WorldWideScience

Sample records for central sahara threat

  1. Unravelling biodiversity, evolution and threats to conservation in the Sahara-Sahel.

    Science.gov (United States)

    Brito, José C; Godinho, Raquel; Martínez-Freiría, Fernando; Pleguezuelos, Juan M; Rebelo, Hugo; Santos, Xavier; Vale, Cândida G; Velo-Antón, Guillermo; Boratyński, Zbyszek; Carvalho, Sílvia B; Ferreira, Sónia; Gonçalves, Duarte V; Silva, Teresa L; Tarroso, Pedro; Campos, João C; Leite, João V; Nogueira, Joana; Alvares, Francisco; Sillero, Neftalí; Sow, Andack S; Fahd, Soumia; Crochet, Pierre-André; Carranza, Salvador

    2014-02-01

    Deserts and arid regions are generally perceived as bare and rather homogeneous areas of low diversity. The Sahara is the largest warm desert in the world and together with the arid Sahel displays high topographical and climatic heterogeneity, and has experienced recent and strong climatic oscillations that have greatly shifted biodiversity distribution and community composition. The large size, remoteness and long-term political instability of the Sahara-Sahel, have limited knowledge on its biodiversity. However, over the last decade, there have been an increasing number of published scientific studies based on modern geomatic and molecular tools, and broad sampling of taxa of these regions. This review tracks trends in knowledge about biodiversity patterns, processes and threats across the Sahara-Sahel, and anticipates needs for biodiversity research and conservation. Recent studies are changing completely the perception of regional biodiversity patterns. Instead of relatively low species diversity with distribution covering most of the region, studies now suggest a high rate of endemism and larger number of species, with much narrower and fragmented ranges, frequently limited to micro-hotspots of biodiversity. Molecular-based studies are also unravelling cryptic diversity associated with mountains, which together with recent distribution atlases, allows identifying integrative biogeographic patterns in biodiversity distribution. Mapping of multivariate environmental variation (at 1 km × 1 km resolution) of the region illustrates main biogeographical features of the Sahara-Sahel and supports recently hypothesised dispersal corridors and refugia. Micro-scale water-features present mostly in mountains have been associated with local biodiversity hotspots. However, the distribution of available data on vertebrates highlights current knowledge gaps that still apply to a large proportion of the Sahara-Sahel. Current research is providing insights into key

  2. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  3. South of Sahara | Page 117 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Open Architecture, Standards and Information Systems (OASIS) for Healthcare in Africa. Language English. Read more about Communication dans le but d'influer sur les politiques : établissement de réseaux de TIC-D en Afrique centrale, de l'Est et de l'Ouest. Language ...

  4. Inside the "African cattle complex": animal burials in the holocene central Sahara.

    Directory of Open Access Journals (Sweden)

    Savino di Lernia

    Full Text Available Cattle pastoralism is an important trait of African cultures. Ethnographic studies describe the central role played by domestic cattle within many societies, highlighting its social and ideological value well beyond its mere function as 'walking larder'. Historical depth of this African legacy has been repeatedly assessed in an archaeological perspective, mostly emphasizing a continental vision. Nevertheless, in-depth site-specific studies, with a few exceptions, are lacking. Despite the long tradition of a multi-disciplinary approach to the analysis of pastoral systems in Africa, rarely do early and middle Holocene archaeological contexts feature in the same area the combination of settlement, ceremonial and rock art features so as to be multi-dimensionally explored: the Messak plateau in the Libyan central Sahara represents an outstanding exception. Known for its rich Pleistocene occupation and abundant Holocene rock art, the region, through our research, has also shown to preserve the material evidence of a complex ritual dated to the Middle Pastoral (6080-5120 BP or 5200-3800 BC. This was centred on the frequent deposition in stone monuments of disarticulated animal remains, mostly cattle. Animal burials are known also from other African contexts, but regional extent of the phenomenon, state of preservation of monuments, and associated rock art make the Messak case unique. GIS analysis, excavation data, radiocarbon dating, zooarchaeological and isotopic (Sr, C, O analyses of animal remains, and botanical information are used to explore this highly formalized ritual and the lifeways of a pastoral community in the Holocene Sahara.

  5. STATE COLLAPSE AND REGIONAL CONTAGION IN SUB-SAHARA AFRICA: LESSONS FOR ZIMBABWE

    OpenAIRE

    James J. Hentz

    2012-01-01

    Hollowing out the stateState collapse is one of the most important security threats in Sub-Sahara Africa. The George W. Bush administration's National Security Strategy includes failed and failing states as a national security priority. The U.S. European Command, whose area of responsibility includes much of Sub-Sahara Africa, are "concerned about ungoverned areas descending into chaos with terrorist and warlords…."2 The United Nations is trying to restore order to numerous collapsed states i...

  6. Crater palaeolakes in the Tibesti mountains (Central Sahara, North Chad) - New insights into past Saharan climates

    Science.gov (United States)

    Kröpelin, Stefan; Dinies, Michèle; Sylvestre, Florence; Hoelzmann, Philipp

    2016-04-01

    For the first time continuous lacustrine sections were sampled from the volcanic Tibesti Mountains (Chad): In the 900 m deep crater of Trou au Natron at Pic Toussidé (3,315 m a.s.l.) and from the 800 m deep Era Kohor, the major sub-caldera of Emi Koussi (3,445 m a.s.l.). The remnant diatomites on their slopes are located 360 m (Trou au Natron) and 125 m (Era Kohor) above the present day bottom of the calderas. These sediments from highly continental positions in the central Sahara are keys for the reconstruction of the last climatic cycles (Kröpelin et al. 2015). We report first results from sedimentary-geochemical (total organic and total inorganic carbon contents; total nitrogen; major elements; mineralogy) and palynological analyses for palaeo-environmental interpretations. The diatomites from the Trou au Natron comprise 330 cm of mostly calcitic sediments with relatively low organic carbon (basin. Two 14C-dated charcoals out of the upper part of the section indicate mid-Holocene ages and a linear extrapolation based on a sediment accumulation rate of 1.4mma-1 would lead to tentative dates of ~8650 cal a BP for basal lacustrine sediments and ~4450 cal a BP for the cessation of this lacustrine sequence. The diatomites from the Era Kohor reflect a suite of sections that in total sum up to 145 cm of mostly silica-based sediments with very low carbon contents (paradox of the Tibesti crater paleolakes (Central Sahara, North Chad). Abstract #64322 AGU-Fall-Meeting-2015.

  7. Paleohydrology and paleoenvironments at Bir Sahara: Pleistocene lithostratigraphy and sedimentology in the southern Egyptian Sahara

    Science.gov (United States)

    Hill, Christopher L.; Schild, Romuald

    2017-12-01

    The Bir Sahara area contains a remarkable record of Middle and Late Pleistocene hydrologic and environmental conditions for Saharan North Africa, based on lithostratigraphic and sedimentologic evidence from basin-fill deposits. Some of the deposits contain Lower Paleolithic (Acheulean) or Middle Paleolithic artifacts that help to constrain their age, since Acheulian artifacts are assigned to the Middle Pleistocene, while Middle Paleolithic artifacts are limited to either the Middle or Late Pleistocene. Locality BS-14 is in the southern part of Bir Sahara, while localities E-88-15, E-88-2, BS-13, and BS-16 are situated in the south-central part of the deflational basin, closer to the present-day water-hole. Lowered groundwater conditions during arid intervals resulted in erosional topographic basins. These deflational basins were later filled with sediments associated with wetter hydrologic conditions. The oldest studied sedimentary sequence in the Bir Sahara depression (BS-14) contains in situ Acheulian artifacts. Acheulian handaxes are found in sands underlying carbonates that are interpreted as evidence of spring-fed pond and marsh environments during a Middle Pleistocene wet interval. At the E-88-15 locality, the stratigraphic sequence documents deposition in a possible perennial pond or small lake that varied in extent and depth and is associated with Middle Paleolithic artifacts. At E-88-12 and BS-13, lateral and vertical variations in the lithofacies of the basin-fill sediments provide additional records of changing hydrologic conditions during the Late Pleistocene. These hydrologic conditions appear to reflect variations in water-table levels related to groundwater recharge and, at times, local rains.

  8. A Central Amygdala CRF Circuit Facilitates Learning about Weak Threats.

    Science.gov (United States)

    Sanford, Christina A; Soden, Marta E; Baird, Madison A; Miller, Samara M; Schulkin, Jay; Palmiter, Richard D; Clark, Michael; Zweifel, Larry S

    2017-01-04

    Fear is a graded central motive state ranging from mild to intense. As threat intensity increases, fear transitions from discriminative to generalized. The circuit mechanisms that process threats of different intensity are not well resolved. Here, we isolate a unique population of locally projecting neurons in the central nucleus of the amygdala (CeA) that produce the neuropeptide corticotropin-releasing factor (CRF). CRF-producing neurons and CRF in the CeA are required for discriminative fear, but both are dispensable for generalized fear at high US intensities. Consistent with a role in discriminative fear, CRF neurons undergo plasticity following threat conditioning and selectively respond to threat-predictive cues. We further show that excitability of genetically isolated CRF-receptive (CRFR1) neurons in the CeA is potently enhanced by CRF and that CRFR1 signaling in the CeA is critical for discriminative fear. These findings demonstrate a novel CRF gain-control circuit and show separable pathways for graded fear processing. Copyright © 2017 Elsevier Inc. All rights reserved.

  9. South of Sahara | Page 306 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. flexible layoutflexible layoutflexible layoutflexible layoutflexible layoutflexible layoutflexible layoutflexible layoutflexible layout. Sud du Sahara. Read more about Afrique subsaharienne ...

  10. Spain and the Western Sahara: the Political Party Dimension

    Directory of Open Access Journals (Sweden)

    Jordi Vaquer i Fanés

    2007-12-01

    Full Text Available Since the Spanish army’s hasty withdrawal from Western Sahara in 1975, the two main parties since Spain acquired its democracy have differed over what stance should be taken with respect to the Sahara issue. The aim of this article is to establish to what extentthis is the result of the opposing government/opposition dynamic and how far it is a result of the parties’ own stances, by analysing the evolution of their attitudes and approaches with respect to the Sahara issue. The hypothesis is that the Spanish parties’ position with respect to Algeria and Morocco was initially very much determined by their view of the Sahara issue, but that there has been an inversion of this attitude. Thus at present, opposing stances on the Sahara issue are mainly the result of different views on Spain’s interests in the Maghreb region and, above all, of different ideas about which country Morocco or Algeria should benefit most from bilateral relations.

  11. South of Sahara | Page 135 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Incubateur de petites et microentreprises de technologie (MICTI) - phase III. Language French. Read more about Mozambique Information and Communication Technology : Micro and Small Enterprises Incubator - Phase III. Language English. Read more about Utilisation ...

  12. South of Sahara | Page 27 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Agriculture for Improved Nutrition and Health: Support to the Consultative Group on International Agricultural Research Program. Language English. Read more about The Role of Militia, Predatory State Authorities, and Rogue Capital in the Horn of Africa. Language ...

  13. South of Sahara | Page 14 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Renforcement des connaissances économiques et de la capacité d'adaptation face aux changements climatiques au Bénin. Language French. Read more about Strengthening Economic Skills and Climate Change Adaptive Capacity in Bénin. Language English.

  14. South of Sahara | Page 38 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Interaction entre zones urbaines et rurales et changements climatiques (Nigeria). Language French. Read more about Compliance with Private Food Safety Standards among Smallholders in Kenya. Language English. Read more about Respect des normes de salubrité ...

  15. South of Sahara | Page 49 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Diversification des moyens de subsistance des petits producteurs de tabac du sud de la province de Nyanza, au Kenya - Phase I. Language French. Read more about Kenya-Malawi Health Research Capacity Strengthening Initiative - Inception Phase. Language English.

  16. South of Sahara | Page 5 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Youth Employment and Migration in West Africa. Language English. Read more about Évolution démographique asymétrique et gouvernance financière mondiale. Language French. Read more about Asymmetric Demography and Global Financial Governance.

  17. South of Sahara | Page 125 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Exemption communautaire du paiement des services de santé au Burkina Faso. Language French. Read more about Études par pays dans le cadre du HIV/AIDS Monitor. Language French. Read more about HIV/AIDS Monitor Country Studies. Language English.

  18. South of Sahara | Page 31 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Action multisectorielle en matière de prévention des maladies non transmissibles en Afrique subsaharienne. Language French. Read more about Safe and Inclusive Cities: Research to Reduce Urban Violence, Poverty, and Inequalities. Language English. Read more ...

  19. South of Sahara | Page 80 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Empowering Developing Countries on the UN Security Council. Language English. Read more about Civil Society and Public Powers : Partners for Social Economy and Solidarity. Language English. Read more about Société civile et pouvoirs publics : Partenaires pour ...

  20. South of Sahara | Page 38 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Integrated Intervention for Diabetes Risk After Gestational Diabetes in South Africa. Language English. Read more about Essais cliniques d'un vaccin expérimental contre le virus Ebola : une intervention canadienne dans la recherche. Language French. Read more about ...

  1. South of Sahara | Page 107 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Adapting Fishing Policy to Climate Change with the Aid of Scientific and Endogenous Knowledge (West Africa). Language English. Read more about Adaptation des politiques de pêche aux changements climatiques à l'aide des savoirs scientifiques et de connaissances ...

  2. South of Sahara | Page 24 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about HarassMap: Using Crowdsourced Data in the Social Sciences. Language English. Read more about Mesures en matière de taxation des produits du tabac en Afrique de l'Ouest. Language French. Read more about Gemini News Service Re-launch. Language English.

  3. South of Sahara | Page 11 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Forum africain de la concurrence : à l'appui de marchés ouverts et concurrentiels. Language French. Read more about Emploi et migration des jeunes en Afrique de l'Ouest. Language French. Read more about Strengthening Research Capacity for Governance and ...

  4. South of Sahara | Page 35 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Approfondissement des connaissances et renforcement des capacités en matière de sexospécificités au sein du programme ACACIA. Language French. Read more about Acacia Gender Learning and Capacity Strengthening. Language English. Read more about Soutien ...

  5. South of Sahara | Page 116 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Gestion de l'eau de consommation et de la pollution dans le bassin versant de Yitenga, Burkina Faso - Phase II. Language French. Read more about Management of Water for Consumption and Pollution in the Yitenga Basin, Burkina Faso - Phase II. Language English.

  6. South of Sahara | Page 169 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Ecohealth Chair on Urban Air Pollution and Non-Communicable Respiratory Diseases (West Africa). Language English. Read more about Analyse des flux financiers des économies émergentes vers les pays en développement. Language French. Read more about An ...

  7. South of Sahara | Page 33 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Hybrid Security Arrangements in Africa: Exploring the Implications for State-building. Language English. Read more about Chiffrer le travail des femmes - économie sexiste sur le marché et au foyer. Language French. Read more about Implications des mécanismes de ...

  8. South of Sahara | Page 78 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Gestion des milieux humides en vue d'une plus grande sécurité alimentaire en Ouganda. Language French. Read more about Moving Zimbabwe Forward : an Evidence Based Policy Dialogue. Language English. Read more about De l'avant au Zimbabwe : dialogue sur ...

  9. South of Sahara | Page 52 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Site d'enfouissement de Mbeubeuss : à la recherche de la santé humaine, la santé environnementale et les moyens de subsistance (Sénégal). Language French. Read more about Mozambique Health Information Network. Language English. Read more about Réseau ...

  10. South of Sahara | Page 92 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Nouvelle constitution du Zimbabwe et campagne pour le droit à la santé de 2010. Language French. Read more about New Zimbabwe Constitution and the Right to Health Campaign 2010. Language English. Read more about Participation des jeunes femmes à la vie ...

  11. South of Sahara | Page 85 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Soutien institutionnel au Centre for the Study of the Economies of Africa (CSEA). Language French. Read more about Soutien institutionnel au Groupe de recherche en économie appliquée et théorique (GREAT) (Mali). Language French. Read more about Institutional ...

  12. South of Sahara | Page 137 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Transition de Bellanet. Language French. Read more about Le coût des conflits dans la zone du Marché commun de l'Afrique orientale et australe (COMESA). Language French. Read more about Cost of Conflicts in the Common Market for Eastern and Southern Africa ...

  13. South of Sahara | Page 46 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Open Architecture, Standards and Information Systems (OASIS) for Healthcare in Africa. Language English. Read more about Gestion intégrée de l'eau, de l'assainissement et des déchets solides dans de petits centres urbains autour du lac Victoria (Kenya). Language ...

  14. South of Sahara | Page 112 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Implementation of an Electronic Strategy in Bénin. Language English. Read more about E-Stratégie du Bénin : programme de recherches multidisciplinaires d'appui à sa mise en oeuvre. Language French. Read more about Libéralisation du commerce des biens et ...

  15. South of Sahara | Page 2 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about La législation sur le salaire minimum, son application et la situation sur le marché du travail en Afrique du Sud, en Argentine et au Costa Rica. Language French. Read more about Mozambique Science, Technology and Innovation Review. Language English. Read more ...

  16. South of Sahara | Page 29 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Canada-Africa Research Exchange Grants Phase II. Language English. Read more about Subventions pour la coopération en recherche entre le Canada et l'Afrique - phase II. Language French. Read more about Mesure de l'activité entrepreneuriale en Égypte et en ...

  17. South of Sahara | Page 113 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Femmes, migration et droits au Mali et au Sénégal. Language French. Read more about Capacity Building in Open Medical Record System (OpenMRS) in Rwanda. Language English. Read more about Renforcement des capacités relatives à l'Open Medical Records ...

  18. South of Sahara | Page 122 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Enquête sur l'utilisation du téléphone mobile pour le développement des petites et microentreprises au Ghana. Language French. Read more about Eau, santé et adaptation aux changements climatiques en Afrique. Language French. Read more about Programme ...

  19. South of Sahara | Page 48 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Enquête sur l'utilisation du téléphone mobile pour le développement des petites et microentreprises au Ghana. Language French. Read more about Survey on the Use of Mobile Telephone for Micro and Small Business Development in Ghana. Language English.

  20. South of Sahara | Page 25 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Catalyzing Broadband Internet in Africa. Language English. Read more about Mobilisation du financement privé aux fins de l'adaptation. Language French. Read more about Une approche des politiques et de la gouvernance en matière d'Internet axée sur le progrès des ...

  1. South of Sahara | Page 105 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Droit des femmes à l'eau à usage agricole au Sahel (Mauritanie, Niger, Sénégal). Language French. Read more about Women's Right to Water for Agricultural Use in the Sahel (Mauritanie, Niger, Sénégal). Language English. Read more about Because Gender Matters ...

  2. South of Sahara | Page 105 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Étude de la dynamique de la pauvreté et de la dégradation des sols au Sahel, en Afrique de l'Ouest. Language French. Read more about Dynamics of Poverty and Land Degradation in the Sahel (West Africa). Language English. Read more about Passage à grande ...

  3. South of Sahara | Page 98 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Évaluation de l'activité entrepreneuriale dans la région MOAN. Language French. Read more about Abolition du paiement direct des services de santé en Afrique de l'Ouest. Language French. Read more about Abolition of Direct Payment for Health Services in West ...

  4. South of Sahara | Page 43 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Approches novatrices pour la création d'emplois pour les jeunes et leur intégration au marché du travail en Afrique de l'Est. Language French. Read more about Soutien au Programme de recherche du CGIAR sur les racines, tubercules et bananes. Language French.

  5. South of Sahara | Page 75 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Suivre et contrer la circulation de l'information erronée dans le delta du fleuve Tana, au Kenya. Language French. Read more about Mapping and Countering the Flow of Misinformation in the Tana Delta of Kenya. Language English. Read more about TanZamBo Capacity ...

