Contemporary climate change processes significant to terrestrial biota, and the biological consequences of these changes seen t...

  19. Astrophysical and terrestrial neutrinos in Supernova detectors

    International Nuclear Information System (INIS)

    Supernova (SN) explosions are the place of very fundamental phenomena, whose privileged messengers are neutrinos. But such events are very rare. Then, SN detection has to be combined with other purposes. The recent developments of SN detectors have been associated with developments of underground particle physics (proton decay, monopoles ...). But here, I will restrict myself to discuss the possibilities for a supernova detector to be sensitive to other sources of neutrinos, astrophysical or terrestrial

  20. Scaling of sensorimotor control in terrestrial mammals

    OpenAIRE

    More, Heather Louise

    2013-01-01

    Terrestrial mammals span a wide range of sizes, with the largest elephant being several million times more massive than the smallest shrew. This huge size range results in small and large animals experiencing very different physical challenges, yet all animals must effectively interact with their environment to survive. In order to sense and respond to stimuli with similar speed and precision, small and large animals may need to control their movement in different ways. To begin to understand...

  1. Furostanol and Spirostanol Saponins from Tribulus terrestris

    Directory of Open Access Journals (Sweden)

    Zhen-Fang Wang

    2016-03-01

    Full Text Available Twelve new steroidal saponins, including eleven furostanol saponins, terrestrinin J–T (1–11, and one spirostanol saponin, terrestrinin U (12, together with seven known steroidal saponins 13–19 were isolated from T. terrestris. The structures of the new compounds were established on the basis of spectroscopic data, including 1D and 2D NMR and HRESIMS, and comparisons with published data.

  2. Terrestrial Reference Frame from GPS and SLR

    Science.gov (United States)

    Weiss, Jan; Bertiger, Willy; Desai, Shailen; Haines, Bruce; Sibois, Aurore

    2015-04-01

    We present strategies for realizing the terrestrial reference frame (TRF) using tracking data from terrestrial GPS receivers alone and in tandem with the GRACE and LAGEOS satellites. We generate solutions without apriori ties to the International Terrestrial Reference Frame (ITRF). Our approach relies on processing multi-day orbit arcs to take advantage of the satellite dynamics, GPS receiver and transmitter calibrations derived from low-Earth orbiter (LEO) data, and estimation strategies tuned for realizing a stable and accurate TRF. We furthermore take advantage of the geometric diversity provided by GPS tracking from GRACE, and explore the impacts of including ground-based satellite laser range (SLR) measurements to LAGEOS-1 and -2 with local ties relating the two geodetic techniques. We process data from 2003-2014 and compute Helmert transformations relative to ITRF/IGb08. With GPS alone we achieve a 3D origin offset and rate of global solutions. Scale bias and rate are 3.1 ppb and 0.01 ppb/yr in either solution. Including SLR tracking from 11 ground stations to the LAGEOS satellites from 2012-2014 yields a reduction in scale bias of 0.5-1.0 ppb depending on the weight assigned to the SLR measurements. However, scatter is increased due to the relatively sparse SLR tracking network. We conclude with approaches for improving the TRF realized from GPS and SLR combined at the measurement level.

  3. Global demand for gold is another threat for tropical forests

    Science.gov (United States)

    Alvarez-Berríos, Nora L.; Aide, T. Mitchell

    2015-01-01

    The current global gold rush, driven by increasing consumption in developing countries and uncertainty in financial markets, is an increasing threat for tropical ecosystems. Gold mining causes significant alteration to the environment, yet mining is often overlooked in deforestation analyses because it occupies relatively small areas. As a result, we lack a comprehensive assessment of the spatial extent of gold mining impacts on tropical forests. In this study, we provide a regional assessment of gold mining deforestation in the tropical moist forest biome of South America. Specifically, we analyzed the patterns of forest change in gold mining sites between 2001 and 2013, and evaluated the proximity of gold mining deforestation to protected areas (PAs). The forest cover maps were produced using the Land Mapper web application and images from the MODIS satellite MOD13Q1 vegetation indices 250 m product. Annual maps of forest cover were used to model the incremental change in forest in ˜1600 potential gold mining sites between 2001-2006 and 2007-2013. Approximately 1680 km2 of tropical moist forest was lost in these mining sites between 2001 and 2013. Deforestation was significantly higher during the 2007-2013 period, and this was associated with the increase in global demand for gold after the international financial crisis. More than 90% of the deforestation occurred in four major hotspots: Guianan moist forest ecoregion (41%), Southwest Amazon moist forest ecoregion (28%), Tapajós-Xingú moist forest ecoregion (11%), and Magdalena Valley montane forest and Magdalena-Urabá moist forest ecoregions (9%). In addition, some of the more active zones of gold mining deforestation occurred inside or within 10 km of ˜32 PAs. There is an urgent need to understand the ecological and social impacts of gold mining because it is an important cause of deforestation in the most remote forests in South America, and the impacts, particularly in aquatic systems, spread well

  4. Global demand for gold is another threat for tropical forests

    International Nuclear Information System (INIS)

    The current global gold rush, driven by increasing consumption in developing countries and uncertainty in financial markets, is an increasing threat for tropical ecosystems. Gold mining causes significant alteration to the environment, yet mining is often overlooked in deforestation analyses because it occupies relatively small areas. As a result, we lack a comprehensive assessment of the spatial extent of gold mining impacts on tropical forests. In this study, we provide a regional assessment of gold mining deforestation in the tropical moist forest biome of South America. Specifically, we analyzed the patterns of forest change in gold mining sites between 2001 and 2013, and evaluated the proximity of gold mining deforestation to protected areas (PAs). The forest cover maps were produced using the Land Mapper web application and images from the MODIS satellite MOD13Q1 vegetation indices 250 m product. Annual maps of forest cover were used to model the incremental change in forest in ∼1600 potential gold mining sites between 2001–2006 and 2007–2013. Approximately 1680 km2 of tropical moist forest was lost in these mining sites between 2001 and 2013. Deforestation was significantly higher during the 2007–2013 period, and this was associated with the increase in global demand for gold after the international financial crisis. More than 90% of the deforestation occurred in four major hotspots: Guianan moist forest ecoregion (41%), Southwest Amazon moist forest ecoregion (28%), Tapajós–Xingú moist forest ecoregion (11%), and Magdalena Valley montane forest and Magdalena–Urabá moist forest ecoregions (9%). In addition, some of the more active zones of gold mining deforestation occurred inside or within 10 km of ∼32 PAs. There is an urgent need to understand the ecological and social impacts of gold mining because it is an important cause of deforestation in the most remote forests in South America, and the impacts, particularly in aquatic systems

  5. An Expert System For Multispectral Threat Assessment And Response

    Science.gov (United States)

    Steinberg, Alan N.

    1987-05-01

    A concept has been defined for an automatic system to manage the self-defense of a combat aircraft. Distinctive new features of this concept include: a. the flexible prioritization of tasks and coordinated use of sensor, countermeasures, flight systems and weapons assets by means of an automated planning function; b. the integration of state-of-the-art data fusion algorithms with event prediction processing; c. the use of advanced Artificial Intelligence tools to emulate the decision processes of tactical EW experts. Threat Assessment functions (a) estimate threat identity, lethality and intent on the basis of multi-spectral sensor data, and (b) predict the time to critical events in threat engagements (e.g., target acquisition, tracking, weapon launch, impact). Response Management functions (a) select candidate responses to reported threat situations; (b) estimate the effects of candidate actions on survival; and (c) coordinate the assignment of sensors, weapons and countermeasures with the flight plan. The system employs Finite State Models to represent current engagements and to predict subsequent events. Each state in a model is associated with a set of observable features, allowing interpretation of sensor data and adaptive use of sensor assets. Defined conditions on state transitions allow prediction of times to critical future states and are used in planning self-defensive responses, which are designed either to impede a particular state transition or to force a transition to a lower threat state.