  6. South of Sahara | Page 81 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Synthèse des enseignements en matière d'adaptation aux changements climatiques. Language French. Read more about de liens entre systèmes d'information sur la santé pour assurer l'efficacité du processus décisionnel (Afrique de l'Est). Language French. Read more ...

  7. South of Sahara | Page 30 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Infection aiguë et précoce par le VIH-1 chez les femmes durant la grossesse et la période post-partum en Tanzanie, en Zambie et au Botswana. Language French. Read more about Acute and Early HIV1 Infection in Childbearing Women during Pregnancy and Postpartum ...

  8. South of Sahara | Page 6 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Subventions et bourses en faveur de l'égalité des sexes et du développement des innovations numériques. Language French. Read more about Réseaux d'accès communautaire : faire accéder à Internet un milliard de personnes de plus. Language French. Read more ...

  9. South of Sahara | Page 67 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara. Sud du Sahara. Read more about Les dimensions économiques de l'adaptation et du développement résilient aux aléas du climat. Language French. Read more about Renforcement des capacités de réaliser des examens systématiques. Language French. Read more about Lutte intégrée contre les ...

  10. The Western Sahara conflict I

    African Journals Online (AJOL)

    Polisario unilaterally declared a "Saharawi Arab Democratic Republic" (27 Feb. 1976). Since .... Furthermore, Frente Polisario managed to keep the Western Sahara question on .... these countries and their fragile ethnic and political balance.

  11. Isotopic characteristic of meteoric water and groundwater in Ahaggar massif (central Sahara)

    International Nuclear Information System (INIS)

    Saighi, O.; Michelot, J.L.; Filly, A.

    2001-01-01

    The mean contents of both oxygen-18 and deuterium in precipitation from the Ahaggar massif (central Sahara) are: δ 18 O = -3 per mille and 2 H = -15 per mille. The heterogeneity in meteoric events and the great scattering of these isotopic contents can be ascribed to the origins and the histories of air masses. The main contribution comes from the inflow of the Guinean monsoon during summer months. During winter, the N/W winds, arriving in the area from the Moroccan coast, provide some rains. The deuterium excess of these precipitation are up to +10 per mille, indicating that the air masses generating these rains are supplied by the recycling of the continental air moisture. Groundwater resources are produced in some little phreatic aquifers, which are recharged by sporadic wadi floods. Aquifer zones that are the most favourable are located in the valleys and occur as three overlying levels of unequal importance: the alluvial aquifer, the weathered zone of the underlying substratum and the deep aquifer of fissured basement. The alluvial aquifer contain weakly mineralised water (0.3 g/l). Their stable isotopes contents (δ 18 O∼ -2.7 per mille) and 14 C activity of them (> 100 pmc) are comparable to present meteoric water, allowing modern meteoric waters to be identified. The weathered zone groundwater's are more mineralised (0.8 g/l) and its isotopic contents (δ 18 O∼ -4.2 per mille) and intermediate radiocarbon activity, prove their old water component. The basement's groundwater are more mineralised (> 1 g/l) and their very depleted isotopic contents (δ 18 O∼ -9 per mille) diverge clearly from the present precipitation. Furthermore, the absence of 3 H and 14 C activity of them, prove an old heritage, resulting from recharge during the last humid episode of the Holocene. (author)

  12. Hibiscus acetosella 'Sahara Sunset'

    Science.gov (United States)

    The Agricultural Research Service, United States Department of Agriculture, hereby release to nurserymen a new African Hibiscus, Hibiscus acetosella Welw. ex Hiern., named ‘Sahara Sunset’. This cultivar, tested as HAC06-11 was selected from a group seedlings grown at the Thad Cochran Southern Horti...

  13. NON-TRADITIONAL SECURITY THREATS IN CENTRAL ASIA REGIONAL PERSPECTIVE OF COMPARATIVE PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Ramakant Trivedi

    2011-01-01

    Full Text Available Abstract: The article explores the roots and current state of religious extremism in Central Asia, as well as investigates its connections with the global salafi movement. It evaluates attempts of the regional players and external stakeholders to address the existing threats, and provides recommendations for their advancement.

  14. The Sources Of Protracted Conflict In The Western Sahara

    Science.gov (United States)

    2016-03-01

    Tunisia; in Libya, it has created a catastrophe. Moammar Gadhafi 4 Magnus Norell, “Embezzlement in...Sahara,” Huffington Post, February 23,2015, http://www.huffingtonpost.com/ magnus -norell/embezzlement-in-sahara_b_6639248.html. 5 Organization for...work analyzes three essential elements in this dynamic: the changing environments of the conflict and its implications; the effects of diplomacy; and

  15. Conflict resolution in Western Sahara

    African Journals Online (AJOL)

    for the North African region vis-à-vis their Realpolitik conflict containment approach towards the ... Sahara (MINURSO) effectively monitors the ceasefire and the region remains relatively stable. ...... Nación Árabe, 47, pp. 33–39. Mcelroy, D.

  16. High and Medium Resolution Satellite Imagery to Evaluate Late Holocene Human–Environment Interactions in Arid Lands: A Case Study from the Central Sahara

    Directory of Open Access Journals (Sweden)

    Stefano Biagetti

    2017-04-01

    Full Text Available We present preliminary results of an Earth observation approach for the study of past human occupation and landscape reconstruction in the Central Sahara. This region includes a variety of geomorphological features such as palaeo-oases, dried river beds, alluvial fans and upland plateaux whose geomorphological characteristics, in combination with climate changes, have influenced patterns of human dispersal and sociocultural activities during the late Holocene. In this paper, we discuss the use of medium- and high-resolution remotely sensed data for the mapping of anthropogenic features and paleo- and contemporary hydrology and vegetation. In the absence of field inspection in this inaccessible region, we use different remote sensing methods to first identify and classify archaeological features, and then explore the geomorphological factors that might have influenced their spatial distribution.

  17. Africa (south of the Sahara)

    NARCIS (Netherlands)

    Hoorweg, J.C.; Sexton, V.S.; Msiak, H.

    1976-01-01

    This review of the development and current status of psychology in Africa focuses on Africa south of the Sahara, excluding South Africa. The author discusses the research topics which have attracted the attention of psychologists in Africa, including perception (illusions, pictorial representation

  18. Greening of the Sahara - a paleo perspective on the history of water in the Middle East and North Africa

    Science.gov (United States)

    Bar-Matthews, M.

    2012-04-01

    The Middle-East, mostly at its southern edge together with North Africa, the northern edge of the Sahara Desert, are located at the boundary between high- to-mid latitude and tropical-subtropical climate systems. The geographical duality of desert adjacent to Mediterranean-type climate regions played and still plays a major role on the water availability. Thanks to the number of important paleoclimate studies that been made on accurate dating of cave speleothems in Southern Arabia and Oman (Fleitmann et al., 2011) and in the northeast Sahara, the Negev Desert Israel (Vaks et al., 2010) and the study of sapropels in Eastern and central Mediterranean (Almogi-Labin et al., 2009; Osborne et al, 2008), it is clear that the region was graced with water during peak interglacials when the African monsoon and westerly storm/rainfall systems intensified. Northward penetration of the Inter Tropical Convergence Zone over the Arabian and African continents resulted in increased discharge of the Nile River and rivers that emerged from central Sahara into the Eastern Mediterranean Sea. Correspondingly, enhanced westerly wind activity led to an increase in rainfall from Atlantic-Mediterranean sources over the entire Mediterranean basin, which even penetrated south into the north-east corner of the Sahara Desert. The Saharo-Arabian Desert became narrower and climatic "windows" opened for the dispersal of hominids and animals out of the African continent at 250-239, 210-193, 138-120, 108-98, 87-84 and 10-6.5 ka BP, with severe dry conditions in between. Greening of the Sahara Desert at these intervals is supported also by various marine and terrestrial records, such as corals, lakes, tufa deposits and archeological findings. Dry conditions prevailed in the Sahara desert during glacials. This is in contrast to the climatic conditions in the Eastern Mediterranean coastal region and the Jordan Rift Valley (Bar-Matthews et al., 2003; Lisker et al., 2010), where water was available for

  19. Sud du Sahara | Page 200 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sud du Sahara. Sud du Sahara. Read more about TTI Phase 2 Institutional Support: Economic Policy Research Centre. Langue English. Read more about TTI Phase 2 Institutional Support: Science, Technology and Innovation Policy Research Organization. Langue English. Read more about Relations entre les think tanks ...

  20. Sud du Sahara | Page 228 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sud du Sahara. Sud du Sahara. Read more about Equinet : réappropriation des ressources aux fins de la santé - phase V. Langue French. Read more about EQUINET : Reclaiming the Resources for Health - Phase V. Langue English. Read more about Remittances to Conflict Zones : the Sudanese Diaspora in Cairo ...

  1. Atmospheric feedbacks in North Africa from an irrigated, afforested Sahara

    Science.gov (United States)

    Kemena, Tronje Peer; Matthes, Katja; Martin, Thomas; Wahl, Sebastian; Oschlies, Andreas

    2018-06-01

    Afforestation of the Sahara has been proposed as a climate engineering method to sequester a substantial amount of carbon dioxide, potentially effective to mitigate climate change. Earlier studies predicted changes in the atmospheric circulation system. These atmospheric feedbacks raise questions about the self-sustainability of such an intervention, but have not been investigated in detail. Here, we investigate changes in precipitation and circulation in response to Saharan large-scale afforestation and irrigation with NCAR's CESM-WACCM Earth system model. Our model results show a Saharan temperature reduction by 6 K and weak precipitation enhancement by 267 mm/year over the Sahara. Only 26% of the evapotranspirated water re-precipitates over the Saharan Desert, considerably large amounts are advected southward to the Sahel zone and enhance the West African monsoon (WAM). Different processes cause circulation and precipitation changes over North Africa. The increase in atmospheric moisture leads to radiative cooling above the Sahara and increased high-level cloud coverage as well as atmospheric warming above the Sahel zone. Both lead to a circulation anomaly with descending air over the Sahara and ascending air over the Sahel zone. Together with changes in the meridional temperature gradient, this results in a southward shift of the inner-tropical front. The strengthening of the Tropical easterly jet and the northward displacement of the African easterly jet is associated with a northward displacement and strengthening of the WAM precipitation. Our results suggest complex atmospheric circulation feedbacks, which reduce the precipitation potential over an afforested Sahara and enhance WAM precipitation.

  2. Effect of heat treatment on antimycotic activity of Sahara honey

    Directory of Open Access Journals (Sweden)

    Moussa Ahmed

    2014-11-01

    Full Text Available Objective: To evaluate the influence of the temperature on honey colour, polyphenol contents and antimycotic capacity and to evaluate the correlation between these parameters. Methods: Sahara honey were heated up to 25, 50, 75 and 100 °C for 15, 30 and 60 min, and their colour intensity, polyphenol contents and antimycotic capacity. The Folin-Ciocalteu test was used to determine the total polyphenol contents (TPC. The antimycotic activity was evaluated both by agar diffusion method and micro wells dilution method against the Candida albicans (C. albicans and Candida glabrata (C. glabrata. Results: Initial values for TPC in Sahara honey ranged from 0.55 to 1.14 mg of gallic acid per kg of honey, with the average value of 0.78 mg of gallic acid per kg of honey. The TPC values after heat-treatment were 0.54 to 1.54 with the average value of 1.49 mg. The minimal inhibitory concentrations before heat-treatment of Sahara honey against C. albicans and C. glabrata ranged from 3.06%-12.5% and 50% respectively. After heat-treatment the minimal inhibitory concentrations between 12.5% and 50% for C. albicans and C. glabrata, respectively. The diameters of inhibition zones of Sahara honey with 50% concentration varied from (12.67-15.00 mm by C. albicans to (14.33-15.67 mm by C. glabrata. The diameters of inhibition zones after heat-treatment at 25 and 50 °C for 15.30 and 60 min ranged from (2.00-18.67 mm by C. albicans to (8.00-16.67 mm by C. glabrata. Statistically significant relations between the TPC and the colour intensity of Sahara honey (r=0.99, P<0.05. Furthermore, the results showed that the TPC and colour is not correlated with the antimycotic capacity. Conclusions: To our knowledge this is the first report on the antimycotic capacity of Sahara honey.

  3. Sud du Sahara | Page 59 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sud du Sahara. Sud du Sahara. Read more about Health Financing and Benefit Incidence Analysis in Uganda and Zambia. Langue English. Read more about Le Centre d'innovation pour la résilience de l'Afrique de l'Est. Langue French. Read more about Climate Change and Water Adaptation Options. Langue English.

  4. Ammonoids from the Dalle des Iridet of the Mouydir and Ahnet (Central Sahara and the Formation d'Hassi Sguilma of the Saoura Valley (Late Tournaisian–Early Viséan; Algeria

    Directory of Open Access Journals (Sweden)

    D. Korn

    2010-02-01

    Full Text Available Four ammonoid species are described from the Early Carboniferous (Mississippian Iridet Formation of the Ahnet and Mouydir (Central Sahara, Algeria; three of which are new: Eurites temertassetensis n. sp., Trimorphoceras teguentourense n. sp., and Trimorphoceras azzelmattiense n. sp. The species can be attributed to the North African Ammonellipsites-Merocanites Assemblage (Fascipericyclus-Ammonellipsites Genus Zone; Late Tournaisian to Early Viséan. Additionally, the two new species Ammonellipsites sguilmensis n. sp. and Muensteroceras beniabbesense n. sp. are described from the time equivalent Hassi Sguilma Formation of the Saoura Valley (north-western Algeria. doi:10.1002/mmng.200900012

  5. Le Sahara marocain : désenclavement et développement durable

    Directory of Open Access Journals (Sweden)

    EL MAHJOUB CHMOURK

    2012-04-01

    Full Text Available The Moroccan Sahara: opening-up and sustainable development. The enclosing of the Moroccan Sahara results from the inversion and old situation. Indeed, during a very long time, the area was a way of passage, a platform in the south of Morocco. In testify the Tran-Saharan commercial routes, which were the main transportation routes back in time, like the goal of integration of the area in the country and compared to western Africa. It is with the economic crisis, and even a political crisis causing a fold on itself of this area until 1975.Since Sahara belongs to Morocco, it still profits a considerable public effort to carry out its opening-up and its economic insertion within the country. Massive investments carried out by the State give to the area the structuring which it missed. Which are the aspects of the Sahara development? Which role played the State in this development? The intervention of the State contributes to bring effective solutions to the problem of the opening-up of this surrounding space?

  6. Sud du Sahara | Page 232 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sud du Sahara. Sud du Sahara. Read more about Démarches novatrices en ce qui a trait à la délégation des tâches en santé mentale. Langue French. Read more about Institutional Support: Centre for Economic and Social Research, Education and Documentation (Burkina Faso). Langue English. Read more about ...

  7. The New Oil-Related Issues in the Sahara

    International Nuclear Information System (INIS)

    Auge, Benjamin

    2011-01-01

    The Sahara is one of the last African regions to remain under-explored by oil companies. After the swift rise in crude oil prices about a decade ago, the land-locked nature of the terrain, the main hurdle standing in the way of exploration, had been overcome thanks to an exponential growth in sums set aside for exploration. The arrival on the scene of State enterprises, especially from China, also made profitability secondary to the pressing need to find new reserves. A study of the state of affairs in Mauritania, Mali, Niger, and Chad discloses how the situation differs from case to case. Some are already producing like Mauritania, albeit in small quantities, and Chad, which is the sole net exporter of the region, whereas Niger will begin producing in 2012 and Mali has not had a single well drilled for decades due to its haphazard choice of oil companies. The four States mentioned do not cooperate in any way in the oil sector even though this ought to be essential in a zone that has such special peculiarities in terms of climate, geography, and security as it is facing the threat of Al Qaeda in the Islamic Maghreb (AQMI) and the Tuareg

  8. The blurred boundaries of political violence in the Sahel-Sahara

    DEFF Research Database (Denmark)

    Walther, Olivier

    2017-01-01

    The Sahel and the Sahara are faced with exceptional political instability involving a combination of rebellions, jihadist insurgencies, coups d’état, protest movements and illegal trafficking. Analysis of the outbreaks of violence reveals that the region is not just the victim of an escalation...... of wars and conflicts that marked the 20th century. The Sahel-Sahara has also become the setting of a globalised security environment, in which boundaries between what is local and global, domestic and international, military and civilian, politics and identity are blurred....

  9. Refraining from terror: the puzzle of non violence in Western Sahara

    Directory of Open Access Journals (Sweden)

    Matthew Porges

    2018-02-01

    Full Text Available In Western Sahara, the former Spanish colony occupied by Morocco since 1975, virtually no violent resistance has been mounted by the indigenous Sahrawi people since the end of the 1975-1991 war between Morocco and the pro-independence Polisario Front. This absence of violence is puzzling in the light of several factors: the widespread public support for independence; the social and economic disparities between Moroccan and Sahrawi inhabitants of the territory; and Morocco’s brutal repression of Sahrawi culture, resistance, and expressions of proindependence feeling. This article examines the logic of violence (and its absence and of resistance, and draws lessons from Western Sahara. As well as advancing theoretical development, the article makes a methodological contribution to the study of resistance, and improves our understanding of the Western Sahara conflict through fieldwork, including around 60 interviews with Sahrawi activists conducted in the summer of 2014.

  10. The Double Burden of Obesity and Malnutrition in a Protracted Emergency Setting: A Cross-Sectional Study of Western Sahara Refugees

    Science.gov (United States)

    Grijalva-Eternod, Carlos S.; Wells, Jonathan C. K.; Cortina-Borja, Mario; Salse-Ubach, Nuria; Tondeur, Mélody C.; Dolan, Carmen; Meziani, Chafik; Wilkinson, Caroline; Spiegel, Paul; Seal, Andrew J.

    2012-01-01

    Background Households from vulnerable groups experiencing epidemiological transitions are known to be affected concomitantly by under-nutrition and obesity. Yet, it is unknown to what extent this double burden affects refugee populations dependent on food assistance. We assessed the double burden of malnutrition among Western Sahara refugees living in a protracted emergency. Methods and Findings We implemented a stratified nutrition survey in October–November 2010 in the four Western Sahara refugee camps in Algeria. We sampled 2,005 households, collecting anthropometric measurements (weight, height, and waist circumference) in 1,608 children (6–59 mo) and 1,781 women (15–49 y). We estimated the prevalence of global acute malnutrition (GAM), stunting, underweight, and overweight in children; and stunting, underweight, overweight, and central obesity in women. To assess the burden of malnutrition within households, households were first classified according to the presence of each type of malnutrition. Households were then classified as undernourished, overweight, or affected by the double burden if they presented members with under-nutrition, overweight, or both, respectively. The prevalence of GAM in children was 9.1%, 29.1% were stunted, 18.6% were underweight, and 2.4% were overweight; among the women, 14.8% were stunted, 53.7% were overweight or obese, and 71.4% had central obesity. Central obesity (47.2%) and overweight (38.8%) in women affected a higher proportion of households than did GAM (7.0%), stunting (19.5%), or underweight (13.3%) in children. Overall, households classified as overweight (31.5%) were most common, followed by undernourished (25.8%), and then double burden–affected (24.7%). Conclusions The double burden of obesity and under-nutrition is highly prevalent in households among Western Sahara refugees. The results highlight the need to focus more attention on non-communicable diseases in this population and balance obesity prevention

  11. The double burden of obesity and malnutrition in a protracted emergency setting: a cross-sectional study of Western Sahara refugees.

    Directory of Open Access Journals (Sweden)

    Carlos S Grijalva-Eternod

    Full Text Available BACKGROUND: Households from vulnerable groups experiencing epidemiological transitions are known to be affected concomitantly by under-nutrition and obesity. Yet, it is unknown to what extent this double burden affects refugee populations dependent on food assistance. We assessed the double burden of malnutrition among Western Sahara refugees living in a protracted emergency. METHODS AND FINDINGS: We implemented a stratified nutrition survey in October-November 2010 in the four Western Sahara refugee camps in Algeria. We sampled 2,005 households, collecting anthropometric measurements (weight, height, and waist circumference in 1,608 children (6-59 mo and 1,781 women (15-49 y. We estimated the prevalence of global acute malnutrition (GAM, stunting, underweight, and overweight in children; and stunting, underweight, overweight, and central obesity in women. To assess the burden of malnutrition within households, households were first classified according to the presence of each type of malnutrition. Households were then classified as undernourished, overweight, or affected by the double burden if they presented members with under-nutrition, overweight, or both, respectively. The prevalence of GAM in children was 9.1%, 29.1% were stunted, 18.6% were underweight, and 2.4% were overweight; among the women, 14.8% were stunted, 53.7% were overweight or obese, and 71.4% had central obesity. Central obesity (47.2% and overweight (38.8% in women affected a higher proportion of households than did GAM (7.0%, stunting (19.5%, or underweight (13.3% in children. Overall, households classified as overweight (31.5% were most common, followed by undernourished (25.8%, and then double burden-affected (24.7%. CONCLUSIONS: The double burden of obesity and under-nutrition is highly prevalent in households among Western Sahara refugees. The results highlight the need to focus more attention on non-communicable diseases in this population and balance obesity

  12. Lakeside cemeteries in the Sahara: 5000 years of holocene population and environmental change.

    Directory of Open Access Journals (Sweden)

    Paul C Sereno

    Full Text Available BACKGROUND: Approximately two hundred human burials were discovered on the edge of a paleolake in Niger that provide a uniquely preserved record of human occupation in the Sahara during the Holocene ( approximately 8000 B.C.E. to the present. Called Gobero, this suite of closely spaced sites chronicles the rapid pace of biosocial change in the southern Sahara in response to severe climatic fluctuation. METHODOLOGY/PRINCIPAL FINDINGS: Two main occupational phases are identified that correspond with humid intervals in the early and mid-Holocene, based on 78 direct AMS radiocarbon dates on human remains, fauna and artifacts, as well as 9 OSL dates on paleodune sand. The older occupants have craniofacial dimensions that demonstrate similarities with mid-Holocene occupants of the southern Sahara and Late Pleistocene to early Holocene inhabitants of the Maghreb. Their hyperflexed burials compose the earliest cemetery in the Sahara dating to approximately 7500 B.C.E. These early occupants abandon the area under arid conditions and, when humid conditions return approximately 4600 B.C.E., are replaced by a more gracile people with elaborated grave goods including animal bone and ivory ornaments. CONCLUSIONS/SIGNIFICANCE: The principal significance of Gobero lies in its extraordinary human, faunal, and archaeological record, from which we conclude the following: The early Holocene occupants at Gobero (7700-6200 B.C.E. were largely sedentary hunter-fisher-gatherers with lakeside funerary sites that include the earliest recorded cemetery in the Sahara.Principal components analysis of craniometric variables closely allies the early Holocene occupants at Gobero with a skeletally robust, trans-Saharan assemblage of Late Pleistocene to mid-Holocene human populations from the Maghreb and southern Sahara.Gobero was abandoned during a period of severe aridification possibly as long as one millennium (6200-5200 B.C.E.More gracile humans arrived in the mid

  13. Eghindi among Sahrawi refugees of Western Sahara

    NARCIS (Netherlands)

    Volpato, G.

    2014-01-01

    Eghindi is an illness built around a set of pathological states experienced by Sahrawi in the desert environment of Western Sahara. Its core symptoms are caused by osmotic imbalances related to salt consumption. In 1975, many Sahrawi were exiled into refugee camps, and they have since experienced

  14. Optimal investment and indifference pricing when risk aversion is not monotone: SAHARA utility functions

    NARCIS (Netherlands)

    Chen, A.; Pelsser, A.; Vellekoop, M.

    2008-01-01

    Abstract. We develop a new class of utility functions, SAHARA utility, with the dis- tinguishing feature that they implement the assumption that agents may become less risk-averse for very low values of wealth. This means that SAHARA utility can be used to characterize risk gambling behavior of an

  15. South of Sahara | Page 160 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2015-03-31

    flexible layoutflexible layoutflexible layoutflexible layoutflexible layoutflexible layoutflexible layoutflexible layout. Sud du Sahara. The Kenya National Commission for Science, Technology and Innovation (NACOSTI), in collaboration with IDRC, launched Kenya's first Research Chair on March 31, 2015 in Nairobi. Professor ...

  16. Fennec dust forecast intercomparison over the Sahara in June 2011

    Directory of Open Access Journals (Sweden)

    J.-P. Chaboureau

    2016-06-01

    Full Text Available In the framework of the Fennec international programme, a field campaign was conducted in June 2011 over the western Sahara. It led to the first observational data set ever obtained that documents the dynamics, thermodynamics and composition of the Saharan atmospheric boundary layer (SABL under the influence of the heat low. In support to the aircraft operation, four dust forecasts were run daily at low and high resolutions with convection-parameterizing and convection-permitting models, respectively. The unique airborne and ground-based data sets allowed the first ever intercomparison of dust forecasts over the western Sahara. At monthly scale, large aerosol optical depths (AODs were forecast over the Sahara, a feature observed by satellite retrievals but with different magnitudes. The AOD intensity was correctly predicted by the high-resolution models, while it was underestimated by the low-resolution models. This was partly because of the generation of strong near-surface wind associated with thunderstorm-related density currents that could only be reproduced by models representing convection explicitly. Such models yield emissions mainly in the afternoon that dominate the total emission over the western fringes of the Adrar des Iforas and the Aïr Mountains in the high-resolution forecasts. Over the western Sahara, where the harmattan contributes up to 80 % of dust emission, all the models were successful in forecasting the deep well-mixed SABL. Some of them, however, missed the large near-surface dust concentration generated by density currents and low-level winds. This feature, observed repeatedly by the airborne lidar, was partly forecast by one high-resolution model only.

  17. Sahara Coal: the fine art of collecting fines for profit

    Energy Technology Data Exchange (ETDEWEB)

    Schreckengost, D.; Arnold, D.

    1984-09-01

    Because of a change in underground mining methods that caused a considerable increase in the amount of fine sizes in the raw coal, Sahara Coal Co. designed and constructed a unique and simple fine coal system at their Harrisburg, IL prep plant. Before the new system was built, the overload of the fine coal circuit created a cost crunch due to loss of salable coal to slurry ponds, slurry pond cleaning costs, and operating and maintenance costs--each and every one excessive. Motivated by these problems, Sahara designed a prototype system to dewater the minus 28 mesh refuse. The success of the idea permitted fine refuse to be loaded onto the coarse refuse belt. Sahara also realized a large reduction in pond cleaning costs. After a period of testing, an expanded version of the refuse system was installed to dewater and dry the 28 mesh X 0 clean coal. Clean coal output increased about 30 tph. Cost savings justified the expenditures for the refuse and clean coal systems. These benefits, combined with increased coal sales revenue, paid back the project costs in less than a year.

  18. Cultural Astronomy in Africa South of the Sahara

    Science.gov (United States)

    Holbrook, Jarita

    This chapter examines two foci of cultural astronomy found in Africa south of the Sahara: creation myths and celestial art. The examples highlighted are from the Akan, the Bahima, the Boshongo, the Fon, the Igbo, the Mambila, the Yoruba, and the Zulu people.

  19. Africa, Sub-Sahara: A Selected Functional and Country Bibliography.

    Science.gov (United States)

    Foreign Service (Dept. of State), Washington, DC. Foreign Service Inst.

    Sub-Sahara Africa is covered in this bibliography prepared for use in training programs. Consisting of nearly 500 citations which date from 1940 to the present, topics covered include: POPULATION, Traditional Cultures, Religion, Art, Literature, History, Colonialism, Economic Development, Agricultural Modernization, Education and Manpower,…

  20. The Green Sahara: Climate Change, Hydrologic History and Human Occupation

    Science.gov (United States)

    Blom, Ronald G.; Farr, Tom G.; Feynmann, Joan; Ruzmaikin, Alexander; Paillou, Philippe

    2009-01-01

    Archaeology can provide insight into interactions of climate change and human activities in sensitive areas such as the Sahara, to the benefit of both disciplines. Such analyses can help set bounds on climate change projections, perhaps identify elements of tipping points, and provide constraints on models. The opportunity exists to more precisely constrain the relationship of natural solar and climate interactions, improving understanding of present and future anthropogenic forcing. We are beginning to explore the relationship of human occupation of the Sahara and long-term solar irradiance variations synergetic with changes in atmospheric-ocean circulation patterns. Archaeological and climate records for the last 12 K years are gaining adequate precision to make such comparisons possible. We employ a range of climate records taken over the globe (e.g. Antarctica, Greenland, Cariaco Basin, West African Ocean cores, records from caves) to identify the timing and spatial patterns affecting Saharan climate to compare with archaeological records. We see correlation in changing ocean temperature patterns approx. contemporaneous with drying of the Sahara approx. 6K years BP. The role of radar images and other remote sensing in this work includes providing a geographically comprehensive geomorphic overview of this key area. Such coverage is becoming available from the Japanese PALSAR radar system, which can guide field work to collect archaeological and climatic data to further constrain the climate change chronology and link to models. Our initial remote sensing efforts concentrate on the Gilf Kebir area of Egypt.

  1. Extending the amygdala in theories of threat processing

    Science.gov (United States)

    Fox, Andrew S.; Oler, Jonathan A.; Tromp, Do P.M.; Fudge, Julie L.; Kalin, Ned H.

    2015-01-01

    The central extended amygdala is an evolutionarily conserved set of interconnected brain regions that play an important role in threat processing to promote survival. Two core components of the central extended amygdala, the central nucleus of the amygdala (Ce) and the lateral bed nucleus of the stria terminalis (BST) are highly similar regions that serve complimentary roles by integrating fear- and anxiety-relevant information. Survival depends on the central extended amygdala's ability to rapidly integrate and respond to threats that vary in their immediacy, proximity, and characteristics. Future studies will benefit from understanding alterations in central extended amygdala function in relation to stress-related psychopathology. PMID:25851307

  2. Aridification of the Sahara desert caused by Tethys Sea shrinkage during Late Miocene

    Science.gov (United States)

    Zhang, Z.; Ramstein, G.; Schuster, M.; Li, C.; Contoux, C.; Yan, Q.

    2014-12-01

    It is widely believed that the Sahara desert is no more than ~2-3 million years (Myr) old, with geological evidence showing a remarkable aridification of north Africa at the onset of the Quaternary ice ages. Before that time, north African aridity was mainly controlled by the African summer monsoon (ASM), which oscillated with Earth's orbital precession cycles. Afterwards, the Northern Hemisphere glaciation added an ice volume forcing on the ASM, which additionally oscillated with glacial-interglacial cycles. These findings led to the idea that the Sahara desert came into existence when the Northern Hemisphere glaciated ~2-3 Myr ago. The later discovery, however, of aeolian dune deposits ~7 Myr old suggested a much older age, although this interpretation is hotly challenged and there is no clear mechanism for aridification around this time. Here we use climate model simulations to identify the Tortonian stage (~7-11 Myr ago) of the Late Miocene epoch as the pivotal period for triggering north African aridity and creating the Sahara desert. Through a set of experiments with the Norwegian Earth System Model and the Community Atmosphere Model, we demonstrate that the African summer monsoon was drastically weakened by the Tethys Sea shrinkage during the Tortonian, allowing arid, desert conditions to expand across north Africa. Not only did the Tethys shrinkage alter the mean climate of the region, it also enhanced the sensitivity of the African monsoon to orbital forcing, which subsequently became the major driver of Sahara extent fluctuations. These important climatic changes probably caused the shifts in Asian and African flora and fauna observed during the same period, with possible links to the emergence of early hominins in north Africa.

  3. Dust emission mechanisms in the central Sahara: new insights from remote field observations

    Science.gov (United States)

    Allen, C.; Washington, R.; Engelstaedter, S.

    2013-12-01

    North Africa is the world's largest source of mineral aerosol (dust). The Fennec Project, an international consortium led by the University of Oxford, is the first project to systematically instrument the remote central Sahara Desert. These observations have, among others, provided new insights into the atmospheric mechanisms of dust emission. Bordj Badji Mokhtar, in south-west Algeria, is within kilometres of the centre of the global mean summer dust maximum. The site, operated by Fennec partners ONM Algerie, has been heavily instrumented since summer 2011. During the Intensive Observation Period (IOP) in June 2011, four main emission mechanisms were observed and documented: cold pool outflows, low level jets (LLJs), monsoon surges and dry convective plumes. Establishing the relative importance of dust emission mechanisms has been a long-standing research goal. A detailed partitioning exercise of dust events during the IOP shows that 45% of the dust over BBM was generated by local emission in cold pool outflows, 14% by LLJs and only 2% by dry convective plumes. 27% of the dust was advected to the site rather than locally emitted and 12% of the dust was residual or ';background' dust. The work shows the primacy of cold pool outflows for dust emission in the region and also the important contribution of dust advection. In accordance with long-held ideas, the cube of wind speed is strongly correlated with dust emission. Surprisingly however, particles in long-range advection (>500km) were found to be larger than locally emitted dust. Although a clear LLJ wind structure is evident in the mean diurnal cycle during the IOP (12m/s peak winds at 935hPa between 04-05h), LLJs are only responsible for a relatively small amount of dust emission. There is significant daily variability in LLJ strength; the strongest winds are produced by a relatively small number of events. The position and strength of the Saharan Heat Low is strongly associated with the development (or

  4. Cretaceous Crocodyliforms from the Sahara

    Directory of Open Access Journals (Sweden)

    Paul Sereno

    2009-11-01

    Full Text Available Diverse crocodyliforms have been discovered in recent years in Cretaceous rocks on southern landmasses formerly composing Gondwana.  We report here on six species from the Sahara with an array of trophic adaptations that significantly deepen our current understanding of African crocodyliform diversity during the Cretaceous period.  We describe two of these species (Anatosuchus minor, Araripesuchus wegeneri from nearly complete skulls and partial articulated skeletons from the Lower Cretaceous Elrhaz Formation (Aptian-Albian of Niger. The remaining four species (Araripesuchus rattoides sp. n., Kaprosuchus saharicus gen. n. sp. n., Laganosuchus thaumastos gen. n. sp. n., Laganosuchus maghrebensis gen. n. sp. n. come from contemporaneous Upper Cretaceous formations (Cenomanian in Niger and Morocco.

  5. Sud du Sahara | Page 144 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2015-03-31

    flexible layoutflexible layoutflexible layoutflexible layoutflexible layoutflexible layoutflexible layoutflexible layout. Sud du Sahara. The Kenya National Commission for Science, Technology and Innovation (NACOSTI), in collaboration with IDRC, launched Kenya's first Research Chair on March 31, 2015 in Nairobi. Professor ...

  6. The daytime cycle in dust aerosol direct radiative effects observed in the central Sahara during the Fennec campaign in June 2011

    KAUST Repository

    Banks, Jamie R.

    2014-12-16

    © 2014. American Geophysical Union. All Rights Reserved. The direct clear-sky radiative effect (DRE) of atmospheric mineral dust is diagnosed over the Bordj Badji Mokhtar (BBM) supersite in the central Sahara during the Fennec campaign in June 2011. During this period, thick dust events were observed, with aerosol optical depth values peaking at 3.5. Satellite observations from Meteosat-9 are combined with ground-based radiative flux measurements to obtain estimates of DRE at the surface, top-of-atmosphere (TOA), and within the atmosphere. At TOA, there is a distinct daytime cycle in net DRE. Both shortwave (SW) and longwave (LW) DRE peak around noon and induce a warming of the Earth-atmosphere system. Toward dusk and dawn, the LW DRE reduces while the SW effect can switch sign triggering net radiative cooling. The net TOA DRE mean values range from -9 Wm-2 in the morning to heating of +59 Wm-2 near midday. At the surface, the SW dust impact is larger than at TOA: SW scattering and absorption by dust results in a mean surface radiative cooling of 145Wm-2. The corresponding mean surface heating caused by increased downward LW emission from the dust layer is a factor of 6 smaller. The dust impact on the magnitude and variability of the atmospheric radiative divergence is dominated by the SW cooling of the surface, modified by the smaller SW and LW effects at TOA. Consequently, dust has a mean daytime net radiative warming effect on the atmosphere of 153Wm-2.

  7. Reconstruction of exposure histories of meteorites from Antarctica and the Sahara

    International Nuclear Information System (INIS)

    Neupert, U.; Neumann, S.; Leya, I.; Michel, R.; Kubik, P.W.; Bonani, G.; Hajdas, I.; Suter, M.

    1997-01-01

    10 Be, 14 C, and 26 Al were analyzed in H-, L-, and LL-chondrites from the Acfer region in the Algerian Sahara and from the Allan Hills/Antarctica. Exposure histories and terrestrial ages could be determined. (author) 3 figs., 2 refs

  8. Aridification of the Sahara desert caused by Tethys Sea shrinkage during the Late Miocene

    Science.gov (United States)

    Zhang, Zhongshi; Ramstein, Gilles; Schuster, Mathieu; Li, Camille; Contoux, Camille; Yan, Qing

    2014-09-01

    It is widely believed that the Sahara desert is no more than ~2-3 million years (Myr) old, with geological evidence showing a remarkable aridification of north Africa at the onset of the Quaternary ice ages. Before that time, north African aridity was mainly controlled by the African summer monsoon (ASM), which oscillated with Earth's orbital precession cycles. Afterwards, the Northern Hemisphere glaciation added an ice volume forcing on the ASM, which additionally oscillated with glacial-interglacial cycles. These findings led to the idea that the Sahara desert came into existence when the Northern Hemisphere glaciated ~2-3 Myr ago. The later discovery, however, of aeolian dune deposits ~7 Myr old suggested a much older age, although this interpretation is hotly challenged and there is no clear mechanism for aridification around this time. Here we use climate model simulations to identify the Tortonian stage (~7-11 Myr ago) of the Late Miocene epoch as the pivotal period for triggering north African aridity and creating the Sahara desert. Through a set of experiments with the Norwegian Earth System Model and the Community Atmosphere Model, we demonstrate that the African summer monsoon was drastically weakened by the Tethys Sea shrinkage during the Tortonian, allowing arid, desert conditions to expand across north Africa. Not only did the Tethys shrinkage alter the mean climate of the region, it also enhanced the sensitivity of the African monsoon to orbital forcing, which subsequently became the major driver of Sahara extent fluctuations. These important climatic changes probably caused the shifts in Asian and African flora and fauna observed during the same period, with possible links to the emergence of early hominins in north Africa.

  9. Reconstruction of exposure histories of meteorites from Antarctica and the Sahara

    Energy Technology Data Exchange (ETDEWEB)

    Neupert, U.; Neumann, S.; Leya, I.; Michel, R. [Hannover Univ. (Germany). Zentraleinrichtung fuer Strahlenschutz (ZfS); Kubik, P.W. [Paul Scherrer Inst. (PSI), Villigen (Switzerland); Bonani, G.; Hajdas, I.; Suter, M. [Eidgenoessische Technische Hochschule, Zurich (Switzerland)

    1997-09-01

    {sup 10}Be, {sup 14}C, and {sup 26}Al were analyzed in H-, L-, and LL-chondrites from the Acfer region in the Algerian Sahara and from the Allan Hills/Antarctica. Exposure histories and terrestrial ages could be determined. (author) 3 figs., 2 refs.