  6. Matching and fairness in threat-based mobile sensor coverage

    Energy Technology Data Exchange (ETDEWEB)

    Cheng-Yu, Ma T. [Purdue Univ., West Lafayette, IN (United States). Dept. of Computer Science; Yau, King Y. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States). Spallation Neutron Source (SNS); Chin, Jren-Chit [Purdue Univ., West Lafayette, IN (United States). Dept. of Computer Science; Rao, Nageswara S. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States). Spallation Neutron Source (SNS); Shankar, Mallikarjun [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States). Spallation Neutron Source (SNS)

    2009-12-01

    Mobile sensors can be used to effect complete coverage of a surveillance area for a given threat over time, thereby reducing the number of sensors necessary. The surveillance area may have a given threat profile as determined by the kind of threat, and accompanying meteorological, environmental, and human factors. In planning the movement of sensors, areas that are deemed higher threat should receive proportionately higher coverage. We propose a coverage algorithm for mobile sensors to achieve a coverage that will match - over the long term and as quantified by an RMSE metric - a given threat profile. Moreover, the algorithm has the following desirable properties: (1) stochastic, so that it is robust to contingencies and makes it hard for an adversary to anticipate the sensor's movement, (2) efficient, and (3) practical, by avoiding movement over inaccessible areas. Further to matching, we argue that a fairness measure of performance over the shorter time scale is also important. We show that the RMSE and fairness are, in general, antagonistic, and argue for the need of a combined measure of performance, which we call efficacy. We show how a pause time parameter of the coverage algorithm can be used to control the trade-off between the RMSE and fairness, and present an efficient offline algorithm to determine the optimal pause time maximizing the efficacy. Finally, we discuss the effects of multiple sensors, under both independent and coordinated operation. Extensive simulation results - under realistic coverage scenarios - are presented for performance evaluation.

  7. Benefits of integrating complementarity into priority threat management.

    Science.gov (United States)

    Chadés, Iadine; Nicol, Sam; van Leeuwen, Stephen; Walters, Belinda; Firn, Jennifer; Reeson, Andrew; Martin, Tara G; Carwardine, Josie

    2015-04-01

    Conservation decision tools based on cost-effectiveness analysis are used to assess threat management strategies for improving species persistence. These approaches rank alternative strategies by their benefit to cost ratio but may fail to identify the optimal sets of strategies to implement under limited budgets because they do not account for redundancies. We devised a multiobjective optimization approach in which the complementarity principle is applied to identify the sets of threat management strategies that protect the most species for any budget. We used our approach to prioritize threat management strategies for 53 species of conservation concern in the Pilbara, Australia. We followed a structured elicitation approach to collect information on the benefits and costs of implementing 17 different conservation strategies during a 3-day workshop with 49 stakeholders and experts in the biodiversity, conservation, and management of the Pilbara. We compared the performance of our complementarity priority threat management approach with a current cost-effectiveness ranking approach. A complementary set of 3 strategies: domestic herbivore management, fire management and research, and sanctuaries provided all species with >50% chance of persistence for $4.7 million/year over 20 years. Achieving the same result cost almost twice as much ($9.71 million/year) when strategies were selected by their cost-effectiveness ranks alone. Our results show that complementarity of management benefits has the potential to double the impact of priority threat management approaches.

  8. Spatial patterns of carbon, biodiversity, deforestation threat, and REDD+ projects in Indonesia

    Science.gov (United States)

    Murray, Josil P; Grenyer, Richard; Wunder, Sven; Raes, Niels; Jones, Julia PG

    2015-01-01

    There are concerns that Reduced Emissions from Deforestation and forest Degradation (REDD+) may fail to deliver potential biodiversity cobenefits if it is focused on high carbon areas. We explored the spatial overlaps between carbon stocks, biodiversity, projected deforestation threats, and the location of REDD+ projects in Indonesia, a tropical country at the forefront of REDD+ development. For biodiversity, we assembled data on the distribution of terrestrial vertebrates (ranges of amphibians, mammals, birds, reptiles) and plants (species distribution models for 8 families). We then investigated congruence between different measures of biodiversity richness and carbon stocks at the national and subnational scales. Finally, we mapped active REDD+ projects and investigated the carbon density and potential biodiversity richness and modeled deforestation pressures within these forests relative to protected areas and unprotected forests. There was little internal overlap among the different hotspots (richest 10% of cells) of species richness. There was also no consistent spatial congruence between carbon stocks and the biodiversity measures: a weak negative correlation at the national scale masked highly variable and nonlinear relationships island by island. Current REDD+ projects were preferentially located in areas with higher total species richness and threatened species richness but lower carbon densities than protected areas and unprotected forests. Although a quarter of the total area of these REDD+ projects is under relatively high deforestation pressure, the majority of the REDD+ area is not. In Indonesia at least, first-generation REDD+ projects are located where they are likely to deliver biodiversity benefits. However, if REDD+ is to deliver additional gains for climate and biodiversity, projects will need to focus on forests with the highest threat to deforestation, which will have cost implications for future REDD+ implementation. Los Patrones Espaciales

  9. Workshop on Oxygen in the Terrestrial Planets

    Science.gov (United States)

    2004-01-01

    This volume contains abstracts that have been accepted for presentation at the Workshop on Oxygen in the Terrestrial Planets, July 20-23,2004, Santa Fe, New Mexico. The contents include: 1) Experimental Constraints on Oxygen and Other Light Element Partitioning During Planetary Core Formation; 2) In Situ Determination of Fe(3+)/SigmaFe of Spinels by Electron Microprobe: An Evaluation of the Flank Method; 3) The Effect of Oxygen Fugacity on Large-Strain Deformation and Recrystallization of Olivine; 4) Plagioclase-Liquid Trace Element Oxygen Barometry and Oxygen Behaviour in Closed and Open System Magmatic Processes; 5) Core Formation in the Earth: Constraints from Ni and Co; 6) Oxygen Isotopic Compositions of the Terrestrial Planets; 7) The Effect of Oxygen Fugacity on Electrical Conduction of Olivine and Implications for Earth s Mantle; 8) Redox Chemical Diffusion in Silicate Melts: The Impact of the Semiconductor Condition; 9) Ultra-High Temperature Effects in Earth s Magma Ocean: Pt and W Partitioning; 10) Terrestrial Oxygen and Hydrogen Isotope Variations: Primordial Values, Systematics, Subsolidus Effects, Planetary Comparisons, and the Role of Water; 11) Redox State of the Moon s Interior; 12) How did the Terrestrial Planets Acquire Their Water?; 13) Molecular Oxygen Mixing Ratio and Its Seasonal Variability in the Martian Atmosphere; 14) Exchange Between the Atmosphere and the Regolith of Mars: Discussion of Oxygen and Sulfur Isotope Evidence; 15) Oxygen and Hydrogen Isotope Systematics of Atmospheric Water Vapor and Meteoric Waters: Evidence from North Texas; 16) Implications of Isotopic and Redox Heterogeneities in Silicate Reservoirs on Mars; 17) Oxygen Isotopic Variation of the Terrestrial Planets; 18) Redox Exchanges in Hydrous Magma; 19) Hydrothermal Systems on Terrestrial Planets: Lessons from Earth; 20) Oxygen in Martian Meteorites: A Review of Results from Mineral Equilibria Oxybarometers; 21) Non-Linear Fractionation of Oxygen Isotopes Implanted in

  10. Canine distemper virus as a threat to wild tigers in Russia and across their range.

    Science.gov (United States)

    Gilbert, Martin; Soutyrina, Svetlana V; Seryodkin, Ivan V; Sulikhan, Nadezhda; Uphyrkina, Olga V; Goncharuk, Mikhail; Matthews, Louise; Cleaveland, Sarah; Miquelle, Dale G

    2015-07-01

    Canine distemper virus (CDV) has recently been identified in populations of wild tigers in Russia and India. Tiger populations are generally too small to maintain CDV for long periods, but are at risk of infections arising from more abundant susceptible hosts that constitute a reservoir of infection. Because CDV is an additive mortality factor, it could represent a significant threat to small, isolated tiger populations. In Russia, CDV was associated with the deaths of tigers in 2004 and 2010, and was coincident with a localized decline of tigers in Sikhote-Alin Biosphere Zapovednik (from 25 tigers in 2008 to 9 in 2012). Habitat continuity with surrounding areas likely played an important role in promoting an ongoing recovery. We recommend steps be taken to assess the presence and the impact of CDV in all tiger range states, but should not detract focus away from the primary threats to tigers, which include habitat loss and fragmentation, poaching and retaliatory killing. Research priorities include: (i) recognition and diagnosis of clinical cases of CDV in tigers when they occur; and (ii) collection of baseline data on the health of wild tigers. CDV infection of individual tigers need not imply a conservation threat, and modeling should complement disease surveillance and targeted research to assess the potential impact to tiger populations across the range of ecosystems, population densities and climate extremes occupied by tigers. Describing the role of domestic and wild carnivores as contributors to a local CDV reservoir is an important precursor to considering control measures. PMID:25939829

  11. Global Threat Reduction Initiative International Partners' Conference. Summary of the proceedings and findings of the conference

    International Nuclear Information System (INIS)

    The Global Threat Reduction Initiative (GTRI) International Partners' Conference took place in Vienna, Austria, from September 18-19, 2004. More than 590 representatives from 100 International Atomic Energy Agency (IAEA) Member States attended the GTRI International Partners' Conference on September 18-19, 2004, in Vienna, Austria. Representatives from ten non-governmental and international organizations were also present during the conference. The Governments of the United States and the Russian Federation co-sponsored the International Partners Conference, with support from the International Atomic Energy Agency. The purpose of the International Partners' Conference was to build and broaden international support for efforts by national authorities to identify, secure, recover, and/or facilitate the disposition of high-risk nuclear and radioactive materials that pose a potential threat to the international community. One of the significant outcomes of the International Partners Conference was reaching agreement on the Findings of the Conference (enclosed in this document) by participating Member States that outlined a broadly shared opinion of participating Member States on efforts to reduce the potential threat posed by vulnerable, unsecured nuclear and other radioactive material. It is hoped that this document can be used as a framework to consolidate, expand, and accelerate domestic, regional, and IAEA programs that address unsecured vulnerable nuclear and radioactive materials, as deemed necessary by Member States. As a first step, participating members states urged the international community to note additional opportunities to further build support for activities related to GTRI

  12. Improving buried threat detection in ground-penetrating radar with transfer learning and metadata analysis

    Science.gov (United States)

    Colwell, Kenneth A.; Torrione, Peter A.; Morton, Kenneth D.; Collins, Leslie M.

    2015-05-01

    Ground-penetrating radar (GPR) technology has proven capable of detecting buried threats. The system relies on a binary classifier that is trained to distinguish between two classes: a target class, encompassing many types of buried threats and their components; and a nontarget class, which includes false alarms from the system prescreener. Typically, the training process involves a simple partition of the data into these two classes, which allows for straightforward application of standard classifiers. However, since training data is generally collected in fully controlled environments, it includes auxiliary information about each example, such as the specific type of threat, its purpose, its components, and its depth. Examples from the same specific or general type may be expected to exhibit similarities in their GPR data, whereas examples from different types may differ greatly. This research aims to leverage this additional information to improve overall classification performance by fusing classifier concepts for multiple groups, and to investigate whether structure in this information can be further utilized for transfer learning, such that the amount of expensive training data necessary to learn a new, previously-unseen target type may be reduced. Methods for accomplishing these goals are presented with results from a dataset containing a variety of target types.

  13. Effects of Self-Evaluation Threat on Schadenfreude Toward Strangers in a Reality TV Show.

    Science.gov (United States)

    Watanabe, Hitomi

    2016-06-01

    Schadenfreude toward strangers in a reality TV show may be affected by self-evaluation threat. This study extends previous work by adding a control group to positive and negative feedback groups in order to investigate the effects of self-evaluation threat. Sex of the target of schadenfreude and schadenfroh participant was considered. Among undergraduate students screened for low general self-esteem, 31 men (M = 20.3 ± 1.6 years old) and 59 women (M = 20.0 ± 1.2 years old) volunteered to participate. Participants performed a simple calculation task, and then received negative, positive, or no feedback regarding the task before completing the State Self-Esteem Scale and watching videos taken from American Idol that showed an applicant being criticized by judges. After watching videos, participants completed items related to schadenfreude. There were no differences in schadenfreude toward strangers between the three feedback groups. In addition to the Japanese tendency of reduced self-enhancement in self-threatening situations, targets with no psychological closeness may also explain the lack of a relationship between self-evaluation threat and schadenfreude. PMID:27170640

  14. Acquisition strategies for terrestrial photogrammetric surveys

    Science.gov (United States)

    Piermattei, Livia; Karel, Wilfried; Vettore, Antonio; Pfeifer, Norbert

    2016-04-01

    Close-range photogrammetry based on Structure from Motion (SfM) and dense image matching algorithms is being rapidly adopted in the fields of geosciences thanks to its characteristics of low costs, portability of the instrumentation, high level of automation, and high levels of detail. However, special care should be taken while planning photogrammetric surveys to optimize the 3D model quality and spatial coverage. This means that the geometric configurations of the multi-view camera network and the control data have to be designed in accordance with the required accuracy, resolution and completeness. From a practical application point of view, a proper planning (of both photos and control data) of the photogrammetric survey especially for ground-based acquisition, is not always ensured due to limited accessibility of the target object and the presence of occlusions. In this work, we investigate how to solve these practical problems of a ground-based photogrammetric survey. We propose a different image acquisition strategy based on image sequences acquired in panorama mode. This means that at each established position a series of pictures with overlapping fields of view are taken on a conventional tripod, turning the camera about a common point of rotation, to cover the object of interest. While due to the offset of the pivot point from the projection center, these images cannot be stitched into a panorama, we demonstrate how to still take advantage of this capturing mode. Additionally, we test different geo-referencing procedures using i) different ground control points (GCP) configurations i.e. number and distribution of artificial targets measured with topographic instrumentation, ii) natural features employed as GCPs whose coordinates are extracted from a modern terrestrial laser scanner (TLS) point cloud, and iii) directly observed coordinates of the camera positions. Images of the test field in a low-slope artificial hill were acquired from the ground using

  15. Alien terrestrial crustaceans (Isopods and Amphipods. Chapter 7.1

    Directory of Open Access Journals (Sweden)

    Pierre-Olivier Cochard

    2010-07-01

    Full Text Available A total of 17 terrestrial crustacean species aliens to Europe of which 13 isopods (woodlice and 4 amphipods (lawn shrimps have established on the continent. In addition, 21 species native to Europe were introduced in a European region to which they are not native. The establishment of alien crustacean species in Europe slowly increased during the 20th century without any marked changes during the recent decades. Almost all species alien to Europe originate from sub-tropical or tropical areas. Most of the initial introductions were recorded in greenhouses, botanical gardens and urban parks, probably associated with passive transport of soil, plants or compost. Alien woodlice are still confined to urban habitats. Natural habitats have only been colonized by three amphipod species in the family Talitridade.

  16. Plasmoids in Reconnecting Current Sheets: Solar and Terrestrial Contexts Compared

    CERN Document Server

    Lin, J; Farrugia, C J

    2008-01-01

    Magnetic reconnection plays a crucial role in violent energy conversion occurring in the environments of high electrical conductivity, such as the solar atmosphere, magnetosphere, and fusion devices. We focus on the morphological features of the process in two different environments, the solar atmosphere and the geomagnetic tail. In addition to indirect evidence that indicates reconnection in progress or having just taken place, such as auroral manifestations in the magnetosphere and the flare loop system in the solar atmosphere, more direct evidence of reconnection in the solar and terrestrial environments is being collected. Such evidence includes the reconnection inflow near the reconnecting current sheet, and the outflow along the sheet characterized by a sequence of plasmoids. Both turbulent and unsteady Petschek-type reconnection processes could account for the observations. We also discuss other relevant observational consequences of both mechanisms in these two settings. While on face value, these are...

  17. Applications of plasma core reactors to terrestrial energy systems

    Science.gov (United States)

    Latham, T. S.; Biancardi, F. R.; Rodgers, R. J.

    1974-01-01

    Plasma core reactors offer several new options for future energy needs in addition to space power and propulsion applications. Power extraction from plasma core reactors with gaseous nuclear fuel allows operation at temperatures higher than conventional reactors. Highly efficient thermodynamic cycles and applications employing direct coupling of radiant energy are possible. Conceptual configurations of plasma core reactors for terrestrial applications are described. Closed-cycle gas turbines, MHD systems, photo- and thermo-chemical hydrogen production processes, and laser systems using plasma core reactors as prime energy sources are considered. Cycle efficiencies in the range of 50 to 65 percent are calculated for closed-cycle gas turbine and MHD electrical generators. Reactor advantages include continuous fuel reprocessing which limits inventory of radioactive by-products and thorium-U-233 breeder configurations with about 5-year doubling times.-

  18. A vector relational data modeling approach to Insider threat intelligence

    Science.gov (United States)

    Kelly, Ryan F.; Anderson, Thomas S.