  10. Sud du Sahara | Page 272 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sud du Sahara. Read more about Decentralization, Local Politics and the Construction of Women's Citizenship (Uganda, Kenya and Tanzania) - Phase I. Langue English. Read more ... Read more about Monitoring Progress Toward the Information Society : Digital Divide Index. Langue English. Read more about Réforme ...

  11. Speleothem evidence for the greening of the Sahara and its implications for the early human dispersal out of sub-Saharan Africa

    Science.gov (United States)

    El-Shenawy, Mohammed I.; Kim, Sang-Tae; Schwarcz, Henry P.; Asmerom, Yemane; Polyak, Victor J.

    2018-05-01

    Although there is a consensus that there were wet periods (greening events) in the Sahara in the past, the spatial extent and the timing of these greening events are still in dispute, yet critical to our understanding of the early human dispersal out of Africa. Our U-series dates of speleothems from the Northeastern Sahara (Wadi Sannur cave, Egypt) reveal that the periods of speleothem growth were brief and restricted to the interglacial Marine Isotope Stages MIS 5.5, MIS 7.3, and the early MIS 9 with a remarkable absence of the Holocene deposition of speleothems. These growth periods of Wadi Sannur cave speleothems correspond to periods of high rainfall and spread of vegetation (green Sahara). Distinct low δ18O values of speleothems indicate a distal moisture source that we interpret to be the Atlantic Ocean. These two lines of evidence from the Wadi Sannur speleothems thus suggest that maximal northward shifts in the West African monsoon system occurred during the growth periods of the speleothems, leading to greening of the Sahara, facilitating human migration into Eurasia. The periods of speleothem growth at Wadi Sannur cave are contemporaneous with important archeological events: (1) the earliest occurrence of the Middle Stone Age assemblages and Homo sapiens in North Africa (Jebel Irhoud), suggesting wide spread of greening conditions over the East-West transect of the Sahara, (2) the sharp technological break between the Acheulo-Yabrudian and the Mousterian industries, and (3) the arrival of Homo sapiens in Levant, indicating a key role of the Sahara route in early human dispersal out of Africa.

  12. DETERMINANTS OF AGRICULTURAL PRODUCTIVITY GROWTH IN SUB-SAHARA AFRICA: 1961-2003

    Directory of Open Access Journals (Sweden)

    Olajide Abraham Ajao

    2012-12-01

    Full Text Available This study examined changes in agricultural productivity in Sub-Sahara Africa countries in the context of diverse institutional arrangements using Data Envelopment Analysis (DEA. From a time series which consists of information on agricultural production and means of production were obtained from FAO AGROSTAT and rainfall data from Steve O’Connell data base. The information was for a 43-year period (1961-2003; DEA method was used to measure Malmquist index of total factor productivity. A decomposition of TFP measures revealed that the observed increase in the TFP in the sub–Sahara Africa agriculture is due to technological change rather than efficiency change which is the main constrained of achieving higher level of TFP during the reference period. The study further examined the effect of land quality, malaria, education and selected governance indicators such as, control of corruption and government effectiveness on productivity growth. All the variables included in the model are significant with the exception of government effectiveness

  13. Long-distance autumn migration across the Sahara by painted lady butterflies: exploiting resource pulses in the tropical savannah.

    Science.gov (United States)

    Stefanescu, Constantí; Soto, David X; Talavera, Gerard; Vila, Roger; Hobson, Keith A

    2016-10-01

    The painted lady, Vanessa cardui, is a migratory butterfly that performs an annual multi-generational migration between Europe and North Africa. Its seasonal appearance south of the Sahara in autumn is well known and has led to the suggestion that it results from extremely long migratory flights by European butterflies to seasonally exploit the Sahel and the tropical savannah. However, this possibility has remained unproven. Here, we analyse the isotopic composition of butterflies from seven European and seven African countries to provide new support for this hypothesis. Each individual was assigned a geographical natal origin, based on its wing stable hydrogen isotope (δ 2 H w ) value and a predicted δ 2 H w basemap for Europe and northern Africa. Natal assignments of autumn migrants collected south of the Sahara confirmed long-distance movements (of 4000 km or more) starting in Europe. Samples from Maghreb revealed a mixed origin of migrants, with most individuals with a European origin, but others having originated in the Sahel. Therefore, autumn movements are not only directed to northwestern Africa, but also include southward and northward flights across the Sahara. Through this remarkable behaviour, the productive but highly seasonal region south of the Sahara is incorporated into the migratory circuit of V. cardui. © 2016 The Author(s).

  14. SAHARA-J: Journal of Social Aspects of HIV/AIDS - Vol 13, No 1 ...

    African Journals Online (AJOL)

    SAHARA J Journal of Social Aspects of HIV/AIDS Research Alliance. ... Prevalence of prenatal depression and associated factors among HIV-positive ... HIV/AIDS media messages affect comprehension and beliefs of young South African ...

  15. Early cretaceous dinosaurs from the sahara.

    Science.gov (United States)

    Sereno, P C; Wilson, J A; Larsson, H C; Dutheil, D B; Sues, H D

    1994-10-14

    A major question in Mesozoic biogeography is how the land-based dinosaurian radiation responded to fragmentation of Pangaea. A rich fossil record has been uncovered on northern continents that spans the Cretaceous, when continental isolation reached its peak. In contrast, dinosaur remains on southern continents are scarce. The discovery of dinosaurian skeletons from Lower Cretaceous beds in the southern Sahara shows that several lineages of tetanuran theropods and broad-toothed sauropods had a cosmopolitan distribution across Pangaea before the onset of continental fragmentation. The distinct dinosaurian faunas of Africa, South America, and Asiamerica arose during the Cretaceous by differential survival of once widespread lineages on land masses that were becoming increasingly isolated from one another.

  16. Resource Geopolitics: Cold War Technologies, Global Fertilizers, and the Fate of Western Sahara.

    Science.gov (United States)

    Camprubí, Lino

    2015-07-01

    When, after years of geological and geophysical exploration, a phosphate mine was discovered at Bu-Craa in 1964, Western Sahara received renewed geopolitical attention. Several countries competing for the control of the world fertilizer market, including Morocco, Spain, France, and the United States, developed diverging strategies to gain control of the mineral. After intense negotiations revolving around the materiality of mining technologies and involving reserve estimations, sabotage, and flexing of diplomatic muscles, Morocco took over the Spanish colony in 1975. While this secured Morocco's place in the world market, it condemned the local population to exile and domination. This article explores three technological stages of the exploitation of phosphate in Western Sahara that underpin the geopolitical history. This perspective yields new visions of cold war technology and postcolonial markets.

  17. Pluvial Phases In The Sahara During The Holocene: A Multi-disciplinary Comparison

    Science.gov (United States)

    Barnikel, F.; Becht, M.

    The understanding of low latitude palaeoclimatic dynamics is incomplete without a thorough analysis of the wide-spread fluctuations between humid and arid phases in the Sahara. It is especially the holocene that has been scrutinized in respect to lake and river deposits, pollen analysis, macrorest analysis, groundwater dating, remote sensing, pedology, archaeology and even glottochronology. During the last decades a lot of teams from different countries (e.g. French in the west and south, Germans in the south and east, Americans, Italians and Polish in the east and many more) have evaluated numerous data gained from different disciplines all over the Sahara. Inten- sive work has shed new light on climate dynamics especially in the eastern part. But even there, as in other parts as well, the data are insufficient to explain palaeoclimatic variability to a satisfying degree. Meticulous analysis of the published data has shown grave inconsistencies between the different disciplines concerning dates for pluvial phases (differences up to several millenia), the intensity of rainfall, the face of the palaeoenvironment and the like. Our aim is to show the areas that lack sufficient data and to point out the huge problems that arise from the differing research results in other parts. Since a valid assessment of holocene palaeoclimatic dynamics for large parts of the globe is unthinkable without a proper understanding of emergence, form and ending of pluvial phases in the Sahara, more multi-disciplinary work is neces- sary. Furthermore, all data, especially the radiocarbon datings, need to be collected and made accessible for all disciplines in a data bank.

  18. Norwegian support in development of regulations of radioactive waste management in central Asia-threat assessment

    International Nuclear Information System (INIS)

    Zhunussova, Tamara; Sneve, Malgorzata; Liland, Astrid; Strand, Per; Kim, Alexander; Mirsaidov, Ulmas; Tolongutov, Baigabyl

    2011-01-01

    In Central Asia (CA) the radioactive waste comes mainly from uranium mining and milling, nuclear weapon testing and nuclear power development and other ionizing sources. This waste was produced, to a greater extent, by the military-industrial complex and the uranium and non-uranium industry, and, to a lesser extent, by the nuclear industry and in the process of use of isotope products. Exploitation and mining of uranium and thorium deposits produce a large amount of solid and liquid radioactive waste, as well volatile contaminants which need a proper management. In Central Asia the wastes are mainly stored at the surface in large piles and represent a long-term potential health and environmental hazard. The process of remediating legacy sites of the past and reducing the threats is now getting under way, with the design and implementation of remediation activities, partly with international support. However, there is a significant lack in the regulatory basis for carrying out such remediation work, including a lack of relevant radiation and environmental safety norms and standards, licensing procedures and requirements for monitoring etc., as well as expertise to transform such a basis into practice. Accordingly, the objective of the proposed project is to assist the relevant regulatory authorities in Kazakhstan, Kirgizstan and Tajikistan to develop national robust and adequate regulations and procedures, taking into account the international guidance and Norwegian experience with regulatory support projects in Russia. Specific expected results in the project period include: a threat assessment report identifying priority areas for regulatory development, based on the status of current regulatory documents and the hazard presented by the different sites and facilities; development of national radioactive waste management strategies in each country; development of an enhanced regulatory framework for supervision of nuclear matters, and an enhanced safety culture

  19. Preliminary comparative study of anti-inflmmatory effect of unheated and heat-treated Sahara honey: In vivo approach

    Directory of Open Access Journals (Sweden)

    Moussa Ahmed

    2015-11-01

    Full Text Available Objective: To investigate the effect of unheated and heat-treated of Sahara honey. Methods: A total of 24 Swiss albino mice weighing 25–35 g were divided into four groups (n = 6. Anti-inflammatory effect was assessed at 1, 2, 3, 4, 5 and 6 h after subplantar injection of carrageenan (0.5 mL of a 1% solution in normal saline. In addition, total phenolic content was determined by modified Folin-Ciocalteu method. Results: The total phenolic content capacity of the Sahara honey before and after heat treatment was between 72 and 97.9 mg of gallic acid equivalents/100 g of honey respectively. Administration of unheated honey (oral administration reduced significantly (P < 0.05. The carrageenan induced mice paw edema model at 1, 3 and 6 h for 21.85%, 5.43% and 80.43%, respectively. Administration of heat-treated honey showed insignificant inhibition of carrageenan and induced paw edema at 1 h (31.16%, 3 h (0.25% and 6 h (34.19%. The 50 mg/kg diclofenac exhibited percent reduction in paw volume 16.12%, 8.90% and 15.32% after 1 h, 3 h and 6 h, respectively, when compared with control animals. No toxicity was identified. Conclusions: Our results suggest that unheated Sahara honey has anti-inflammatory effects by reducing the mice paw edema size while heat-treated Sahara honey decreases the antiinflammatory activity.

  20. Search Results | Page 4 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Results 31 - 40 of 260 ... South of Sahara 1913 Apply South of Sahara filter · North of Sahara 1635 Apply North of Sahara filter · South Asia 1366 Apply South Asia filter · Far East Asia 1310 Apply Far East Asia filter · Central Asia 1273 Apply Central Asia filter · South America 873 Apply South America filter · North and Central ...

  1. Search Results | Page 27 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara 1914 Apply South of Sahara filter · North of Sahara 1636 Apply North of Sahara filter · South Asia 1368 Apply South Asia filter · Far East Asia 1311 Apply Far East Asia filter · Central Asia 1274 Apply Central Asia filter · South America 875 Apply South America filter · North and Central America 870 Apply ...

  2. How much rainfall sustained a Green Sahara during the mid-Holocene?

    Science.gov (United States)

    Hopcroft, Peter; Valdes, Paul; Harper, Anna

    2016-04-01

    The present-day Sahara desert has periodically transformed to an area of lakes and vegetation during the Quaternary in response to orbitally-induced changes in the monsoon circulation. Coupled atmosphere-ocean general circulation model simulations of the mid-Holocene generally underestimate the required monsoon shift, casting doubt on the fidelity of these models. However, the climatic regime that characterised this period remains unclear. To address this, we applied an ensemble of dynamic vegetation model simulations using two different models: JULES (Joint UK Land Environment Simulator) a comprehensive land surface model, and LPJ (Lund-Potsdam-Jena model) a widely used dynamic vegetation model. The simulations are forced with a number of idealized climate scenarios, in which an observational climatology is progressively altered with imposed anomalies of precipitation and other related variables, including cloud cover and humidity. The applied anomalies are based on an ensemble of general circulation model simulations, and include seasonal variations but are spatially uniform across the region. When perturbing precipitation alone, a significant increase of at least 700mm/year is required to produce model simulations with non-negligible vegetation coverage in the Sahara region. Changes in related variables including cloud cover, surface radiation fluxes and humidity are found to be important in the models, as they modify the water balance and so affect plant growth. Including anomalies in all of these variables together reduces the precipitation change required for a Green Sahara compared to the case of increasing precipitation alone. We assess whether the precipitation changes implied by these vegetation model simulations are consistent with reconstructions for the mid-Holocene from pollen samples. Further, Earth System models predict precipitation increases that are significantly smaller than that inferred from these vegetation model simulations. Understanding

  3. Sahara Coal: the fine art of collecting fines for profit

    Energy Technology Data Exchange (ETDEWEB)

    Schreckengost, D.; Arnold, D.

    1984-09-01

    A considerable increase in the volume of fines in rom coal caused Sahara Coal in Illinois to redesign the fine coal system in their Harrisburg preparation plant. Details of the new design, and particularly the fine refuse system which dewaters and dries 28 mesh x O clean coal, are given. Results have exceeded expectations in reducing product losses, operating costs and slurry pond cleaning costs.

  4. Sud du Sahara | Page 78 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    flexible layoutflexible layoutflexible layoutflexible layoutflexible layout. Sud du Sahara. La persistance de la pauvreté en Afrique subsaharienne, dans le contexte de progression rapide de la mondialisation et de la libéralisation des échanges commerciaux des deux dernières décennies, a suscité énormément de débats en ...

  5. Sud du Sahara | Page 65 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    flexible layoutflexible layoutflexible layoutflexible layoutflexible layout. Sud du Sahara. La persistance de la pauvreté en Afrique subsaharienne, dans le contexte de progression rapide de la mondialisation et de la libéralisation des échanges commerciaux des deux dernières décennies, a suscité énormément de débats en ...

  6. A NEW SPECIES OF CYRTOSPIRIFER (BRACHIOPODA FROM THE MIDDLE DEVONIAN OF THE WESTERN SAHARA (NORTHWESTERN AFRICA

    Directory of Open Access Journals (Sweden)

    MENA SCHEMM-GREGORY

    2011-03-01

    Full Text Available A new species of Cyrtospirifer is described from the Middle to Upper Givetian of the Western Sahara (Northwest Africa. Cyrtospirifer tindoufensis new species differs in its smaller number and coarser medial and flank plications and equibiconvex shell profile from the other Givetian species of Cyrtospirifer that all occur in Europe and to which the new species probably gives rise. The new implications of the proposed phylogeny of the earliest cyrtospiriferids and their origin from the Western Sahara are discussed. The palaeogeographic distribution of the cyrtospiriferids during the Givetian and Frasnian is shown and its migration ways are described considering the global transgression and regression cycles. 

  7. Impacts of climate variability and change on crop yield in sub-Sahara Africa

    Science.gov (United States)

    Pan, S.; Zhang, J.; Yang, J.; Chen, G.; Xu, R.; Zhang, B.; Lou, Y.

    2017-12-01

    Much concern has been raised about the impacts of climate change and climate extremes on Africa's food security. The impact of climate change on Africa's agriculture is likely to be severe compared to other continents due to high rain-fed agricultural dependence, and limited ability to mitigate and adapt to climate change. In recent decades, warming in Africa is more pronounced and faster than the global average and this trend is likely to continue in the future. However, quantitative assessment on impacts of climate extremes and climate change on crop yield has not been well investigated yet. By using an improved agricultural module of the Dynamic Land Ecosystem Model (DLEM-AG2) driven by spatially-explicit information on land use, climate and other environmental changes, we have assessed impacts of historical climate variability and future climate change on food crop yield across the sub-Sahara Africa during1980-2016 and the rest of the 21st century (2017-2099). Our simulated results indicate that African crop yield in the past three decades shows an increasing trend primarily due to cropland expansion. However, crop yield shows substantially spatial and temporal variation due to inter-annual and inter-decadal climate variability and spatial heterogeneity of environmental drivers. Droughts have largely reduced crop yield in the most vulnerable regions of Sub-Sahara Africa. Future projections with DLEM-AG2 show that food crop production in Sub-Sahara Africa would be favored with limiting end-of-century warming to below 1.50 C.

  8. Protected areas in tropical Africa: assessing threats and conservation activities.

    Science.gov (United States)

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A; Davenport, Tim R B; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C; Holbech, Lars H; Huijbregts, Bas; Kühl, Hjalmar S; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G; Petre, Charles-Albert; Rainey, Hugo J; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  9. Protected areas in tropical Africa: assessing threats and conservation activities.

    Directory of Open Access Journals (Sweden)

    Sandra Tranquilli

    Full Text Available Numerous protected areas (PAs have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  10. Impact of Sahara dust transport on Cape Verde atmospheric element particles.

    Science.gov (United States)

    Almeida-Silva, M; Almeida, S M; Freitas, M C; Pio, C A; Nunes, T; Cardoso, J

    2013-01-01

    The objectives of this study were to (1) conduct an elemental characterization of airborne particles sampled in Cape Verde and (2) assess the influence of Sahara desert on local suspended particles. Particulate matter (PM(10)) was collected in Praia city (14°94'N; 23°49'W) with a low-volume sampler in order to characterize its chemical composition by k0-INAA. The filter samples were first weighed and subsequently irradiated at the Portuguese Research Reactor. Results showed that PM(10) concentrations in Cape Verde markedly exceeded the health-based air quality standards defined by the European Union (EU), World Health Organization (WHO), and U.S. Environmental Protection Agency (EPA), in part due to the influence of Sahara dust transport. The PM(10) composition was characterized essentially by high concentrations of elements originating from the soil (K, Sm, Co, Fe, Sc, Rb, Cr, Ce, and Ba) and sea (Na), and low concentrations of anthropogenic elements (As, Zn, and Sb). In addition, the high concentrations of PM measured in Cape Verde suggest that health of the population may be less affected compared with other sites where PM(10) concentrations are lower but more enriched with toxic elements.