    2016-05-01

    We address the problem of detecting insider threats before they can do harm. In many cases, co-workers notice indications of suspicious activity prior to insider threat attacks. A partial solution to this problem requires an understanding of how information can better traverse the communication network between human intelligence and insider threat analysts. Our approach employs modern mobile communications technology and scale free network architecture to reduce the network distance between human sensors and analysts. In order to solve this problem, we propose a Vector Relational Data Modeling approach to integrate human "sensors," geo-location, and existing visual analytics tools. This integration problem is known to be difficult due to quadratic increases in cost associated with complex integration solutions. A scale free network integration approach using vector relational data modeling is proposed as a method for reducing network distance without increasing cost.

  19. Threat Assessment of Targets Based on Support Vector Machine

    Institute of Scientific and Technical Information of China (English)

    CAI Huai-ping; LIU Jing-xu; CHEN Ying-wu

    2006-01-01

    In the context of cooperative engagement of armored vehicles, the threat factors of offensive targets are analyzed, and a threat assessment (TA) model is built based on a support v.ector machine (SVM) method. The SVM-based model has some advantages over the traditional method-based models: the complex factors of threat are considered in the cooperative engagement; the shortcomings of neural networks, such as local minimum and "over fitting", are overcome to improve the generalization ability; its operation speed is high and meets the needs of real time C2 of cooperative engagement; the assessment results could be more reasonable because of its self-learning capability. The analysis and simulation indicate that the SVM method is an effective method to resolve the TA problems.

  20. Advanced Research Workshop on Preparedness for Nuclear and Radiological Threats

    CERN Document Server

    Diamond, David; Nuclear Threats and Security Challenges

    2015-01-01

    With the dissolution of the Soviet Union the nuclear threats facing the world are constantly evolving and have grown more complex since the end of the Cold War. The diversion of complete weapon systems or nuclear material to rogue nations and terrorist organizations has increased. The events of the past years have proved the necessity to reevaluate these threats on a level never before considered.  In recognition that no single country possesses all of the answers to the critical scientific, institutional and legal questions associated with combating nuclear and radiological terrorism, the NATO Advanced Research Workshop on “Preparedness for Nuclear and Radiological Threats” and this proceeding was structured to promote wide-ranging, multi-national exploration of critical technology needs and underlying scientific challenges to reducing the threat of nuclear/radiological terrorism; to illustrate through country-specific presentations how resulting technologies were used in national programs; and to outli...

  1. Threat of heavy metal pollution in halophytic and mangrove plants of Tamil Nadu, India

    Energy Technology Data Exchange (ETDEWEB)

    Agoramoorthy, Govindasamy; Chen, F.-A. [Department of Pharmacy, Tajen University, Yanpu, Pingtung 907, Taiwan (China); Hsu, Minna J. [Department of Biological Sciences, National Sun Yat-sen University, Kaohsiung 80424, Taiwan (China)], E-mail: hsumin@mail.nsysu.edu.tw

    2008-09-15

    Mangrove and halophytic plants occur along the coastal areas of Tamil Nadu, south India and these plants have been used in traditional medicine for centuries. Heavy metals are known to pose a potential threat to terrestrial and aquatic biota. However, little is known on the toxic levels of heavy metals found in mangrove and halophytic plants that are used in traditional medicine in India. To understand heavy metal toxicity, we investigated the bioconcentration factors (BCF) of heavy metals in leaves collected from eight mangroves and five halophytes in the protected Pichavaram mangrove forest reserve in Tamil Nadu State, south India. Data presented in this paper describe the impact of essential (Cu, Fe, Mg, Mn and Zn) and non-essential/environmentally toxic trace metals (Hg, Pb and Sn) in mangrove and halophytic medicinal plants. The concentrations of Pb among 13 plant species were higher than the normal range of contamination reported for plants. The average concentration of Hg in the halophytic plants (0.43 {+-} 0.37 {mu}g/g) was seven times higher than mangrove plants (0.06 {+-} 0.03 {mu}g/g) and it indicated pollutants from industrial sources affecting halophytes more than mangroves. - Metal effects occur in India's mangrove ecosystem.

  2. 49 CFR 1572.21 - Procedures for TWIC security threat assessment.

    Science.gov (United States)

    2010-10-01

    ... described in 49 CFR 1572.5. The Initial Determination of Threat Assessment includes— (i) A statement that... described in 49 CFR 1572.5 and may pose an imminent security threat. The Initial Determination of Threat... 49 Transportation 9 2010-10-01 2010-10-01 false Procedures for TWIC security threat...

  3. Phishing - A Growing Threat to E-Commerce

    CERN Document Server

    Banday, M Tariq

    2011-01-01

    In today's business environment, it is difficult to imagine a workplace without access to the web, yet a variety of email born viruses, spyware, adware, Trojan horses, phishing attacks, directory harvest attacks, DoS attacks, and other threats combine to attack businesses and customers. This paper is an attempt to review phishing - a constantly growing and evolving threat to Internet based commercial transactions. Various phishing approaches that include vishing, spear phishng, pharming, keyloggers, malware, web Trojans, and others will be discussed. This paper also highlights the latest phishing analysis made by Anti-Phishing Working Group (APWG) and Korean Internet Security Center.

  4. Quality of life threats in recreational and competitive sport

    DEFF Research Database (Denmark)

    Støckel, Jan Toftegaard

    Quality of life threats in recreational and competitive sport Author: ass. Professor Jan Toftegaard Støckel Key words: sport, stress, depression, illness, Previous research has shown that personal issues (nutrition, injury, goals and expectations), coach-athlete issues (coach, coaching style......, depression or illness (SDI) by odds ratio 6,5 in elite sport compared to recreational sport. One in eight athletes reported SDI and highest associations are related to coach behavior. The key question for this abstract is to examine whether men and women are equally vulnerable to SDI at various sport levels...... and secondly what types of behaviors may pose the biggest threats to athlete welfare....

  5. Threat representative droplet generation and surface interaction analysis

    Science.gov (United States)

    Simpson, Steven; Chyba, Thomas H.; Jones, Robert M.; Harper, Gordon; Haslam, Diane

    2011-05-01

    We present our experiments with state-of-the-art equipment to dispense threat-representative (3 - 90 nL) freely falling droplets of viscous chemical material (material can be created on demand and the behavior of the droplet on a surface can be monitored as a function of time. Knowledge of how these droplets behave on surfaces is critical in understanding an entire chemical threat scenario and directly impacts the design, testing, and success of standoff surface chemical sensor technology and modeling efforts alike. We are currently working to address this knowledge gap by recording 'cradle-to-grave' droplet dissemination and surface interaction events.

  6. Present and potential security threats posed to civil aviation

    Directory of Open Access Journals (Sweden)

    Stanislav SZABO

    2012-06-01

    Full Text Available Aircraft presents ideal object for terrorist attack. Apart from the risks posed by possible terrorist attacks on airborne aircraft, air terrorism includes the threats to general aviation on the ground, including airports and surrounding infrastructure. Air oriented terrorism in all of its forms can undermine public confidence in the safety of air travel, which could result in negative effects for certain airlines and other firms in aviation industry due to decline in passenger travel and cargo shipment. This article is giving an overview about the redoubtable present and potential future threats posed to in-flight security, and possibilities and solutions how to mitigate the risks on acceptable level.

  7. The indoor as a scene for biological threats

    DEFF Research Database (Denmark)

    Storgaard, Kresten; Gunnarsen, Lars; Bräuner, Elvira

    2014-01-01

    on the user-interface of the first prototype, a second user-interface was developed. We tested the first generation prototype in combination with the second generation user interface on two types of users: A) First responders with experience in bio-threat action and B) Facility Management operators......The paper presents the result of involving users in developing a user-friendly device for easy and fast detection of bio-threats in indoor settings. Bio-protect is a project supported by the European Commission, with the concept of developing a fast-alert, mobile, easy-to-use device to detect...