  11. Using Flow Regime Lightning and Sounding Climatologies to Initialize Gridded Lightning Threat Forecasts for East Central Florida

    Science.gov (United States)

    Lambert, Winifred; Short, David; Volkmer, Matthew; Sharp, David; Spratt, Scott

    2007-01-01

    Each morning, the forecasters at the National Weather Service in Melbourne, FL (NWS MLB) produce an experimental cloud-to-ground (CG) lightning threat index map for their county warning area (CWA) that is posted to their web site (httl://www.srh.weather.gov/mlb/ghwo/lightning.shtml) . Given the hazardous nature of lightning in East Central Florida, especially during the warm season months of May September, these maps help users factor the threat of lightning, relative to their location, into their daily plans. The maps are color-coded in five levels from Very Low to Extreme, with threat level definitions based on the probability of lightning occurrence and the expected amount of CG activity. On a day in which thunderstorms are expected, there are typically two or more threat levels depicted spatially across the CWA. The locations of relative lightning threat maxima and minima often depend on the position and orientation of the low-level ridge axis, forecast propagation and interaction of sea/lake/outflow boundaries, expected evolution of moisture and stability fields, and other factors that can influence the spatial distribution of thunderstorms over the CWA. The lightning threat index maps are issued for the 24-hour period beginning at 1200 UTC each day with a grid resolution of 5 km x 5 km. Product preparation is performed on the AWIPS Graphical Forecast Editor (GFE), which is the standard NWS platform for graphical editing. Until recently, the forecasters created each map manually, starting with a blank map. To improve efficiency of the forecast process, NWS MLB requested that the Applied Meteorology Unit (AMU) create gridded warm season lightning climatologies that could be used as first-guess inputs to initialize lightning threat index maps. The gridded values requested included CG strike densities and frequency of occurrence stratified by synoptic-scale flow regime. The intent was to improve consistency between forecasters while allowing them to focus on the

  12. How hazardous is the Sahara Desert crossing for migratory birds? Indications from satellite tracking of raptors

    Science.gov (United States)

    Strandberg, Roine; Klaassen, Raymond H. G.; Hake, Mikael; Alerstam, Thomas

    2010-01-01

    We investigated the risk associated with crossing the Sahara Desert for migrating birds by evaluating more than 90 journeys across this desert by four species of raptors (osprey Pandion haliaetus, honey buzzard Pernis apivorus, marsh harrier Circus aeruginosus and Eurasian hobby Falco subbuteo) recorded by satellite telemetry. Forty per cent of the crossings included events of aberrant behaviours, such as abrupt course changes, slow travel speeds, interruptions, aborted crossings followed by retreats from the desert and failed crossings due to death, indicating difficulties for the migrants. The mortality during the Sahara crossing was 31 per cent per crossing attempt for juveniles (first autumn migration), compared with only 2 per cent for adults (autumn and spring combined). Mortality associated with the Sahara passage made up a substantial fraction (up to about half for juveniles) of the total annual mortality, demonstrating that this passage has a profound influence on survival and fitness of migrants. Aberrant behaviours resulted in late arrival at the breeding grounds and an increased probability of breeding failure (carry-over effects). This study also demonstrates that satellite tracking can be a powerful method to reveal when and where birds are exposed to enhanced risk and mortality during their annual cycles. PMID:19955169

  13. Coping with global environmental change, disasters and security. Threats, challenges, vulnerabilities and risks

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; UNU-EHS, Bonn (DE). College of Associated Scientists and Advisors (CASA); Oswald Spring, Ursula [National Univ. of Mexico, Cuernavaca (MX). Regional Multidisciplinary Research Centre (CRIM); Mesjasz, Czeslaw [Cracow Univ. of Exonomics (Poland). Faculty of Management; Grin, John [Amsterdam Univ. (Netherlands). Dept. of Political Science; Dutch Knowledge network for Systems Innovations and Transitions (KSI), Amsterdam (Netherlands); Kameri-Mbote, Patricia [Strathmore Univ., Nairobi (Kenya). Dept. of Law; International Environmental Law Research Centre, Nairobi (Kenya); Chourou, Bechir [Univ. of Tunis-Carthage, Hammam-Chatt (Tunisia); Dunay, Pal [Geneva Centre for Security Policy (Switzerland). International Training Course in Security Policy; Birkmann, Joern (eds.) [United Nations Univ. (UNU), Bonn (DE). Inst. for Environment and Human Security (EHS)

    2011-07-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10 parts concepts of military and political hard security and economic, social, environmental soft security with a regional focus on the Near East, North and Sub-Sahara Africa and Asia and on hazards in urban centres. The major focus is on coping with global environmental change: climate change, desertification, water, food and health and with hazards and strategies on social vulnerability and resilience building and scientific, international, regional and national political strategies, policies and measures including early warning of conflicts and hazards. The book proposes a political geo-ecology and discusses a 'Fourth Green Revolution' for the Anthropocene era of earth history. (orig.)

  14. Quality in primary health care services in sub-Sahara Africa: right or ...

    African Journals Online (AJOL)

    The Primary Health Care (PHC) system has been the foundation for the operation of the health system in most of Sub-Sahara Africa following the Alma Ata Declaration in 1978. Quality of care is an important determinant of health services utilization, and is a health outcome of public health importance. It is known that the ...

  15. Review: Hérodote: Revue de géographie et de géopolitique, 2011/3, no. 142: Géopolitique du Sahara, Paris: La Découverte Besprechung: Hérodote: Revue de géographie et de géopolitique, 2011/3, Nr. 142: Géopolitique du Sahara, Paris: La Découverte

    Directory of Open Access Journals (Sweden)

    Laurence Marfaing

    2011-01-01

    Full Text Available Review of the issue 2011/3, no. 142, of Hérodote: Revue de géographie et de géopolitique: Géopolitique du Sahara, Paris: La Découverte.Besprechung der Ausgabe 2011/3, Nr. 142, von Hérodote: Revue de géographie et de géopolitique: Géopolitique du Sahara, Paris: La Découverte.

  16. Post-Cretaceous kinematics of the Atlas and Tell systems in central Algeria: Early foreland folding and subduction-related deformation

    NARCIS (Netherlands)

    Benaouali-Mebarek, N.; Frizon de Lamotte, D.; Roca, E.; Bracene, R.; Faure, J.L.; Sassi, W.; Roure, F.

    2006-01-01

    Available surface and industrial subsurface data provide the basis for a general balanced cross-section from the Sahara platform to the Mediterranean Sea in central Algeria. This section gives an overview of the whole Maghrebian orogen comprising from south to north the following structural domains:

  17. Sahara Dust Cloud

    Science.gov (United States)

    2005-01-01

    [figure removed for brevity, see original site] Dust Particles Click on the image for Quicktime movie from 7/15-7/24 A continent-sized cloud of hot air and dust originating from the Sahara Desert crossed the Atlantic Ocean and headed towards Florida and the Caribbean. A Saharan Air Layer, or SAL, forms when dry air and dust rise from Africa's west coast and ride the trade winds above the Atlantic Ocean. These dust clouds are not uncommon, especially during the months of July and August. They start when weather patterns called tropical waves pick up dust from the desert in North Africa, carry it a couple of miles into the atmosphere and drift westward. In a sequence of images created by data acquired by the Earth-orbiting Atmospheric Infrared Sounder ranging from July 15 through July 24, we see the distribution of the cloud in the atmosphere as it swirls off of Africa and heads across the ocean to the west. Using the unique silicate spectral signatures of dust in the thermal infrared, AIRS can detect the presence of dust in the atmosphere day or night. This detection works best if there are no clouds present on top of the dust; when clouds are present, they can interfere with the signal, making it much harder to detect dust as in the case of July 24, 2005. In the Quicktime movie, the scale at the bottom of the images shows +1 for dust definitely detected, and ranges down to -1 for no dust detected. The plots are averaged over a number of AIRS observations falling within grid boxes, and so it is possible to obtain fractional numbers. [figure removed for brevity, see original site] Total Water Vapor in the Atmosphere Around the Dust Cloud Click on the image for Quicktime movie The dust cloud is contained within a dry adiabatic layer which originates over the Sahara Desert. This Saharan Air Layer (SAL) advances Westward over the Atlantic Ocean, overriding the cool, moist air nearer the surface. This burst of very dry air is visible in the AIRS retrieved total water

  18. Using Cloud-to-Ground Lightning Climatologies to Initialize Gridded Lightning Threat Forecasts for East Central Florida

    Science.gov (United States)

    Lambert, Winnie; Sharp, David; Spratt, Scott; Volkmer, Matthew

    2005-01-01

    Each morning, the forecasters at the National Weather Service in Melbourn, FL (NWS MLB) produce an experimental cloud-to-ground (CG) lightning threat index map for their county warning area (CWA) that is posted to their web site (http://www.srh.weather.gov/mlb/ghwo/lightning.shtml) . Given the hazardous nature of lightning in central Florida, especially during the warm season months of May-September, these maps help users factor the threat of lightning, relative to their location, into their daily plans. The maps are color-coded in five levels from Very Low to Extreme, with threat level definitions based on the probability of lightning occurrence and the expected amount of CG activity. On a day in which thunderstorms are expected, there are typically two or more threat levels depicted spatially across the CWA. The locations of relative lightning threat maxima and minima often depend on the position and orientation of the low-level ridge axis, forecast propagation and interaction of sea/lake/outflow boundaries, expected evolution of moisture and stability fields, and other factors that can influence the spatial distribution of thunderstorms over the CWA. The lightning threat index maps are issued for the 24-hour period beginning at 1200 UTC (0700 AM EST) each day with a grid resolution of 5 km x 5 km. Product preparation is performed on the AWIPS Graphical Forecast Editor (GFE), which is the standard NWS platform for graphical editing. Currently, the forecasters create each map manually, starting with a blank map. To improve efficiency of the forecast process, NWS MLB requested that the Applied Meteorology Unit (AMU) create gridded warm season lightning climatologies that could be used as first-guess inputs to initialize lightning threat index maps. The gridded values requested included CG strike densities and frequency of occurrence stratified by synoptic-scale flow regime. The intent is to increase consistency between forecasters while enabling them to focus on

  19. Les espèces médicinales spontanées du Sahara septentrional ...

    African Journals Online (AJOL)

    The spontaneous plants of the Sahara are very feature by their fashion of adaptation individual to the very coercive desert environment to their survival. To short come our spatio-temporal survey of 5 years (2000- 2005), we put in evidence the existence of 5 different geomorphologic zones, in which we inventoried 130 ...

  20. What Contribution can Colombia Offer Towards Peace and Respect for International Law in the Western Sahara?

    Directory of Open Access Journals (Sweden)

    Carlos Ruiz Miguel

    2018-05-01

    Full Text Available This paper argues that the recognition of the Sahrawi Arab Democratic Republic (SADR constitutes a contribution to respecting International Law and peace among peoples. We start from the idea that given that Public International Law is an “imperfect” law due to its lack of a centralized executive power, its enforcement depends in large measure on the responsibility of member states of the international community. Then, this study considers both the legal status of the Western Sahara –a conflict where the right to self-determination and independence is clearly defined– and the circumstances surrounding the foundation of the SADR and its legitimacy. Because of the inaction of the central bodies of the international community that do not want, or cannot, enforce this right, it is necessary to highlight the responsibility of the member states of the international community to fulfil this task. That is the particular case of Colombia and the American states, which have ratified the Montevideo Convention where this responsibility is clearly shown. The actions of every State to fulfil International Law are a contribution to its respect and to the pacific resolution of controversies, so that the recognition of the SADR is a contribution to law and peace.

  1. Search Results | Page 2 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South of Sahara 650 Apply South of Sahara filter · North of Sahara 546 Apply North of Sahara filter · South Asia 439 Apply South Asia filter · Far East Asia 420 Apply Far East Asia filter · Central Asia 405 Apply Central Asia filter · South America 369 Apply South America filter · West Indies 103 Apply West Indies filter · Middle ...

  2. SAHARA-J: Journal of Social Aspects of HIV/AIDS - Vol 9, No 2 (2012)

    African Journals Online (AJOL)

    SAHARA J Journal of Social Aspects of HIV/AIDS Research Alliance. ... The experiences of Batswana families regarding hospice care of AIDS patients in the Bophirima district, North West province, South Africa · EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.

  3. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  4. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  5. ARCHAEOLOGICAL AND ENVIRONMENTAL CHANGES BETWEEN 9500 BP AND 4500 BP: A CONTRIBUTION FROM THE SAHARA TO UNDERSTAND EXPANDING DROUGHTS IN THE “GREAT MEDITERRANEAN”

    Directory of Open Access Journals (Sweden)

    E. A.A. Garcea

    2013-03-01

    Full Text Available The Sahara is more connected to the Mediterranean than often assumed and palynology, in particular, has provided evidence of past interrelations between the Mediterranean and the Sahara with pollen spectra from prehistoric Saharan deposits including Mediterranean taxa. In order to show human-environment relationships and populations’ strategies in response to changing environments, this paper presents a case study from the southern Sahara. This region offered a natural laboratory for the study of human/climate interaction as the range of environmental change extended from flood to drought, forcing people to cope with periodic environmental instability. When the tropical rainfall belt migrated northward, watertable outcropped in interdunal depressions and formed permanent lakes, which alternated with severe arid spells. As a case study, this paper presents the results of interdisciplinary investigations on climate changes, human adaptations and subsistence strategies at Gobero, in the southern Sahara of Niger. Gobero is a restricted archaeological area comprising 8 sites that surround the shores of a palaeolake. It was intermittently occupied between about 9500 cal years BP and 4500 BP. Due to alternating environmental conditions it could only be occupied at the beginning and at the end of the most humid periods.

  6. Tensions and negotiations for NGOs organizing and human rights in Morocco and Western Sahara

    DEFF Research Database (Denmark)

    Albu, Oana Brindusa

    ” ethnographers lack a stable “at home/abroad,” “here/there” distinction to fall back on, since the field is a contested site, subject to ongoing negotiations among international regimes. Drawing on fieldwork with activist NGOs in Morocco and the Western Sahara, I will reflect on this conundrum by addressing...

  7. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  8. Meningkatkan Profesionalisme Guru Melalui Implementasi Manajemen Berbasis Sekolah (MBS Di SD Sahara Kabupaten Bandung

    Directory of Open Access Journals (Sweden)

    Bambang Suprihatin

    2017-10-01

    Full Text Available This study aims to determine the teachers’ professionalism through the implementation of School Based Management (SBM in SAHARA elementary school. The study applies qualitative approach with descriptive. The subject of this research is SAHARA elementary school, consists of ten people selected by purposive sampling technique. The study collected the data by using observation and interview. The data is processed by reducing the data, presenting the data, and drawing conclusion. The result indicates that the principal discusses the policy which will be applied by school. Moreover, the principal evaluates the progress by checking the learning device, teachers’ attendance, students’ learning achievement and the Teacher Competency Test conducted in cluster. The undertaken efforts clearly show the impact on the graduation of the first year. All the students are graduated with satisfactory result. It proves that the school achievement gained through the students’ success, the teachers maximizes the time on the teaching and learning process, teachers use various learning media. There is students have an increase in learning outcomes. Therefore, the improvement in teacher professionalism is through the implementation of school-based management.

  9. Partaking in the global movement for occupational mental health: what challenges and ways forward for sub-Sahara Africa?

    Directory of Open Access Journals (Sweden)

    Atilola Olayinka

    2012-09-01

    Full Text Available Abstract There is an ongoing global movement for the entrenchment of occupational mental health as an integral part of occupational health and safety schemes. Aside from being a fundamental human right issue, this move has been demonstrated to be of cost-benefit in terms of workplace productivity and general economic growth. Despite being among the regions most prone to the human and economic repercussions of work-related mental health problems by reason of her socio-economic circumstance; sub-Sahara Africa is yet to fully plug into this movement. With a view to make recommendations on the ways forward for sub-Sahara Africa, this paper examines the current state of and the barriers to effective occupational mental health policy and practice in the region.

  10. Adverse drug reaction reports for cardiometabolic drugs from sub Sahara Africa: A study in VigiBase

    NARCIS (Netherlands)

    Berhe, Derbew F.; Juhlin, Kristina; Star, Kristina; Haaijer-Ruskamp, Flora M.; Michael, Kidane; Taxis, Katja; Mol, Peter G. M.

    2014-01-01

    Background: Many pharmacovigilance centers have been established in Sub Sahara Africa (SSA) in recent years. Their focus has been on ADRs to drugs for communicable diseases. Little is known about ADRs caused by drugs for cardiometabolic diseases, although its burden is increasing rapidly in SSA.

  11. Hymenoptera of Afghanistan and the central command area of operations: assessing the threat to deployed U.S. service members with insect venom hypersensitivity.

    Science.gov (United States)

    Turbyville, Joseph C; Dunford, James C; Nelson, Michael R

    2013-01-01

    Insect venom hypersensitivity can pose a threat to personnel deployed to a combat zone but the exposure risk in Afghanistan is currently unknown. This study was designed to assess the threat of Hymenoptera stings and associated allergic reactions in Afghanistan. Hymenoptera species were collected during a deployment to southern Afghanistan from June 2010 through January 2011. The literature was also reviewed to determine species of medically important Hymenoptera recorded in the region. The U.S. Army theater electronic medical data system was mined for ICD-9 codes associated with insect stings to determine the number of theater medical clinic encounters addressing insect sting reactions. Three species of flying hymenoptera were commonly encountered during the study period: Vespa orientalis L., Polistes wattii Cameron, and Vespula germanica (F.). A literature review also confirms the presence of honeybees (Apidae), numerous velvet ant (Mutillidae) species, and various ant (Formicidae) species all capable of stinging. No evidence was identified to suggest that fire ants (Solenopsis ssp.) are a threat in the region. Based on electronic medical records from the U.S. Central Command area of operations over a 2-year period, roughly 1 in 500 clinic visits involved a patient with a diagnosis of insect bite or sting. Cross-reactive members of all five flying Hymenoptera species commonly assessed for in Hymenoptera allergy evaluations are present in Afghanistan. The review of in-theater medical records confirms that insect stings pose an environmental threat to deployed service members.

  12. Were rivers flowing across the Sahara during the last interglacial? Implications for human migration through Africa.

    Directory of Open Access Journals (Sweden)

    Tom J Coulthard

    Full Text Available Human migration north through Africa is contentious. This paper uses a novel palaeohydrological and hydraulic modelling approach to test the hypothesis that under wetter climates c.100,000 years ago major river systems ran north across the Sahara to the Mediterranean, creating viable migration routes. We confirm that three of these now buried palaeo river systems could have been active at the key time of human migration across the Sahara. Unexpectedly, it is the most western of these three rivers, the Irharhar river, that represents the most likely route for human migration. The Irharhar river flows directly south to north, uniquely linking the mountain areas experiencing monsoon climates at these times to temperate Mediterranean environments where food and resources would have been abundant. The findings have major implications for our understanding of how humans migrated north through Africa, for the first time providing a quantitative perspective on the probabilities that these routes were viable for human habitation at these times.

  13. Spatial Pattern Determination of Biodiversity Threats at Landscape Level (Case Study: Golestan Province

    Directory of Open Access Journals (Sweden)

    R. Mirzaei

    2015-06-01

    Full Text Available Mapping spatial patterns of potential biodiversity threats is one of the important steps for effective conservation planning and activities. To determine the spatial patterns of threats in Golestan province, 12 criteria in four main groups including structural (fractal coefficient of perimeter, circularity ratio of area, average slope, compositional aspects of biodiversity (presence of species at risk, non-biological threats (distance to city, distance to village, distance to road, distance to infrastructure, distance to agricultural land, soil pollution, risk of fire and isolation (Nearest Neighbor Index were used. These data layers were digitized in GIS environment and were weighted through Analytical Hierarchy Process. A weighted linear combination was then used to map the spatial pattern of biodiversity threats in the province. Compositional aspect (0.59, non-biological threats (0.23, isolation (0.11, and structural aspect (0.07 were relatively weighted in the order of importance. Central parts of the province and patches in the northern and southern parts were recognized to be more exposed to biodiversity threats. The central parts of the province were mostly threatened by urban, industrial, road and agricultural development, whereas the northern and southern parts were recognized as areas of conservation importance having a variety of threatened birds.