  8. The alien terrestrial invertebrate fauna of the High Arctic archipelago of Svalbard: potential implications for the native flora and fauna

    Directory of Open Access Journals (Sweden)

    Stephen J. Coulson

    2015-09-01

    Full Text Available Experience from the Antarctic indicates that the establishment of alien species may have significant negative effects on native flora and fauna in polar regions and is considered to be amongst the greatest threats to biodiversity. But, there have been few similar studies from the Arctic. Although the terrestrial invertebrate inventory of the Svalbard Archipelago is amongst the most complete for any region of the Arctic, no consideration has yet been made of alien terrestrial invertebrate species, their invasiveness tendencies, threat to the native biology or their route of entry. Such baseline information is critical for appropriate management strategies. Fifteen alien invertebrate species have established in the Svalbard environment, many of which have been introduced via imported soils. Biosecurity legislation now prohibits such activities. None of the recorded established aliens yet show invasive tendencies but some may have locally negative effects. Ten species are considered to be vagrants and a further seven are classified as observations. Vagrants and the observations are not believed to be able to establish in the current tundra environment. The high connectivity of Svalbard has facilitated natural dispersal processes and may explain why few alien species are recorded compared to isolated islands in the maritime Antarctic. The vagrant species observed are conspicuous Lepidoptera, implying that less evident vagrant species are also arriving regularly. Projected climate change may enable vagrant species to establish, with results that are difficult to foresee.

  9. Terrestrial mammals in an Atlantic Forest remnant, Paraná, Brazil

    Directory of Open Access Journals (Sweden)

    Gustavo Borba de Miranda

    2013-11-01

    Full Text Available The threat degree and the ecological importance of terrestrial mammals make clear the need for constantly conducting researches in order to add information to the current knowledge on this theme. This study aimed to provide a list of terrestrial mammal species in an Atlantic Forest remnant located in the Southwestern Paraná state, Brazil. Species richness and occurrence frequency were studied from April to October 2009 using two methods: direct observation and recording of traces. We registered 20 taxa distributed into 7 orders: Artiodactyla, Carnivora, Didelphimorphia, Lagomorpha, Primates, Rodentia, and Xenarthra. Among these, 4 taxa were registered either by direct observation or by recording of traces and the others were registered only through traces. The most frequently occurring species were Didelphis sp. (30.6% and Cerdocyon thous (25.6%. Out of the 20 registered taxa, Leopardus pardalis, Leopardus tigrinus, and Cuniculus paca are listed as vulnerable in the Red Book of Threatened Fauna in Parana State. Although small, the study area may assist in the availability of food and shelter for the fauna of mammals, representing an important element of the regional landscape.

  10. Acute oral toxicity of chemicals in terrestrial life stages of amphibians: Comparisons to birds and mammals.

    Science.gov (United States)

    Crane, Mark; Finnegan, Meaghean; Weltje, Lennart; Kosmala-Grzechnik, Sylwia; Gross, Melanie; Wheeler, James R

    2016-10-01

    Amphibians are currently the most threatened and rapidly declining group of vertebrates and this has raised concerns about their potential sensitivity and exposure to plant protection products and other chemicals. Current environmental risk assessment procedures rely on surrogate species (e.g. fish and birds) to cover the risk to aquatic and terrestrial life stages of amphibians, respectively. Whilst a recent meta-analysis has shown that in most cases amphibian aquatic life stages are less sensitive to chemicals than fish, little research has been conducted on the comparative sensitivity of terrestrial amphibian life stages. Therefore, in this paper we address the questions "What is the relative sensitivity of terrestrial amphibian life stages to acute chemical oral exposure when compared with mammals and birds?" and "Are there correlations between oral toxicity data for amphibians and data for mammals or birds?" Identifying a relationship between these data may help to avoid additional vertebrate testing. Acute oral amphibian toxicity data collected from the scientific literature and ecotoxicological databases were compared with toxicity data for mammals and birds. Toxicity data for terrestrial amphibian life stages are generally sparse, as noted in previous reviews. Single-dose oral toxicity data for terrestrial amphibian life stages were available for 26 chemicals and these were positively correlated with LD50 values for mammals, while no correlation was found for birds. Further, the data suggest that oral toxicity to terrestrial amphibian life stages is similar to or lower than that for mammals and birds, with a few exceptions. Thus, mammals or birds are considered adequate toxicity surrogates for use in the assessment of the oral exposure route in amphibians. However, there is a need for further data on a wider range of chemicals to explore the wider applicability of the current analyses and recommendations.

  11. Radiological threat, public and media: a psychosociological view

    International Nuclear Information System (INIS)

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  12. Radiological threat, public and media: a psychosociological view

    Energy Technology Data Exchange (ETDEWEB)

    Arciszewski, T. [University Rene Descartes - Paris 5, 92 - Boulogne (France)

    2006-07-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  13. Panorama Image Sets for Terrestrial Photogrammetric Surveys

    Science.gov (United States)

    Piermattei, L.; Karel, W.; Vettore, A.; Pfeifer, N.

    2016-06-01

    High resolution 3D models produced from photographs acquired with consumer-grade cameras are becoming increasingly common in the fields of geosciences. However, the quality of an image-based 3D model depends on the planning of the photogrammetric surveys. This means that the geometric configuration of the multi-view camera network and the control data have to be designed in accordance with the required accuracy, resolution and completeness. From a practical application point of view, a proper planning (of both photos and control data) of the photogrammetric survey especially for terrestrial acquisition, is not always ensured due to limited accessibility of the target object and the presence of occlusions. To solve these problems, we propose a different image acquisition strategy and we test different geo-referencing scenarios to deal with the practical issues of a terrestrial photogrammetric survey. The proposed photogrammetric survey procedure is based on the acquisition of a sequence of images in panorama mode by rotating the camera on a standard tripod. The offset of the pivot point from the projection center prevents the stitching of these images into a panorama. We demonstrate how to still take advantage of this capturing mode. The geo-referencing investigation consists of testing the use of directly observed coordinates of the camera positions, different ground control point (GCP) configurations, and GCPs with different accuracies, i.e. artificial targets vs. natural features. Images of the test field in a low-slope hill were acquired from the ground using an SLR camera. To validate the photogrammetric results a terrestrial laser scanner survey is used as benchmark.

  14. Terrestrial exoplanets: diversity, habitability and characterization

    Energy Technology Data Exchange (ETDEWEB)

    Selsis, Franck [CRAL: Centre de Recherche Astrophysique de Lyon (CNRS), Universite de Lyon, Ecole Normale Superieure de Lyon, 46 allee d' Italie, F-69007 Lyon (France); Kaltenegger, Lisa [Harvard-Smithsonian Center for Astrophysics, 60 Garden Street, Cambridge, MA 02138 (United States); Paillet, Jimmy [ESTEC SCI-SA, Keplerlaan 1, PO Box 299, 2200AG Noordwijk (Netherlands)], E-mail: franck.selsis@ens-lyon.fr, E-mail: lkaltene@cfa.harvard.edu, E-mail: jpaillet@rssd.esa.int

    2008-08-15

    After a decade rich in giant exoplanet detections, observation techniques have now reached the sensitivity to gain information on the physical structure and chemical content of some of the detected planets and also to find planets of less than 10 M{sub +}. The detection and characterization of Earth-like planets is approaching rapidly and dedicated space observatories are already in operation (CoRoT) or in the development phase (Kepler, Darwin and TPF-I/C). In this paper, we explore the domain of terrestrial planets, emphasizing habitable worlds. We discuss the possibility of performing a spectral characterization of their properties using the next generation of astronomical instruments.

  15. A New Furostanol Glycoside from Tribulus terrestris

    Directory of Open Access Journals (Sweden)

    Tonghua Liu

    2010-01-01

    Full Text Available Besides two known glycosides, a new furostanol glycoside was isolated from the Fruits of Tribulus terrestris L. The structure of the new furostanol glycoside was established as 26-O-β-D-glucopyranosyl-(25S-5α-furostane-20(22-en-12-one-3β, 26-diol-3-O-α-L-rhamnopyranosyl-(1→2-[β-D-glucopyranosyl-(1→4]-β-D-galactopyranoside (1 on the basis of 1D and 2D-NMR techniques, including COSY, HMBC, and HMQC correlations.

  16. A New Furostanol Glycoside from Tribulus terrestris

    OpenAIRE

    Tonghua Liu; Yue Liu; Haiou Zhou; Shengxu Xie; Yunshan Si; Tunhai Xu; Yonghong Liu; Yajuan Xu; Dongming Xu

    2010-01-01

    Besides two known glycosides, a new furostanol glycoside was isolated from the Fruits of Tribulus terrestris L. The structure of the new furostanol glycoside was established as 26-O-β-D-glucopyranosyl-(25S)-5α-furostane-20(22)-en-12-one-3β, 26-diol-3-O-α-L-rhamnopyranosyl-(1→2)-[β-D-glucopyranosyl-(1→4)]-β-D-galactopyranoside (1) on the basis of 1D and 2D-NMR techniques, including COSY, HMBC, and HMQC correlations.