  14. All projects related to | Page 334 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Region: Middle East, Central Asia, Far East Asia, South Asia ... Migration, Gender and Social Justice : Connecting Research and Practice Networks ... Region: Europe, North of Sahara, South of Sahara, North and Central America, South ...

  15. All projects related to egypt | Page 4 | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Arab Families and Youth : a Century of War, Migration and Displacement ... North of Sahara, South of Sahara, North and Central America, Central Asia, South Asia, Egypt ... ISLAM, HUMAN RIGHTS, CIVIL RIGHTS, WOMEN'S RIGHTS, Gender.

  16. What we do | Page 19 | IDRC - International Development Research ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    West and Central African Partnership for Maternal, Newborn, Child, and Adolescent Health Research. High rates of maternal death and teen pregnancy persist in West and Central Africa. Cameroon, North Of Sahara, South Of Sahara. PROJECT ...

  17. All projects related to | Page 587 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Tax policies in developing countries, and indeed around the world, are under continued reform. ... Region: Argentina, South America, India, Kenya, Mexico, North and Central America, North of Sahara, South of Sahara, Central Asia, Far East ...

  18. : tous les projets | Page 172 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: DATA PROTECTION, CONFIDENTIALITY, Internet, NEWLY INDUSTRIALIZING COUNTRIES, PRIVACY PROTECTION, REGIONAL ANALYSIS, CROSS CULTURAL ANALYSIS, LEGISLATION, POLICY MAKING. Région: North of Sahara, South of Sahara, North and Central America, South America, Central Asia, Far ...

  19. : tous les projets | Page 421 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: AGRICULTURE, OCCUPATIONAL HEALTH, PESTICIDES, PESTICIDE RESIDUES, WATER POLLUTION, HEALTH HAZARDS, ENVIRONMENTAL EFFECTS, ENVIRONMENTAL HEALTH. Région: Middle East, North of Sahara, South of Sahara, North and Central America, South America, Central Asia, Far East Asia, ...

  20. Regional hydrogen roadmap. Project development framework for the Sahara Wind Project

    Energy Technology Data Exchange (ETDEWEB)

    Benhamou, Khalid [Sahara Wind Inc., Rabat (Morocco); Arbaoui, Abdelaziz [Ecole National Superieure des Arts et Metiers ENSAM Meknes (Morocco); Loudiyi, Khalid [Al Akhawayn Univ. (Morocco); Ould Mustapha, Sidi Mohamed [Nouakchott Univ. (Mauritania). Faculte des Sciences et Techniques

    2010-07-01

    The trade winds that blow along the Atlantic coast from Morocco to Senegal represent one of the the largest and most productive wind potentials available on earth. Because of the erratic nature of winds however, wind electricity cannot be integrated locally on any significant scale, unless mechanisms are developed for storing these intermittent renewable energies. Developing distributed wind energy solutions feeding into smaller electricity markets are essential for solving energy access issues and enabling the development of a local, viable renewable energy industry. These may be critical to address the region's economic challenges currently under pressure from Sub-Saharan migrant populations. Windelectrolysis for the production of hydrogen can be used in grid stabilization, as power storage, fuel or chemical feedstock in specific industries. The objective of the NATO SfP 'Sahara Trade Winds to Hydrogen' project is to support the region's universities through an applied research framework in partnership with industries where electrolysis applications are relevant. By powering two university campuses in Morocco and Mauritania with small grid connected wind turbines and 30 kW electrolyzers generating hydrogen for power back-up as part of ''green campus concepts'' we demonstrated that wind-electrolysis for the production of hydrogen could absorb larger quantities of cheap generated wind electricity in order to maximize renewable energy uptakes within the regions weaker grid infrastructures. Creating synergies with local industries to tap into a widely available renewable energy source opens new possibilities for end users such as utilities or mining industries when processing raw minerals, whose exports generates key incomes in regions most exposed to desertification and climate change issue. Initiated by Sahara Wind Inc. a company from the private sector, along with the Al Akhawayn University, the Ecole Nationale Superieure

  1. All projects related to | Page 683 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2010-05-01

    End Date: May 1, 2010. Topic: INFORMATION NETWORKS, INFORMATION TECHNOLOGY, TELECOMMUNICATIONS, International cooperation. Region: North of Sahara, South of Sahara, North and Central America, South America, Central Asia, Far East Asia, South Asia, West Indies. Program: Networked Economies.

  2. : tous les projets | Page 411 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: INTELLECTUAL PROPERTY, PATENT LAW, PHARMACEUTICALS, PHARMACEUTICAL INDUSTRY, ESSENTIAL DRUGS, ACCESS TO HEALTH CARE, SCIENCE AND TECHNOLOGY POLICY. Région: India, South Africa, North of Sahara, South of Sahara, North and Central America, South America, Central Asia, ...

  3. South Africa : tous les projets | Page 6 | CRDI - Centre de ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: INTELLECTUAL PROPERTY, PATENT LAW, PHARMACEUTICALS, PHARMACEUTICAL INDUSTRY, ESSENTIAL DRUGS, ACCESS TO HEALTH CARE, SCIENCE AND TECHNOLOGY POLICY. Région: India, South Africa, North of Sahara, South of Sahara, North and Central America, South America, Central Asia, ...

  4. All projects related to | Page 249 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Topic: INSTITUTION BUILDING, EVALUATION TECHNIQUES, INSTITUTIONAL FRAMEWORK, LAW, POLICY MAKING, ADMINISTRATIVE REFORM. Region: North of Sahara, South of Sahara, North and Central America, South America, Central Asia, Far East Asia, South Asia, Bolivia, Brazil, Colombia, India, Kenya, Peru.

  5. : tous les projets | Page 224 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: INTERNATIONAL FINANCE, INTERNATIONAL FINANCIAL MARKET, FINANCIAL POLICY, DEMOGRAPHY, DEMOGRAPHIC CHANGE, DEMOGRAPHIC TRANSITION. Région: Brazil, South America, China, Far East Asia, India, South Africa, North of Sahara, South of Sahara, North and Central America, Central Asia, ...

  6. : tous les projets | Page 223 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: INTERNATIONAL FINANCE, INTERNATIONAL FINANCIAL MARKET, FINANCIAL POLICY, DEMOGRAPHY, DEMOGRAPHIC CHANGE, DEMOGRAPHIC TRANSITION. Région: Brazil, South America, China, Far East Asia, India, South Africa, North of Sahara, South of Sahara, North and Central America, Central Asia, ...

  7. All projects related to | Page 96 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Topic: INFORMATION DISSEMINATION, SOCIAL CHANGE, POLICY MAKING, INNOVATIONS, INFORMATION TECHNOLOGY. Region: North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, Europe, North and Central America, South America, Brazil, Nepal, Nigeria, United Kingdom, United States.

  8. All projects related to | Page 186 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Topic: Governance, RESEARCH CAPACITY, Natural Resources, ECONOMIC GROWTH, SOCIAL EQUITY, DEVELOPMENT RESEARCH, POLICY MAKING. Region: North of Sahara, South of Sahara, North and Central America, South America, Central Asia, Far East Asia, South Asia, Canada. Program: Foundations for ...

  9. All projects related to | Page 157 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Topic: DEVELOPING COUNTRIES, POLICY MAKING, INTERVIEWS, CASE STUDIES, CROSS CULTURAL ANALYSIS, INFORMATION DISSEMINATION, FUTURE STUDIES. Region: South Asia, North of Sahara, South of Sahara, North and Central America, South America, Central Asia, Far East Asia. Program: Think Tank ...

  10. : tous les projets | Page 132 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: DEVELOPING COUNTRIES, POLICY MAKING, INTERVIEWS, CASE STUDIES, CROSS CULTURAL ANALYSIS, INFORMATION DISSEMINATION, FUTURE STUDIES. Région: South Asia, North of Sahara, South of Sahara, North and Central America, South America, Central Asia, Far East Asia. Programme: Initiative ...

  11. Early to Middle Holocene landscape exploitation in a drying environment: Two case studies compared from the central Sahara (SW Fezzan, Libya)

    Science.gov (United States)

    Cremaschi, Mauro; Zerboni, Andrea

    2009-08-01

    The erg Uan Kasa and the wadi Tanezzuft (Libyan Sahara) reacted in different ways to Holocene climatic changes. Consequently, the human groups settled there responded with different ways of adaptation to the drying environment. In the erg Uan Kasa, shallow lakes were formed from the Early to the Mid-Holocene, and their shores were densely inhabited from the Epipalaeolithic to the Pastoral-Neolithic periods. The erg dried out at c. 5000 years BP, but the area was not completely abandoned, as indicated by minor Late Pastoral-Neolithic sites composed of scattered fireplaces. During the wet Holocene, the wadi Tanezzuft was a large meandering river, and its banks were densely settled. At c. 5000 years BP, the stream was not completely dried out, but it changed its pattern, originating an alluvial plain. A large oasis was formed between c. 4000 and 2000 years BP, exploited by Late Pastoral-Neolithic pastoral communities, and later by Garamantians, which introduced soil management and agricultural practices. The Tanezzuft oasis suffered a drastic reduction in size during the first centuries AD, at the time of the abandonment of the Garamantian settlements.

  12. : tous les projets | Page 148 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: DEVELOPMENT AID, HUMANITARIAN ASSISTANCE, PRIVATE INVESTMENT, DATA ANALYSIS, INFORMATION DISSEMINATION. Région: Brazil, South America, China, Far East Asia, India, South Africa, North of Sahara, South of Sahara, North and Central America, Central Asia, South Asia. Financement total ...

  13. All projects related to | Page 67 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Topic: TELECOMMUNICATIONS, POLICY MAKING, RESEARCH, ECONOMIC GROWTH. Region: Middle East, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, North and Central America, South America, Switzerland, Canada. Program: Networked Economies. Total Funding: CA$ 230,500.00.

  14. All projects related to | Page 318 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Topic: International cooperation, POLICY MAKING, TRAINEES, TELECOMMUNICATIONS, Poverty alleviation. Region: North of Sahara, South of Sahara, North and Central America, South America, Central Asia, Far East Asia, South Asia, Sri Lanka, Peru, South Africa. Program: Networked Economies. Total Funding: CA$ ...

  15. All projects related to | Page 270 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Topic: PUBLISHING, INTELLECTUAL PROPERTY, COPYRIGHT, ACCESS TO INFORMATION, Internet, STUDENTS. Region: Brazil, South America, India, South Africa, North of Sahara, South of Sahara, North and Central America, Central Asia, Far East Asia, South Asia. Program: Networked Economies. Total Funding: ...

  16. : tous les projets | Page 309 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: HUMAN RIGHTS, GENDER EQUALITY, DEMOCRATIZATION, CULTURAL RELATIONS. Région: Middle East, North of Sahara, South of Sahara, Central Asia, ... Sujet: ECONOMIC POLICY, Economic and social development. Région: Far East Asia, Viet Nam, Central Asia, South Asia, Malaysia, Canada, Singapore.

  17. All projects related to | Page 585 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Topic: Science and Technology, MEDICAL RESEARCH, HUMAN GENETICS, GENETIC ENGINEERING, BIOTECHNOLOGY. Region: Brazil, South America, China, Far East Asia, India, South Africa, North of Sahara, South of Sahara, North and Central America, Central Asia, South Asia, Egypt, Canada. Program: Networked ...

  18. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  19. The French experimentation at the underground nuclear testing site in the Sahara desert

    Energy Technology Data Exchange (ETDEWEB)

    Gauvenet, Andre [Commissariat a l' Energie Atomique (France)

    1970-05-01

    The present paper will be essentially an introduction to the technical exposes which will be delivered during the Las Vegas Meeting. The presentation is divided in two parts. The first part summarizes very briefly the experience that has been gained from the underground nuclear shots which took place in the Sahara desert from 1961 to 1966. in the second part, an idea is given of the studies at present carried on in France in the domain of peaceful applications of nuclear explosions.

  20. The French experimentation at the underground nuclear testing site in the Sahara desert

    International Nuclear Information System (INIS)

    Gauvenet, Andre

    1970-01-01

    The present paper will be essentially an introduction to the technical exposes which will be delivered during the Las Vegas Meeting. The presentation is divided in two parts. The first part summarizes very briefly the experience that has been gained from the underground nuclear shots which took place in the Sahara desert from 1961 to 1966. in the second part, an idea is given of the studies at present carried on in France in the domain of peaceful applications of nuclear explosions

  1. Threats to and viability of the giant anteater, Myrmecophaga tridactyla (Pilosa: Myrmecophagidae, in a protected Cerrado remnant encroached by urban expansion in central Brazil

    Directory of Open Access Journals (Sweden)

    Milena F. Diniz

    2013-04-01

    Full Text Available Urbanization poses a serious threat to wildlife populations inhabiting native vegetation remnants surrounded by the expanding urban and suburban sprawl. The close contact with human activities causes not only direct impacts, such as habitat loss, but also indirect negative effects, such as population isolation, roadkills and anthropogenic fires. The Parque Nacional de Brasília is a large Cerrado remnant almost completely surrounded by the city of Brasília, in central Brazil. Here, we use population viability analysis to model the impacts of urbanization on a population of Myrmecophaga tridactyla (Linnaeus, 1758 inhabiting that park. Our results show that roadkill mortality is by far the most serious threat to the long-term persistence of the giant anteater in the study site. The implementation of measures to better control vehicle speed in the vicinity of the park is urgently needed if we expect the giant anteater population to be effectively protected in the Parque Nacional de Brasília.

  2. Diversity of medicinal plants and anthropogenic threats in the ...

    African Journals Online (AJOL)

    Diversity of medicinal plants and anthropogenic threats in the Samburu Central Sub-County of Kenya. ... Biodiversity of medicinal plants and effects of human activities on availability of traditional ... There is, therefore need to adopt management strategies that enhance the conservation of these valuable natural resources.

  3. : tous les projets | Page 640 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: INFORMATION NETWORKS, INFORMATION TECHNOLOGY, TELECOMMUNICATIONS, International cooperation. Région: North of Sahara, South of Sahara, North and Central America, South America, Central Asia, Far East Asia, South Asia, West Indies. Programme: Économies en réseaux. Financement total : CA$ ...

  4. canada : tous les projets | Page 14 | CRDI - Centre de recherches ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: Science and Technology, MEDICAL RESEARCH, HUMAN GENETICS, GENETIC ENGINEERING, BIOTECHNOLOGY. Région: Brazil, South America, China, Far East Asia, India, South Africa, North of Sahara, South of Sahara, North and Central America, Central Asia, South Asia, Canada. Programme: Économies en ...

  5. South Africa : tous les projets | Page 7 | CRDI - Centre de ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: Science and Technology, MEDICAL RESEARCH, HUMAN GENETICS, GENETIC ENGINEERING, BIOTECHNOLOGY. Région: Brazil, South America, China, Far East Asia, India, South Africa, North of Sahara, South of Sahara, North and Central America, Central Asia, South Asia, Canada. Programme: Économies en ...

  6. : tous les projets | Page 544 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: Science and Technology, MEDICAL RESEARCH, HUMAN GENETICS, GENETIC ENGINEERING, BIOTECHNOLOGY. Région: Brazil, South America, China, Far East Asia, India, South Africa, North of Sahara, South of Sahara, North and Central America, Central Asia, South Asia, Canada. Programme: Économies en ...

  7. canada : tous les projets | Page 16 | CRDI - Centre de recherches ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: Science and Technology, MEDICAL RESEARCH, HUMAN GENETICS, GENETIC ENGINEERING, BIOTECHNOLOGY. Région: Brazil, South America, China, Far East Asia, India, South Africa, North of Sahara, South of Sahara, North and Central America, Central Asia, South Asia, Canada. Programme: Économies en ...

  8. Chine : tous les projets | Page 7 | CRDI - Centre de recherches pour ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: Science and Technology, MEDICAL RESEARCH, HUMAN GENETICS, GENETIC ENGINEERING, BIOTECHNOLOGY. Région: Brazil, South America, China, Far East Asia, India, South Africa, North of Sahara, South of Sahara, North and Central America, Central Asia, South Asia, Canada. Programme: Économies en ...

  9. The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy.

    Science.gov (United States)

    O'Brolcháin, Fiachra; Jacquemard, Tim; Monaghan, David; O'Connor, Noel; Novitzky, Peter; Gordijn, Bert

    2016-02-01

    The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and ultimately transform society. This paper focuses on ethical issues associated with the likely convergence of virtual realities (VR) and social networks (SNs), hereafter VRSNs. We examine a scenario in which a significant segment of the world's population has a presence in a VRSN. Given the pace of technological development and the popularity of these new forms of social interaction, this scenario is plausible. However, it brings with it ethical problems. Two central ethical issues are addressed: those of privacy and those of autonomy. VRSNs pose threats to both privacy and autonomy. The threats to privacy can be broadly categorized as threats to informational privacy, threats to physical privacy, and threats to associational privacy. Each of these threats is further subdivided. The threats to autonomy can be broadly categorized as threats to freedom, to knowledge and to authenticity. Again, these three threats are divided into subcategories. Having categorized the main threats posed by VRSNs, a number of recommendations are provided so that policy-makers, developers, and users can make the best possible use of VRSNs.

  10. All projects related to | Page 452 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Region: India, South Africa, North of Sahara, South of Sahara, North and Central America, South America, Central Asia, Far East Asia, South Asia. Program: Networked Economies. Total Funding: CA$ 309,000.00. Pharmaceutical Innovation, Incremental Patenting and Compulsory Licensing. Project. There is growing ...

  11. Kenya : tous les projets | Page 12 | CRDI - Centre de recherches ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Région: China, Far East Asia, India, Kenya, North and Central America, Panama, Peru, South America, North of Sahara, South of Sahara, Central Asia, South Asia. Programme: Agriculture et ... Sujet: HEALTH SURVEYS, HEALTH STATISTICS, MATERNAL MORTALITY, MATERNAL AND CHILD HEALTH. Région: Kenya ...

  12. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  13. A new cichlid fish in the Sahara: The Ounianga Serir lakes (Chad), a biodiversity hotspot in the desert.

    Science.gov (United States)

    Trape, Sébastien

    In the rare perennial bodies of water of the Sahara desert, only a few fish species have survived to increasing aridification since the end of the last humid period at the Holocene, approximately 5000 years BP. Here, I report the occurrence of an undescribed haplochomine cichlid fish in Lake Boukou, one of the seven Ounianga Serir lakes (Chad). These lakes are located in one of the most arid areas of the Sahara desert, but they persist by virtue of subsurface inflow of fresh groundwater from a large fossil aquifer. Astatotilapia tchadensis sp. nov. is characterized by a black bar between eye and corner of mouth, rounded orange spots on anal fin, scales ctenoid, lower limb of first gill arch with 7-8 gill rackers, dorsal fin with 13-14 spines and 9-11 soft rays, anal fin with 3 spines and 8-9 soft rays, 29 or 30 lateral line scales, and lower pharyngeal dentition with enlarged molariform teeth. The new species is easily distinguished from A. desfontainii and A. flaviijosephii, the northernmost haplochromine species currently isolated from its other group members, and appears close to an unnamed species of Lake Chad basin. Ounianga Serir lakes and especially Lake Boukou present a remarkable diversity of fish, the highest known in the Sahara desert with a total of at least six fish species belonging to six genera and three families. They also constitute an exceptional natural landscape inscribed on the UNESCO world heritage list in 2012 and a biodiversity hotspot for desert vertebrate species. Copyright © 2016 Académie des sciences. Published by Elsevier SAS. All rights reserved.