  17. Water On -and In- Terrestrial Planets

    CERN Document Server

    Cowan, Nicolas B

    2015-01-01

    Earth has a unique surface character among Solar System worlds. Not only does it harbor liquid water, but also large continents. An exoplanet with a similar appearance would remind us of home, but it is not obvious whether such a planet is more likely to bear life than an entirely ocean-covered waterworld---after all, surface liquid water defines the canonical habitable zone. In this proceeding, I argue that 1) Earth's bimodal surface character is critical to its long-term climate stability and hence is a signpost of habitability, and 2) we will be able to constrain the surface character of terrestrial exoplanets with next-generation space missions.

  18. Radio communications with extra-terrestrial civilizations

    Science.gov (United States)

    Kotelnikov, V. A.

    1974-01-01

    Communications between civilizations within our galaxy at the present level of radio engineering is possible, although civilizations must begin to search for each other to achieve this. If an extra-terrestrial civilization possessing a technology at our level wishes to make itself known and will transmit special radio signals to do this, then it can be picked up by us at a distance of several hundreds of light years using already existing radio telescopes and specially built radio receivers. If it wishes, this civilization can also send us information without awaiting our answer.

  19. Global analytic treatment of terrestrial photogrammetric networks

    CERN Document Server

    Mayoud, M

    1980-01-01

    In order to solve certain special CERN metrology problems, analytical terrestrial photogrammetry may have some advantages which are first discussed along with their drawbacks and limitations. In this application, it is necessary to carry out a rigorous and global adjustment of the observations and simultaneously process all the perspective ray bundles. The basic principles, the least squares solution and the stochastic analysis of the results are presented. However, for the CERN project, one wonders if the production of digital theodolites is going to reduce the advantages of the photogrammetric method. (12 refs).

  20. The origin of modern terrestrial life

    OpenAIRE

    Forterre, Patrick; Gribaldo, Simonetta

    2007-01-01

    The study of the origin of life covers many areas of expertise and requires the input of various scientific communities. In recent years, this research field has often been viewed as part of a broader agenda under the name of “exobiology” or “astrobiology.” In this review, we have somewhat narrowed this agenda, focusing on the origin of modern terrestrial life. The adjective “modern” here means that we did not speculate on different forms of life that could have possibly app...

  1. Handbook of the Solar-Terrestrial Environment

    CERN Document Server

    Kamide, Y

    2007-01-01

    The Handbook of the Solar-Terrestrial Environment is a unique compendium. Recognized international leaders in their field contribute chapters on basic topics of solar physics, space plasmas and the Earth's magnetosphere, and on applied topics like the aurora, magnetospheric storms, space weather, space climatology and planetary science. This book will be of highest value as a reference for researchers working in the area of planetary and space science. However, it is also written in a style accessible to graduate students majoring in those fields.

  2. Digital terrestrial television broadcasting technology and system

    CERN Document Server

    2015-01-01

    Now under massive deployment worldwide, digital terrestrial television broadcasting (DTTB) offers one of the most attractive ways to deliver digital TV over the VHF/UHF band. Written by a team of experts for specialists and non-specialists alike, this book serves as a comprehensive guide to DTTB. It covers the fundamentals of channel coding and modulation technologies used in DTTB, as well as receiver technology for synchronization, channel estimation, and equalization. It also covers the recently introduced Chinese DTTB standard, using the SFN network in Hong Kong as an example.

  3. Design for Additive Manufacturing

    OpenAIRE

    Bertran Comellas, Martí

    2012-01-01

    This Thesis, Design for Additive Manufacturing, has been mainly focused on the design process and the considerations to be taken into account when designing parts for Additive Manufacturing. It starts with an introduction to Additive Manufacturing, the different technologies and processes are described to let the readers understand their operating principle, materials used and their strengths and weaknesses. The applications of Additive manufacturing are also explained in the introductory ...

  4. Stereotype Threat in Organizations: An Examination of its Scope, Triggers, and Possible Interventions

    OpenAIRE

    Laura J. Kray; Shirako, Aiwa

    2009-01-01

    This chapter explores stereotype threat in organizational contexts. Building on the understanding that stereotype threat involves concerns about confirming a negative stereotype about one’s group, we begin by elucidating the scope of potential stereotype threat effects in organizations. We first examine the ubiquity of evaluations in organizations, which are at the heart of stereotype threat. Next we specify the potential psychological consequences of stereotype threat on targeted individua...

  5. Vocal parameters that indicate threat level correlate with FOS immunolabeling in social and vocal control brain regions.

    Science.gov (United States)

    Ellis, Jesse M S; Riters, Lauren V

    2012-01-01

    Transmitting information via communicative signals is integral to interacting with conspecifics, and some species achieve this task by varying vocalizations to reflect context. Although signal variation is critical to social interactions, the underlying neural control has not been studied. In response to a predator, black-capped chickadees (Poecile atricapilla) produce mobbing calls (chick-a-dee calls) with various parameters, some of which convey information about the threat stimulus. We predicted that vocal parameters indicative of threat would be associated with distinct patterns of neuronal activity within brain areas involved in social behavior and those involved in the sensorimotor control of vocal production. To test this prediction, we measured the syntax and structural aspects of chick-a-dee call production in response to a hawk model and assessed the protein product of the immediate early gene FOS in brain regions implicated in context-specific vocal and social behavior. These regions include the medial preoptic area (POM) and lateral septum (LS), as well as regions involved in vocal motor control, including the dorsomedial nucleus of the intercollicular complex and the HVC. We found correlations linking call rate (previously demonstrated to reflect threat) to labeling in the POM and LS. Labeling in the HVC correlated with the number of D notes per call, which may also signal threat level. Labeling in the call control region dorsomedial nucleus was associated with the structure of D notes and the overall number of notes, but not call rate or type of notes produced. These results suggest that the POM and LS may influence attributes of vocalizations produced in response to predators and that the brain region implicated in song control, the HVC, also influences call production. Because variation in chick-a-dee call rate indicates predator threat, we speculate that these areas could integrate with motor control regions to imbue mobbing signals with additional

  6. Stereotype Threat and Women's Performance in Physics

    Science.gov (United States)

    Marchand, Gwen C.; Taasoobshirazi, Gita

    2013-01-01

    Stereotype threat (ST), which involves confirming a negative stereotype about one's group, is a factor thought to contribute to the gender gap in science achievement and participation. This study involved a quasi-experiment in which 312 US high school physics students were randomly assigned, via their classroom cluster, to one of three ST…

  7. Mathematics Self-Efficacy: Stereotype Threat versus Resilience

    Science.gov (United States)

    Schweinle, Amy; Mims, Grace A.

    2009-01-01

    Children's academic self-efficacy is one of the strongest predictors of achievement (Wigfield and Eccles, "Contemporary Educational Psychology" 25(1): 68-81, 2000). The present research examined mathematics self-efficacy and the relationship of racial context from the perspective of two competing bodies of research. Stereotype threat theory would…

  8. Prioritizing Threats to Patient Safety in Rural Primary Care

    Science.gov (United States)

    Singh, Ranjit; Singh, Ashok; Servoss, Timothy J.; Singh, Gurdev

    2007-01-01

    Context: Rural primary care is a complex environment in which multiple patient safety challenges can arise. To make progress in improving safety with limited resources, each practice needs to identify those safety problems that pose the greatest threat to patients and focus efforts on these. Purpose: To describe and field-test a novel approach to…

  9. Food Security in Russia: Monitoring, Trends and Threats

    OpenAIRE

    Natalia Shagaida; Vasiliy Uzun

    2015-01-01

    This paper focuses on monitoring, assessment and threats of food security in Russia. The authors propose methodologies and submit calculations of aggregate indices of assessment of the food security. Economic accessibility of food for groups of population with different income levels in the country as a whole and in the constituents of the Russian Federation.

  10. Facing death together : Understanding the consequences of mortality threats

    NARCIS (Netherlands)

    Renkema, L.J.

    2009-01-01

    In everyday life people are constantly reminded of the temporary nature of life. Newspapers, television, and the Internet offer a constant stream or death reminders, ranging from terrorist attacks to natural disasters. According to Terror Management Theory, people are able to cope with these threats

  11. As Threats of Violence Escalate, Primate Researchers Stand Firm.

    Science.gov (United States)

    Schneider, Alison

    1999-01-01

    Scientists doing research on primates are increasingly being subjected to threats and acts of violence from animal rights groups. The intimidation has resulted in many laboratories taking extensive security measures. Some scientists claim, however, that there is no surrogate for animal research in understanding human diseases. There are fears that…

  12. Suitable Enemies? Governmentality of Youth: Youth as a Threat

    Science.gov (United States)

    Ostrowicka, Helena

    2012-01-01

    This article is a contribution to the discourse of politics towards (for) youth, which the author defines as the "cultural politics of risk". The article begins with scientific representations of youth as a threat, as a group inclined to engage in risky behaviours. It then focuses on theoretical approaches called the "risk paradigm", providing a…

  13. Determinants and Drivers of Infectious Disease Threat Events in Europe

    Centers for Disease Control (CDC) Podcasts

    2016-05-04

    Reginald Tucker reads an abridged version of the article, Determinants and Drivers of Infectious Disease Threat Events in Europe.  Created: 5/4/2016 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 5/4/2016.

  14. Reasoning about threats: From observables to situation assessment

    NARCIS (Netherlands)

    Burghouts, G.J.; Marck, J.W.

    2011-01-01

    We propose a mechanism to assess threats that are based on observables. Observables are properties of persons, i.e., their behavior and interaction with other persons and objects. We consider observables that can be extracted from sensor signals and intelligence. In this paper, we discuss situation

  15. Survey of Threats and Assaults by Patients on Psychiatry Residents

    Science.gov (United States)

    Dvir, Yael; Moniwa, Emiko; Crisp-Han, Holly; Levy, Dana; Coverdale, John H.

    2012-01-01

    Objective: The authors sought to determine the prevalence of threats and assaults by patients on psychiatry residents, their consequences, and the perceived adequacy of supports and institutional responses. Method: Authors conducted an anonymous survey of 519 psychiatry residents in 13 psychiatry programs across the United States. The survey…

  16. Threats to Feminist Identity and Reactions to Gender Discrimination.

    Science.gov (United States)

    Cichocka, Aleksandra; Golec de Zavala, Agnieszka; Kofta, Mirek; Rozum, Joanna

    2013-05-01

    The aim of this research was to examine conditions that modify feminists' support for women as targets of gender discrimination. In an experimental study we tested a hypothesis that threatened feminist identity will lead to greater differentiation between feminists and conservative women as victims of discrimination and, in turn, a decrease in support for non-feminist victims. The study was conducted among 96 young Polish female professionals and graduate students from Gender Studies programs in Warsaw who self-identified as feminists (Mage  = 22.23). Participants were presented with a case of workplace gender discrimination. Threat to feminist identity and worldview of the discrimination victim (feminist vs. conservative) were varied between research conditions. Results indicate that identity threat caused feminists to show conditional reactions to discrimination. Under identity threat, feminists perceived the situation as less discriminatory when the target held conservative views on gender relations than when the target was presented as feminist. This effect was not observed under conditions of no threat. Moreover, feminists showed an increase in compassion for the victim when she was portrayed as a feminist compared to when she was portrayed as conservative. Implications for the feminist movement are discussed.

  17. Assessing the recent terrorist threat to the Malacca Strait

    OpenAIRE

    Chalk, Peter

    2010-01-01

    "In light of these recent threats this article examines the likelihood of sea-based extremist violence in the region, JI (Jemaah Islamiya) capacity to operate in an offshore environment and whether Southeast Asia is a place that al-Qaida would seek to exploit in terms of maritime attacks."

  18. Escorting commercial aircraft to reduce the MANPAD threat

    Science.gov (United States)

    Hock, Nicholas; Richardson, M. A.; Butters, B.; Walmsley, R.; Ayling, R.; Taylor, B.

    2005-11-01

    This paper studies the Man-Portable Air Defence System (MANPADS) threat against large commercial aircraft using flight profile analysis, engagement modelling and simulation. Non-countermeasure equipped commercial aircraft are at risk during approach and departure due to the large areas around airports that would need to be secured to prevent the use of highly portable and concealable MANPADs. A software model (CounterSim) has been developed and was used to simulate an SA-7b and large commercial aircraft engagement. The results of this simulation have found that the threat was lessened when a escort fighter aircraft is flown in the 'Centreline Low' position, or 25 m rearward from the large aircraft and 15 m lower, similar to the Air-to-Air refuelling position. In the model a large aircraft on approach had a 50% chance of being hit or having a near miss (within 20m) whereas escorted by a countermeasure equipped F-16 in the 'Centerline Low' position, this was reduced to only 14%. Departure is a particularly vulnerable time for large aircraft due to slow climb rates and the inability to fly evasive manoeuvres. The 'Centreline Low' escorted departure greatly reduced the threat to 16% hit or near miss from 62% for an unescorted heavy aircraft. Overall the CounterSim modelling has showed that escorting a civilian aircraft on approach and departure can reduce the MANPAD threat by 3 to 4 times.

  19. Cognitive bias for pictorial and linguistic threat cues in children

    NARCIS (Netherlands)

    M. van den Hout; B. Hoekzema; P. de Jong; M. Kindt

    2000-01-01

    The present study was designed to test the conditions under which threat-related cognitive bias can be observed in anxious children. Measures of cognitive bias for threatening words and pictures were obtained from 55 spider fearful children and 58 non-fearful children (aged 8-11 yrs) in the 1st expe

  20. Threat, security and attitude formation among the young

    Science.gov (United States)

    Radin, Furio

    1985-12-01

    The perception of threat to security on the part of young people reflects a central aspect of the societal phenomenon of attitude formation, whose primary function is, ideally, to meet the need for security. In all modern societies, however, the process of socialization — which by its very nature is educational in that it prepares individuals to function as members of society — operates on the principle of systematically frustrating this need by employing a system of reward and punishment based on competition. This system creates a fundamental insecurity and a corresponding attitude (de)formation in the individual, which is exploited by the state in order to consolidate the power of the dominant groups. Due to this fundamental insecurity, the individual is incapable of coping rationally with threat and seeks pseudo-security, e.g., in conformity. Threat — particularly global threat — is perceived as an external factor over which the individual has no control, i.e., it is perceived as falling exclusively within the province of those in power, whose control is further strengthened by this perception. Since the essential damage to the individual's attitude system has been done by the time he leaves school, this undesirable condition of modern societies can only be rectified by a socialization process in general — and an educational process in particular — which cultivates in the individual the development of critical judgment, free self-realization and the spirit of co-operation instead of competition.

  1. Competition Derived from Innovation as a Substitution Threat

    DEFF Research Database (Denmark)

    Howells, John

    2003-01-01

    This paper is a review of the role of innovation as substitution threat. The interesting strategy for those facing what in retrospect proves to be full substitution is the strategy of 'switch' to the substituting technology. the context-dependent uncedrtainty involved in the switch decision is ex...

  2. The threat of nuclear terrorism: from analysis to precautionary measures

    International Nuclear Information System (INIS)

    Facing the nuclear terrorism risk, this document analyzes the nature of the threat of nuclear terrorism, the risk of attack on nuclear installations, the limited protection of nuclear installations against aircraft crashes, the case of nuclear reprocessing plants, the case of nuclear transport and proposes measures which should be taken without endangering the foundations of democracy. (A.L.B.)

  3. The effects of takeover threats of shareholders and firm value

    NARCIS (Netherlands)

    Haan, Marco; Riyanto, Yohanes

    1999-01-01

    We study the role of takeover threats as a corporate control mechanism using Aghion and Tirole's (1997) model of formal and real authority. Shareholders do not monitor the manager's actions, since ownership is widely dispersed. A corporate raider may monitor, and steps in if a profit opportunity exi

  4. The effects of takeover threats of shareholders and firm value

    NARCIS (Netherlands)

    Haan, Marco; Riyanto, Yohanes

    2000-01-01

    Abstract We study the role of takeover threats as a corporate control mechanism using Aghion and Tirole's (1997) model of formal and real authority. Shareholders do not monitor the manager's actions, since ownership is widely dispersed. A corporate raider may monitor, and steps in if a prot opportun

  5. The redbay ambrosia beetle, Xyleborus glabratus: A threat to avocado

    Science.gov (United States)

    Laurel wilt (LW) is a disease caused by Raffaelea sp., a fungal symbiont associated with the recently-introduced redbay ambrosia beetle (RAB), Xyleborus glabratus. Impact of RAB as a vector of the disease to avocado is a threat to avocado production in the U.S. Since 2006, we have a) tested suscepti...