  14. All projects related to | Page 610 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... against Women (CEDAW) and the International Covenant on Economic, Social and Cultural Rights (ICESCR) are legally bound to put their provisions into practice. ... Region: Argentina, South America, Iran, Middle East, Kenya, Pakistan, North of Sahara, South of Sahara, North and Central America, Central Asia, Far East ...

  15. All projects related to | Page 64 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Region: Middle East, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, North and Central America, South America, United Kingdom, Germany. Program: Employment and Growth. Total Funding: CA$ 2,255,300.00. Preventing early marriage in urban poor settlements in Bangladesh. Project.

  16. : tous les projets | Page 285 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: RENEWABLE ENERGY SOURCES, WATER SUPPLY, WATER DISTRIBUTION. Région: North of Sahara, South of Sahara, North and Central America, South America, Central Asia, Far East Asia, South Asia. Programme: Climate Change. Financement total : CA$ 280,000.00. Eau et énergie propres - évaluation des ...

  17. : tous les projets | Page 286 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: RENEWABLE ENERGY SOURCES, WATER SUPPLY, WATER DISTRIBUTION. Région: North of Sahara, South of Sahara, North and Central America, South America, Central Asia, Far East Asia, South Asia. Programme: Climate Change. Financement total : CA$ 280,000.00. Eau et énergie propres - évaluation des ...

  18. : tous les projets | Page 292 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Région: South America, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia. Programme: Maternal and Child Health ... Sujet: Internet, LANGUAGE BARRIER, CULTURAL FACTORS, ACCESS TO INFORMATION. Région: Middle East, Central Asia, Far East Asia, South Asia. Programme: Économies en ...

  19. All projects related to | Page 324 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Migration, Gender and Social Justice : Connecting Research and Practice ... Region: Europe, North of Sahara, South of Sahara, North and Central America, South America, Central Asia, Far East Asia, South Asia, ... The North-South Institute (NSI) is an established independent thinktank in Canada whose work focuses on ...

  20. : tous les projets | Page 426 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    End Date: 14 janvier 2012. Sujet: PEACE RESEARCH, Poverty alleviation. Région: Bosnia and Herzegovina, Europe, Colombia, South America, Iraq, Middle East, Lebanon, Sri Lanka, Mozambique, Rwanda, Sudan, South Sudan, North of Sahara, South of Sahara, North and Central America, Central Asia, Far East Asia, ...

  1. : tous les projets | Page 427 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    End Date: 14 janvier 2012. Sujet: PEACE RESEARCH, Poverty alleviation. Région: Bosnia and Herzegovina, Europe, Colombia, South America, Iraq, Middle East, Lebanon, Sri Lanka, Mozambique, Rwanda, Sudan, South Sudan, North of Sahara, South of Sahara, North and Central America, Central Asia, Far East Asia, ...

  2. All projects related to | Page 155 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Region: South Asia, North of Sahara, South of Sahara, North and Central America, South America, Central Asia, Far East Asia, Bangladesh, South Africa. Program: Think Tank Initiative. Total Funding: CA$ 692,000.00. Southern Voice on Post-Millennium Development Goals. Project. As 2015 approaches, the international ...

  3. Friendship Characteristics, Threat Appraisals, and Varieties of Jealousy About Romantic Partners’ Friendships

    Directory of Open Access Journals (Sweden)

    Timothy R. Worley

    2014-12-01

    Full Text Available This study examined the role of friendship sex composition, friendship history, and threat appraisals in the experience of jealousy about a romantic partner’s involvement in extradyadic friendships. Using a survey, 201 individuals responded to scenarios describing a romantic partner’s involvement in a significant friendship outside the romantic dyad. A partner’s involvement in a cross-sex friendship was associated with greater perceptions of threat to both the existence and quality of the romantic relationship than was a partner’s involvement in a same-sex friendship. Further, the specific forms of jealousy experienced about partners’ friendships were dependent on the threat appraisals individuals associated with the friendships. Appraisals of relational existence threat mediated the influence of friendship characteristics (i.e., sex composition and history on sexual jealousy and companionship jealousy, while appraisals of relational quality threat mediated the influence of friendship characteristics on intimacy jealousy, power jealousy, and companionship jealousy. This study points toward the central role of threat appraisals in mediating associations between rival characteristics and various forms of jealousy about a partner’s friendships.

  4. Comparison of efficacy of unheated and heat-treated Sahara honey on wound healing in rabbits

    OpenAIRE

    Baghdad Khiati; Moussa Ahmed

    2015-01-01

    Objective: To investigate the efficacy of unheated and heat-treated Sahara honey on wound healing in rabbits on the basis of macroscopic observation changes. Methods: Eight female rabbits were used. Using aseptic surgical technique, a 3 cm incision was made on the back of each rabbit and two rabbits with injuries in each group were treated daily with a topical application of unheated and heated honey, sulfadiazine and sterile saline, respectively. Results: The unheated...

  5. All projects related to | Page 178 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Region: Brazil, South America, China, Far East Asia, India, South Africa, North of Sahara, South of Sahara, North and Central America, Central Asia, South Asia. Total Funding: CA$ 95,730.00. Analyzing Financial Flows from Emerging Economies to the Developing World. Project. The context of development assistance is ...

  6. Évolution démographique asymétrique et gouvernance financière ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Brazil, South America, China, Far East Asia, India, South Africa, North of Sahara, South of Sahara, North and Central America, Central Asia, South Asia ... the annual conference of McGill's Institute for the Study of International Development. ... in India, including heat stress, water management, and climate-related migration.

  7. : tous les projets | Page 56 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Région: Middle East, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, North and Central America, South America, Canada, Sweden, Switzerland. Programme: Networked Economies. Financement total : CA$ 230,500.00. Améliorer la gouvernance d'Internet : soutien à la Global Commission on ...

  8. All projects related to | Page 333 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Region: Haiti, North and Central America, Sri Lanka, Liberia, North of Sahara, South of Sahara, South America, Central Asia, Far East Asia, South Asia. Program: Governance and Justice. Total Funding: CA$ 434,400.00. Diaspora Impact on the Capacity for Recovery from Conflict and Crisis. Project. This project will support ...

  9. : tous les projets | Page 81 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Région: North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, Europe, North and Central America, South America, Brazil, Nepal, Nigeria. Programme: Networked Economies. Financement total : CA$ 4,226,848.00. Le partenariat mondial sur les données ouvertes pour le développement. Projet.

  10. Declines in a ground-dwelling arthropod community during an invasion by Sahara mustard (Brassica tournefortii) in aeolian sand habitats

    Science.gov (United States)

    Heather L. Hulton VanTassel; Anne M. Hansen; Cameron W. Barrows; Quresh Latif; Margaret W. Simon; Kurt E. Anderson

    2014-01-01

    Sahara Mustard (Brassica tournefortii; hereafter mustard), an exotic plant species, has invaded habitats throughout the arid southwestern United States. Mustard has reached high densities across aeolian sand habitats of southwestern deserts, including five distinct sand habitats in the eastern Coachella Valley, California. We examined trends in ground-dwelling...

  11. Role of Surface Wind and Vegetation Cover in Multi-decadal Variations of Dust Emission in the Sahara and Sahel

    Science.gov (United States)

    Kim, Dong; Chin, Mian; Remer, Lorraine A.; Diehl, Thomas L.; Bian, Huisheng; Yu, Hongbin; Brown, Molly E.; Stockwell, William R.

    2016-01-01

    North Africa, the world's largest dust source, is non-uniform, consisting of a permanently arid region (Sahara), a semi-arid region (Sahel), and a relatively moist vegetated region (Savanna), each with very different rainfall patterns and surface conditions. This study aims to better understand the controlling factors that determine the variation of dust emission in North Africa over a 27-year period from 1982 to 2008, using observational data and model simulations. The results show that the model-derived Saharan dust emission is only correlated with the 10-m winds (W10m) obtained from reanalysis data, but the model-derived Sahel dust emission is correlated with both W10m and the Normalized Difference Vegetation Index (NDVI) that is obtained from satellite. While the Saharan dust accounts for 82 of the continental North Africa dust emission (1340-1570 Tg year(exp -1) in the 27-year average, the Sahel accounts for 17 with a larger seasonal and inter-annual variation (230-380 Tg year(exp -1), contributing about a quarter of the transatlantic dust transported to the northern part of South America. The decreasing dust emission trend over the 27-year period is highly correlated with W10m over the Sahara (R equals 0.92). Over the Sahel, the dust emission is correlated with W10m (R 0.69) but is also anti-correlated with the trend of NDVI (R equals 0.65). W10m is decreasing over both the Sahara and the Sahel between 1982 and 2008, and the trends are correlated (R equals 0.53), suggesting that Saharan Sahelian surface winds are a coupled system, driving the inter-annual variation of dust emission.

  12. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  13. : tous les projets | Page 295 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Région: Europe, North of Sahara, South of Sahara, North and Central America, South America, Central Asia, Far East Asia, South Asia, Canada. Programme: Gouvernance et justice. Financement total : CA$ 600,000.00. Migrations, sexospécificités et justice sociale : faire le pont entre recherche et réseaux de praticiens.

  14. China : tous les projets | Page 6 | CRDI - Centre de recherches pour ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Région: Brazil, South America, China, Far East Asia, Europe, Russia, North and Central America, United States, South Asia, North of Sahara, South of Sahara, Central Asia, India, South Africa. Programme: Économies en réseaux. Financement total : CA$ 1,107,168.00. ONI-Asia - censure et surveillance numériques. Projet.

  15. : tous les projets | Page 524 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Transferts intergénérationnels, vieillissement de la population et protection sociale en Amérique latine. Projet. Les pays ... Région: Brazil, South America, China, Far East Asia, India, South Africa, North of Sahara, South of Sahara, North and Central America, Central Asia, South Asia, Russia. Programme: Économies en ...

  16. : tous les projets | Page 559 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Région: Argentina, South America, India, Kenya, Mexico, North and Central America, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia. Programme: Emploi et croissance. Financement total : CA$ 675,037.00. Incidence de la taxation selon le sexe : améliorer la production de revenus et la protection ...

  17. Implications of high altitude desert dust transport from Western Sahara to Nile Delta during biomass burning season

    International Nuclear Information System (INIS)

    Prasad, Anup K.; El-Askary, Hesham; Kafatos, Menas

    2010-01-01

    The air over major cities and rural regions of the Nile Delta is highly polluted during autumn which is the biomass burning season, locally known as black cloud. Previous studies have attributed the increased pollution levels during the black cloud season to the biomass or open burning of agricultural waste, vehicular, industrial emissions, and secondary aerosols. However, new multi-sensor observations (column and vertical profiles) from satellites, dust transport models and associated meteorology present a different picture of the autumn pollution. Here we show, for the first time, the evidence of long range transport of dust at high altitude (2.5-6 km) from Western Sahara and its deposition over the Nile Delta region unlike current Models. The desert dust is found to be a major contributor to the local air quality which was previously considered to be due to pollution from biomass burning enhanced by the dominant northerly winds coming from Europe. - New evidence of desert dust transport from Western Sahara to Nile Delta during black cloud season and its significance for regional aerosols, dust models, and potential impact on the regional climate.

  18. Implications of high altitude desert dust transport from Western Sahara to Nile Delta during biomass burning season

    Energy Technology Data Exchange (ETDEWEB)

    Prasad, Anup K., E-mail: aprasad@chapman.ed [School of Earth and Environmental Sciences, Schmid College of Science, Chapman University, Orange, CA 92866 (United States); Center of Excellence in Earth Observing, Chapman University, Orange, CA 92866 (United States); El-Askary, Hesham [School of Earth and Environmental Sciences, Schmid College of Science, Chapman University, Orange, CA 92866 (United States); Center of Excellence in Earth Observing, Chapman University, Orange, CA 92866 (United States); Department of Environmental Sciences, Faculty of Science, Alexandria University, Moharem Bek, Alexandria 21522 (Egypt); National Authority for Remote Sensing and Space Science (NARSS), Cairo (Egypt); Kafatos, Menas [School of Earth and Environmental Sciences, Schmid College of Science, Chapman University, Orange, CA 92866 (United States); Center of Excellence in Earth Observing, Chapman University, Orange, CA 92866 (United States)

    2010-11-15

    The air over major cities and rural regions of the Nile Delta is highly polluted during autumn which is the biomass burning season, locally known as black cloud. Previous studies have attributed the increased pollution levels during the black cloud season to the biomass or open burning of agricultural waste, vehicular, industrial emissions, and secondary aerosols. However, new multi-sensor observations (column and vertical profiles) from satellites, dust transport models and associated meteorology present a different picture of the autumn pollution. Here we show, for the first time, the evidence of long range transport of dust at high altitude (2.5-6 km) from Western Sahara and its deposition over the Nile Delta region unlike current Models. The desert dust is found to be a major contributor to the local air quality which was previously considered to be due to pollution from biomass burning enhanced by the dominant northerly winds coming from Europe. - New evidence of desert dust transport from Western Sahara to Nile Delta during black cloud season and its significance for regional aerosols, dust models, and potential impact on the regional climate.

  19. Gradual aridification of the Sahara during the last 11,000 years revealed by plant wax δD analyses of Lake Yoa (Chad)

    Science.gov (United States)

    Rethemeyer, Janet; Kröpelin, Stefan; Karls, Jens; Thienemann, Matthias; Melles, Martin; Schefuß, Enno

    2014-05-01

    It is still an ongoing debate whether the transition of the last 'green Sahara' period to today's large desert during the Holocene, the African Humid Period (AHP), was a progressive or an abrupt change in hydrological conditions. Several climate records mainly from East Africa suggest a rapid decline of moisture availability at the end of the AHP including new data from a marine sequence off the Horn of Africa (Tierney & deMenocal, 2013). Other archives including sedimentological, geochemical and palynological data from the central North African Lakes Chad and Lake Yoa point to a gradual rather than an abrupt transition near 5,000 years ago (Amaral et al., 2013; Kröpelin et al., 2008). The discrepancy of the available paleo-hydrological reconstructions underline the importance of proxy parameters directly related to hydrological conditions for accurate assessment of continental rainfall changes. Here, we present the first molecular-isotopic data from Lake Yoa documenting the hydrologic evolution over the entire Holocene. Compound-specific carbon and hydrogen isotope analyses were performed on long-chain n-alkanes. Our data indicate relative high but variable contributions of plant-derived long-chain n-alkanes carrying a distinct leaf-wax signature, i.e., a high Carbon Preference Index (CPI). A trend towards higher CPI values since 7,300 years ago suggests declining soil degradation and vegetation cover under increasingly drier conditions. In parallel, the average-chain-length of the long-chain n-alkanes increases gradually towards the present implying higher relative contributions from grasses. Compound-specific carbon isotope data confirm this finding, indicating a mixed C3/C4 contribution in the early and mid-Holocene changing towards a C4-grass dominated vegetation in the late Holocene. Most importantly, compound-specific hydrogen isotope data reveal a continuous increase from 8,100 years ago towards the present, reflecting a gradual aridification. The large

  20. Mass Media Use by College Students during Hurricane Threat

    Science.gov (United States)

    Piotrowski, Chris

    2015-01-01

    There is a dearth of studies on how college students prepare for the threat of natural disasters. This study surveyed college students' preferences in mass media use prior to an approaching hurricane. The convenience sample (n = 76) were from a university located in the hurricane-prone area of the central Gulf of Mexico coast. Interestingly,…

  1. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  2. south africa : tous les projets | Page 4 | CRDI - Centre de recherches ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Région: Brazil, South America, India, Morocco, Mexico, North and Central America, South Africa, North of Sahara, South of Sahara, Central Asia, Far East Asia, ... à l'information est à la fois un droit de la personne fondamental et universel et une pierre angulaire de la bonne gouvernance et de la lutte contre la corruption.

  3. Dry Deposition from Sahara Sources Regions of Western Africa

    Directory of Open Access Journals (Sweden)

    B. Douaiba

    2014-01-01

    Full Text Available Sahara dust storms during March 2004 have attracted much attention from the dust-research community due to their intensity, wide coverage, and endurance. In the present work, the dry deposition mechanisms of mineral dust are analysed during an event on the 3 March 2004 over the Northwest African coast. This particular case was chosen based on the strong dry removal that occurred, rendering it ideal for examining the deposition processes. The simulation of synoptic conditions and dry deposition of four dust particles including clay, small silt, large silt, and sand was performed with Eta model, coupled with a desert dust cycle module. The results have been compared with surface data from weather stations in North Africa, data of dry metals from stations located in Gran Canaria, and various satellite images such as European Organization for the Exploitation of Meteorological Satellites and Moderate Resolution Imaging Spectroradiometer for the period in question.

  4. india : tous les projets | Page 7 | CRDI - Centre de recherches pour ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Région: China, Far East Asia, India, North of Sahara, South of Sahara, Central Asia, South Asia ... Sujet: Evaluation, HEALTH INSURANCE, LOW INCOME GROUPS ... Sujet: HUMAN RIGHTS, JUDICIAL SYSTEM, SOUTH ASIA, GENDER ...

  5. Renforcement des capacités d'évaluation dans le domaine des ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    . North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia. Project Leader. Ricardo Ramirez. Project Leader. Peter Brodhead. Institution. New Economy Development Group, Inc. Institution Country. Canada. Institution Website.

  6. A reward for patience and suffering – Ethnomycology and commodification of desert truffles among Sahrawi refugees and nomads of Western Sahara

    NARCIS (Netherlands)

    Volpato, G.; Rossi, D.; Dentoni, D.

    2013-01-01

    A Reward for Patience and Suffering: Ethnomycology and Commodification of Desert Truffles among Sahrawi Refugees and Nomads of Western Sahara. This paper reflects on the role of ethnobiological knowledge and practices for refugees’ agency by focusing on the use and commodification of desert truffles

  7. Counter-regulating on the Internet: Threat elicits preferential processing of positive information.

    Science.gov (United States)

    Greving, Hannah; Sassenberg, Kai; Fetterman, Adam

    2015-09-01

    The Internet is a central source of information. It is increasingly used for information search in self-relevant domains (e.g., health). Self-relevant topics are also associated with specific emotions and motivational states. For example, individuals may fear serious illness and feel threatened. Thus far, the impact of threat has received little attention in Internet-based research. The current studies investigated how threat influences Internet search. Threat is known to elicit the preferential processing of positive information. The self-directed nature of Internet search should particularly provide opportunities for such processing behavior. We predicted that during Internet search, more positive information would be processed (i.e., allocated more attention to) and more positive knowledge would be acquired under threat than in a control condition. Three experiments supported this prediction: Under threat, attention is directed more to positive web pages (Study 1) and positive links (Study 2), and more positive information is acquired (Studies 1 and 3) than in a control condition. Notably, the effect on knowledge acquisition was mediated by the effect on attention allocation during an actual Internet search (Study 1). Thus, Internet search under threat leads to selective processing of positive information and dampens threatened individuals' negative affect. (c) 2015 APA, all rights reserved).

  8. Chronic illness in the workplace: stigma, identity threat and strain.

    Science.gov (United States)

    McGonagle, Alyssa K; Barnes-Farrell, Janet L

    2014-10-01

    Chronic illness affects a large and growing number of workers in the United States and globally. Stigmatization (devaluation) at work based on chronic illness may be stressful for individuals and therefore may lead to negative psychological consequences (i.e. strains). In order to better understand stressful experiences of stigma for workers with chronic illnesses, a model of stigma-related identity threat (perceptions that one is at risk of being treated negatively at work because of chronic illness) was tested on a sample of 203 working adults with chronic illnesses. The following variables related to workers' perceptions of chronic illness-related identity threat: workers' boundary flexibility (flexibility in managing their work and life), their meta-perceptions of devaluation (perceptions of others' devaluation of them based on illness) and their job self-efficacy (feelings of confidence related to performing their job). In turn, perceptions of identity threat related to both feelings of psychological strain and (lower levels of) perceived work ability. Surprisingly, neither stigma centrality (how fundamental illness is to one's identity) nor supervisor support related to workers' identity threat perceptions. Copyright © 2013 John Wiley & Sons, Ltd.