  6. Degrees of Integrity: The Threat of Corruption in Higher Education

    Science.gov (United States)

    Chapman, David W.; Lindner, Samira

    2016-01-01

    Corruption in higher education is the focus of growing international concern among governments, educators, students, and other stakeholders. Those working in higher education institutions now face a unique convergence of pressures that is creating a heightened threat to the integrity of the higher education enterprise worldwide. This paper draws…

  7. Societal threat as a moderator of cultural group selection.

    Science.gov (United States)

    Gelfand, Michele J; Roos, Patrick; Nau, Dana; Harrington, Jesse; Mu, Yan; Jackson, Joshua

    2016-01-01

    As scholars have rushed to either prove or refute cultural group selection (CGS), the debate lacks sufficient consideration of CGS's potential moderators. We argue that pressures for CGS are particularly strong when groups face ecological and human-made threat. Field, experimental, computational, and genetic evidence are presented to substantiate this claim.

  8. Collective threat, trust, and the sense of personal control.

    Science.gov (United States)

    Ross, Catherine E

    2011-09-01

    A threatening and dangerous neighborhood may produce distressing emotions of anxiety, anger, and depression among the individuals who live there because residents find these neighborhoods subjectively alienating. The author introduces the idea that neighborhood disorder indicates collective threat, which is alienating-shaping perceptions of powerlessness and mistrust. The author presents a theory of trust that posits that mistrust develops in places where resources are scarce and threat is common and among individuals with few resources and who feel powerless to avoid or manage the threat. Perceived powerlessness develops with exposure to uncontrollable, negative conditions such as crime, danger, and threat in one's neighborhood. Thus, neighborhood disorder, common in disadvantaged neighborhoods, influences mistrust directly and indirectly by increasing perceptions of powerlessness among residents, which amplify disorder's effect on mistrust. The very thing needed to protect disadvantaged residents from the negative effects of their environment-a sense of personal control-is eroded by that environment in a process that the author calls structural amplification. Powerlessness and mistrust in turn are distressing, increasing levels of anxiety, anger, and depression.

  9. 49 CFR 1540.209 - Fees for security threat assessment.

    Science.gov (United States)

    2010-10-01

    ... current cost of conducting security threat assessments. TSA determines fee amounts and any necessary revisions to the fee amounts based on current costs, using a method of analysis consistent with widely accepted accounting principles and practices, and calculated in accordance with the provisions of 31...

  10. Uncovering Embedded Face Threat Mitigation in Landscape Architecture Critique Feedback

    Science.gov (United States)

    Housley Gaffney, Amy L.

    2015-01-01

    Receiving public feedback on academic work may threaten students' face, particularly when such feedback is critical. One way that feedback may be cushioned is through face-threat mitigation techniques. I analyzed the use of such techniques in the feedback given by faculty and professionals to landscape architecture students as preparation for…

  11. The effects of takeover threats on shareholders and firm value

    NARCIS (Netherlands)

    Haan, MA; Riyanto, Y

    2006-01-01

    We study the role of takeover threats as a corporate control mechanism using [Aghion, P., Tirole, J., 1997. Formal and real authority in organizations. Journal of Political Economy 105, 1-29] model of formal and real authority. Shareholders do not monitor the manager's actions since ownership is wid

  12. Globalisation of water: opportunities and threats of virtual water trade

    NARCIS (Netherlands)

    Chapagain, A.K.

    2006-01-01

    Where the river basin is generally seen as the appropriate unit for analyzing freshwater availability and use, it becomes increasingly important to put freshwater issues in a global context. The book analyses the opportunities and threats of international virtual water trade in the context of solvin

  13. Threats to Feminist Identity and Reactions to Gender Discrimination.

    Science.gov (United States)

    Cichocka, Aleksandra; Golec de Zavala, Agnieszka; Kofta, Mirek; Rozum, Joanna

    2013-05-01

    The aim of this research was to examine conditions that modify feminists' support for women as targets of gender discrimination. In an experimental study we tested a hypothesis that threatened feminist identity will lead to greater differentiation between feminists and conservative women as victims of discrimination and, in turn, a decrease in support for non-feminist victims. The study was conducted among 96 young Polish female professionals and graduate students from Gender Studies programs in Warsaw who self-identified as feminists (M age  = 22.23). Participants were presented with a case of workplace gender discrimination. Threat to feminist identity and worldview of the discrimination victim (feminist vs. conservative) were varied between research conditions. Results indicate that identity threat caused feminists to show conditional reactions to discrimination. Under identity threat, feminists perceived the situation as less discriminatory when the target held conservative views on gender relations than when the target was presented as feminist. This effect was not observed under conditions of no threat. Moreover, feminists showed an increase in compassion for the victim when she was portrayed as a feminist compared to when she was portrayed as conservative. Implications for the feminist movement are discussed. PMID:23606785

  14. Computer Viruses and Related Threats: A Management Guide.

    Science.gov (United States)

    Wack, John P.; Carnahan, Lisa J.

    This document contains guidance for managing the threats of computer viruses, Trojan horses, network worms, etc. and related software along with unauthorized use. It is geared towards managers of end-user groups, managers dealing with multi-user systems, personal computers, and networks. The guidance is general and addresses the vulnerabilities…

  15. Cognitive bias for pictorial and linguistic threat cues in children

    NARCIS (Netherlands)

    Kindt, M; van den Hout, M; de Jong, Peter; Hoekzema, B

    2000-01-01

    The present study was designed to test the conditions under which threat-related cognitive bias can be observed in anxious children. Measures of cognitive bias for threatening words and pictures were obtained from spider fearful children (N = 55) and non-fearful children (N = 58) aged 8-11 in the fi

  16. Concealed Threat Detection at Multiple Frames-per-second

    Energy Technology Data Exchange (ETDEWEB)

    Chang, J T

    2005-11-08

    In this LDRD project, our research purpose is to investigate the science and technology necessary to enable real-time array imaging as a rapid way to detect hidden threats through obscurants such as smoke, fog, walls, doors, and clothing. The goal of this research is to augment the capabilities of protective forces in concealed threat detection. In the current context, threats include people as well as weapons. In most cases, security personnel must make very fast assessments of a threat based upon limited amount of data. Among other attributes, UWB has been shown and quantified to penetrate and propagate through many materials (wood, some concretes, non-metallic building materials, some soils, etc.) while maintaining high range resolution. We have build collaborations with university partners and government agencies. We have considered the impact of psychometrics on target recognition and identification. Specifically we have formulated images in real-time that will engage the user's vision system in a more active way to enhance image interpretation capabilities. In this project, we are researching the use of real time (field programmable gate arrays) integrated with high resolution (cm scale), ultra wide band (UWB) electromagnetic signals for imaging personnel through smoke and walls. We evaluated the ability of real-time UWB imaging for detecting smaller objects, such as concealed weapons that are carried by the obscured personnel. We also examined the cognitive interpretation process of real time UWB electromagnetic images.

  17. New and emerging threats of cyber crime and terrorism

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2014-01-01

    Advancements in information and communication technologies (ICT) inextricably bring new threats to the end-users and society. However, the last 40 years have shown that many of the same cyber security design and programming failures occur over and over again when a new ICT innovation and development

  18. Predictors of Collegiate Student-Athletes' Susceptibility to Stereotype Threat

    Science.gov (United States)

    Feltz, Deborah L.; Schneider, Richard; Hwang, Seunghyun; Skogsberg, Nikolaus J.

    2013-01-01

    The present investigation sought to determine the extent to which collegiate student-athletes are susceptible to stereotype threat and the factors that predict it. We proposed a structural equation model (SEM) by which a perceived coach's positive regard for an athlete's academic ability, athletic identity, and academic identity predicts the…

  19. Mass Media Use by College Students during Hurricane Threat

    Science.gov (United States)

    Piotrowski, Chris

    2015-01-01

    There is a dearth of studies on how college students prepare for the threat of natural disasters. This study surveyed college students' preferences in mass media use prior to an approaching hurricane. The convenience sample (n = 76) were from a university located in the hurricane-prone area of the central Gulf of Mexico coast. Interestingly,…

  20. Regulation in a Brave New World: Safeguarding against Subversive Threats

    Science.gov (United States)

    Hornosty, Jason

    2011-01-01

    Biotechnology is a rapidly advancing science that has the potential to revolutionize medicine and transform human abilities. Accompanying these positives are an underdiscussed category of threats to principles of human rights and equality. Although any technology might be used to inegalitarian ends, biotechnology has the capacity to beget…