  9. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    26 Threat Detection and Mitigation Strategies...quicker when identifying threats in relevant locations. This task utilized the Flicker paradigm (Rensink, O’Regan, & Clark, 1997; Scholl, 2000...the meaning and implication of threats, why cues were relevant, strategies used to detect and mitigate threats, and challenges when attempting to

  10. Integrated Health Care Systems and Indigenous Medicine: Reflections from the Sub-Sahara African Region

    Directory of Open Access Journals (Sweden)

    Beth Maina Ahlberg

    2017-09-01

    Full Text Available Indigenous or traditional medicine has, since the 1970s, been widely regarded as a resource likely to contribute to strengthening the health care systems in low income countries. This paper examines the state of traditional medicine using evidence from three case studies in Central Kenya. While the cases are too few to represent the broad diversity of cultures and related healing systems in the Sub-Sahara African Region, the way they seem to refute the main assumptions in the integration discourse is important, also because studies from other countries in the region report perspectives, similar to the case studies in Kenya. It is often argued that people continue to use traditional medicine because it is affordable, available, and culturally familiar. Its integration into the health care system would therefore promote cultural familiarity. The case studies however point to the loss of essential cultural elements central to traditional medicine in this particular area while users travel long distances to reach the healers. In addition, there are significant paradigm differences that may present obstacles to integration of the two systems. More problematic however is that integration is, as in many development interventions, a top-down policy that is rarely based on contextual realities and conditions. Instead, integration is often defined and dominated by biomedical professionals and health planners who may be unfamiliar or even hostile to some aspects of traditional medicine. Furthermore, integration efforts have tended to embrace selected components mostly herbal medicine. This has led to isolating herbal medicine from spiritualism, which may in turn affect the holistic perspective of traditional medicine. While familiarity and relevance may explain the continued use of traditional medicine, its services may not be as readily available, accessible, or even affordable as is often asserted. Globalization set in motion through colonization and

  11. Propolis-Sahara honeys preparation exhibits antibacterial and anti-biofilm activity against bacterial biofims formed on urinary catheters

    Directory of Open Access Journals (Sweden)

    Saad Aissat

    2016-11-01

    Full Text Available Objective: To evaluate the antibacterial effect of Sahara honeys (SHs against bacterial biofilms formed on urinary catheters in combination with propolis-Sahara honeys (P-SHs. Methods: Three clinical isolates were subjected to biofilm detection methods. The antibacterial and anti-biofilm activity for SHs and P-SHs were determined using agar well diffusion and the percentage of biofilm inhibition (PBI methods. Results: The PBI for Gram-positive bacteria [Staphylococcus aureus (S. aureus] was in the range of 0%–20%, while PBI for Gram-negative bacteria [Pseudomonas aeruginosa and Escherichia coli (E. coli] were in range of 17%–57% and 16%–65%, respectively. The highest PBI (65% was produced by SH2 only on E. coli. In agar well diffusion assay, zones of inhibition ranged from 11–20 mm (S. aureus, 9–19 mm (Pseudomonas aeruginosa and 11–19 mm (E. coli. The highest inhibition (20 mm was produced by SH1 only on S. aureus. In addition, the treatment of SHs and P-SHs catheters with a polymicrobial biofilms reduced biofilm formation after 48 h exposure period. Conclussions: SHs and P-SHs applied as a natural agent can be used as a prophylactic agent to prevent the formation of in vitro biofilm.

  12. Potential future land use threats to California's protected areas

    Science.gov (United States)

    Wilson, Tamara Sue; Sleeter, Benjamin Michael; Davis, Adam Wilkinson

    2015-01-01

    Increasing pressures from land use coupled with future changes in climate will present unique challenges for California’s protected areas. We assessed the potential for future land use conversion on land surrounding existing protected areas in California’s twelve ecoregions, utilizing annual, spatially explicit (250 m) scenario projections of land use for 2006–2100 based on the Intergovernmental Panel on Climate Change Special Report on Emission Scenarios to examine future changes in development, agriculture, and logging. We calculated a conversion threat index (CTI) for each unprotected pixel, combining land use conversion potential with proximity to protected area boundaries, in order to identify ecoregions and protected areas at greatest potential risk of proximal land conversion. Our results indicate that California’s Coast Range ecoregion had the highest CTI with competition for extractive logging placing the greatest demand on land in close proximity to existing protected areas. For more permanent land use conversions into agriculture and developed uses, our CTI results indicate that protected areas in the Central California Valley and Oak Woodlands are most vulnerable. Overall, the Eastern Cascades, Central California Valley, and Oak Woodlands ecoregions had the lowest areal percent of protected lands and highest conversion threat values. With limited resources and time, rapid, landscape-level analysis of potential land use threats can help quickly identify areas with higher conversion probability of future land use and potential changes to both habitat and potential ecosystem reserves. Given the broad range of future uncertainties, LULC projections are a useful tool allowing land managers to visualize alternative landscape futures, improve planning, and optimize management practices.

  13. : tous les projets | Page 620 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    , JOURNALISTS, NETWORKS, TRAINING, Capacity building. Région: Middle East, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia. Programme: Économies en réseaux. Financement total : CA$ 812,108.00.

  14. Pharmaceutical Innovation, Incremental Patenting and Compulsory ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    While the number of newly-developed chemical entities has dramatically fallen during ... India, South Africa, North of Sahara, South of Sahara, North and Central ... IDRC congratulates first cohort of Women in Climate Change Science Fellows.

  15. Egypt : tous les projets | Page 3 | CRDI - Centre de recherches pour ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: FOREIGN TRADE, INTERREGIONAL TRADE, TRADE LIBERALIZATION, TRADE FACILITATION, FINANCIAL SERVICES, TELECOMMUNICATIONS INDUSTRY, TRANSPORT. Région: Egypt, Jordan, Middle East, Lebanon, Morocco, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia.

  16. Égypte : tous les projets | Page 3 | CRDI - Centre de recherches ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: FOREIGN TRADE, INTERREGIONAL TRADE, TRADE LIBERALIZATION, TRADE FACILITATION, FINANCIAL SERVICES, TELECOMMUNICATIONS INDUSTRY, TRANSPORT. Région: Egypt, Jordan, Middle East, Lebanon, Morocco, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia.

  17. Morocco : tous les projets | Page 3 | CRDI - Centre de recherches ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: FOREIGN TRADE, INTERREGIONAL TRADE, TRADE LIBERALIZATION, TRADE FACILITATION, FINANCIAL SERVICES, TELECOMMUNICATIONS INDUSTRY, TRANSPORT. Région: Egypt, Jordan, Middle East, Lebanon, Morocco, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia.

  18. : tous les projets | Page 600 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Les régimes de propriété intellectuelle existants protègent les droits des personnes en ce qui a trait aux bénéfices commerciaux, mais ils ne conviennent pas, ... Région: China, Far East Asia, India, Kenya, North and Central America, Panama, Peru, South America, North of Sahara, South of Sahara, Central Asia, South Asia.

  19. All projects related to | Page 590 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Topic: FOREIGN TRADE, INTERREGIONAL TRADE, TRADE LIBERALIZATION, TRADE FACILITATION, FINANCIAL SERVICES, TELECOMMUNICATIONS INDUSTRY, TRANSPORT. Region: Egypt, Jordan, Middle East, Lebanon, Morocco, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia. Program: ...

  20. All projects related to | Page 451 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Program: Food, Environment, and Health ... Arab research and policy institutes, and partners from the United States and Europe. ... Region: Middle East, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, United States.

  1. All projects related to | Page 240 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Topic: Capacity building, Science and Technology, MEDIA, FRENCH SPEAKING AFRICA, JOURNALISM, COMPUTER NETWORKS, BUSINESS ORGANIZATION. Region: Middle East, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, United Kingdom. Program: Networked Economies.

  2. Threats, protests greet conference.

    Science.gov (United States)

    Struck, D

    1994-09-04

    In preparation for the 1994 International Conference on Population and Development, Egypt has deployed 14,000 police to protect participants from threatened violence. The Vatican has joined forces with Muslim fundamentalists to condemn the conference as a vehicle for imposing Western ideals, particularly abortion, on Third world countries. In addition, the opposition is raising the specter of a descent of homosexuals onto Cairo and Muslim fundamentalists have threatened to murder Western representatives. A suit filed by Islamic lawyers, aimed at stopping the conference, failed. Sudan and Saudi Arabia plan to boycott the conference, and it remains uncertain whether Libya will be represented. Conference organizers have not been deterred by the threats and note that the controversy has drawn public attention to the central issues under debate.

  3. Security challenges to Central European bordering territories: view from the Transcarpatian region of Ukraine

    Directory of Open Access Journals (Sweden)

    Myroslava Lendel

    2015-12-01

    Full Text Available The factor of integral Central European space determines the formation of common challenges to the region's security. One part of them is not visualized or not perceived in the capital cities. These threats may be most vividly traced in the Transcarpathian region of Ukraine, taking into consideration the fact that it borders with the abovementioned countries. These are ethnopolitical threats, caused by the multiethnic population of the region, energy dependence, threats of social economic peripherization of Central European bordering territories, informational influence on the population, different attitudes to Ukraine-Russia conflict.

  4. The role of prevention focus under stereotype threat: Initial cognitive mobilization is followed by depletion.

    Science.gov (United States)

    Ståhl, Tomas; Van Laar, Colette; Ellemers, Naomi

    2012-06-01

    Previous research has demonstrated that stereotype threat induces a prevention focus and impairs central executive functions. The present research examines how these 2 consequences of stereotype threat are related. The authors argue that the prevention focus is responsible for the effects of stereotype threat on executive functions and cognitive performance. However, because the prevention focus is adapted to deal with threatening situations, the authors propose that it also leads to some beneficial responses to stereotype threat. Specifically, because stereotype threat signals a high risk of failure, a prevention focus initiates immediate recruitment of cognitive control resources. The authors further argue that this response initially facilitates cognitive performance but that the additional cognitive demands associated with working under threat lead to cognitive depletion over time. Study 1 demonstrates that stereotype threat (vs. control) facilitates immediate cognitive control capacity during a stereotype-relevant task. Study 2 experimentally demonstrates the process by showing that stereotype threat (vs. control) facilitates cognitive control as a default, as well as when a prevention focus has been experimentally induced, but not when a promotion focus has been induced. Study 3 shows that stereotype threat facilitates initial math performance under a prevention focus, whereas no effect is found under a promotion focus. Consistent with previous research, however, stereotype threat impaired math performance over time under a prevention focus, but not under a promotion focus. 2012 APA, all rights reserved

  5. Soluble iron nutrients in Saharan dust over the central Amazon rainforest

    Science.gov (United States)

    Rizzolo, Joana A.; Barbosa, Cybelli G. G.; Borillo, Guilherme C.; Godoi, Ana F. L.; Souza, Rodrigo A. F.; Andreoli, Rita V.; Manzi, Antônio O.; Sá, Marta O.; Alves, Eliane G.; Pöhlker, Christopher; Angelis, Isabella H.; Ditas, Florian; Saturno, Jorge; Moran-Zuloaga, Daniel; Rizzo, Luciana V.; Rosário, Nilton E.; Pauliquevis, Theotonio; Santos, Rosa M. N.; Yamamoto, Carlos I.; Andreae, Meinrat O.; Artaxo, Paulo; Taylor, Philip E.; Godoi, Ricardo H. M.

    2017-02-01

    The intercontinental transport of aerosols from the Sahara desert plays a significant role in nutrient cycles in the Amazon rainforest, since it carries many types of minerals to these otherwise low-fertility lands. Iron is one of the micronutrients essential for plant growth, and its long-range transport might be an important source for the iron-limited Amazon rainforest. This study assesses the bioavailability of iron Fe(II) and Fe(III) in the particulate matter over the Amazon forest, which was transported from the Sahara desert (for the sake of our discussion, this term also includes the Sahel region). The sampling campaign was carried out above and below the forest canopy at the ATTO site (Amazon Tall Tower Observatory), a near-pristine area in the central Amazon Basin, from March to April 2015. Measurements reached peak concentrations for soluble Fe(III) (48 ng m-3), Fe(II) (16 ng m-3), Na (470 ng m-3), Ca (194 ng m-3), K (65 ng m-3), and Mg (89 ng m-3) during a time period of dust transport from the Sahara, as confirmed by ground-based and satellite remote sensing data and air mass backward trajectories. Dust sampled above the Amazon canopy included primary biological aerosols and other coarse particles up to 12 µm in diameter. Atmospheric transport of weathered Saharan dust, followed by surface deposition, resulted in substantial iron bioavailability across the rainforest canopy. The seasonal deposition of dust, rich in soluble iron, and other minerals is likely to assist both bacteria and fungi within the topsoil and on canopy surfaces, and especially benefit highly bioabsorbent species. In this scenario, Saharan dust can provide essential macronutrients and micronutrients to plant roots, and also directly to plant leaves. The influence of this input on the ecology of the forest canopy and topsoil is discussed, and we argue that this influence would likely be different from that of nutrients from the weathered Amazon bedrock, which otherwise provides the

  6. Reducing the global threat of radiological terrorism in Central Asia and Caucus regions. The global threat reduction initiative approach to radioactive source security

    International Nuclear Information System (INIS)

    Smith, E.

    2010-01-01

    The security of radioactive sources is of worldwide concern, due to their wide use in civilian commerce and the potentially devastating effects of their misuse. In cooperation with host countries and international partners, the Global Threat Reduction Initiative has utilized a proven process for providing technical and financial assistance to protect radioactive sources in diverse uses and unique circumstances at hundreds of sites worldwide. The mission of the Department of Energy, National Nuclear Security Administration's program includes reducing the risk posed by vulnerable radiological materials that could be used in a Radioactive Dispersal Device). The program's objectives are to identify, consolidate, secure, and/or dispose of high-activity radiological materials to prevent their theft and malicious use. The Global Threat Reduction Initiative Program's scope is global, with projects in over 100 countries at more than 755 radiological sites, including industrial, medical and commercial facilities. In addition to working bilaterally, the Program works closely with the International Atomic Energy Agency (IAEA) and other partner countries. (author)

  7. What we do | Page 48 | IDRC - International Development Research ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    South Asia, North Of Sahara, South Of Sahara, North And Central America, South America, ... Bringing Women's Voices into the Mainstream: A Media Research ... up 98% of all businesses and employ more than 65% of the region's workforce.

  8. Implementation of Information Communication Technology in the Teaching/Learning Process for Sustainable Development of Adults in West Africa Sub Sahara Region

    Science.gov (United States)

    Nwobi, Anthonia; Ngozi, Ugwuoke; Rufina, Nwachukwu; Ogbonnaya, Kingsley A.

    2016-01-01

    This study examines the implementation of information technology in the teaching/learning process for sustainable development of adults in West Africa Sub Sahara Region (WASSR). Three research questions and two hypotheses guided the study. The population for the study was 3071 participants and instructors drawn from 10 education centres that were…

  9. Terrorism threats and preparedness in Canada: the perspective of the Canadian public.

    Science.gov (United States)

    Gibson, Stacey; Lemyre, Louise; Clément, Mélanie; Markon, Marie-Pierre L; Lee, Jennifer E C

    2007-06-01

    Although Canada has not experienced a major terrorist attack, an increased global pending threat has put preparedness at the top of the Canadian government's agenda. Given its strong multicultural community and close proximity to the recently targeted United States, the Canadian experience is unique. However, minimal research exists on the public's reactions to terrorism threats and related preparedness strategies. In order for response initiatives to be optimally effective, it is important that the public's opinions regarding terrorism and preparedness be considered. This qualitative study examined perceptions of terrorism threats among Canadians living in Central and Eastern Canada (N = 75) in the fall of 2004. Conceptualizations of terrorism threat, psychosocial impacts, and sense of preparedness were explored in a series of qualitative interviews. Findings revealed that the majority of Canadians did not feel overly threatened by terrorist attacks, due in part to a perception of terrorist threats as related to global sociopolitical events and a positive Canadian identity. In addition, while most respondents did not feel they were individually affected by the threat of terrorism, there was some concern regarding larger societal impacts, such as increased paranoia, discrimination, and threats to civil liberties. Participants' views on preparedness focused largely on the utility of emergency preparedness strategies and the factors that could mitigate or inhibit preparedness at the individual and institutional levels, with a specific focus on education. Finally, the significant relevance of these findings in shaping terrorism preparedness, both in Canada and generally, is discussed.

  10. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  11. What we do | Page 93 | IDRC - International Development Research ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Improving the Quality and Relevance of University Research (West and Central Africa). After decades of investment - mainly at the primary and secondary level - higher education is receiving renewed attention in Africa. North Of Sahara, South Of Sahara. PROJECT ...

  12. What we do | Page 100 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This knowledge can be used as a tool for addressing pressing global challenges. ... After decades of investment - mainly at the primary and secondary level - higher ... North Of Sahara, South Of Sahara, Central Asia, Far East Asia, South Asia.

  13. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    Science.gov (United States)

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  14. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    Directory of Open Access Journals (Sweden)

    Robert A. Carels

    2013-05-01

    Full Text Available Objective: The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group and source (i.e., the self or others. This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method: 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64 years and mean BMI was 31.6 (SD 7.5 kg/m2. Results: Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI and individual factors (i.e., group identity, stigma consciousness, fear of fat. Conclusion: Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes.

  15. All projects related to | Page 242 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Topic: ENTREPRENEURSHIP, SOCIAL ASPECTS, BUSINESS SERVICES, INNOVATIONS, Capacity building, BUSINESS CREATION. Region: Middle East, North of Sahara, South of Sahara, ... Raising Tobacco Taxes in Selected Countries of Central America. Project. Expert advice and evidence-based research will guide ...

  16. : tous les projets | Page 376 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    End Date: 30 septembre 2015. Sujet: INFECTIOUS DISEASES, ZOONOSES, EPIDEMICS, DISEASE TRANSMISSION, DISEASE VECTORS, Disease control, REGIONAL COOPERATION. Région: South Asia, North of Sahara, South of Sahara, Central Asia, Far East Asia, Egypt. Programme: Alimentation, environnement et ...

  17. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    Science.gov (United States)

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  18. Migration und Flucht aus Afrika südlich der Sahara - Historische Ursachen, aktuelle Auswirkungen, Lösungsansätze

    Science.gov (United States)

    Spaeth, Andreas

    2018-04-01

    Since decolonization till todays "New Odyssey" - the current European refugee crisis—(Kingsley 2016) we witnessed an unhindered and unrestricted migration to Europe from Africa south of the Sahara. Regulated migration was even promoted for medical staff, soldiers and seamen. This was induced by a shortage of qualified staff in receiving ex-colonial powers and the need maintaining mercenary armies for todays international conflicts. Political refugees were often hoped to form new western-friendly governments in cases of socialist Ethiopia and dictatorial regimes in esp. ex-Zaire, Togo, Guinea-Conakry, Uganda, Ghana and Zimbabwe. Todays migration out of Africa south of the Sahara is often caused by political and humanitarian crises, but specifically accelerated by the long-lasting negligence of donors for small-scale agricultural development. Land grabbing and the challenge to bring millions of youth with formal training into a meaningful occupation are seen as further important causes of rural outmigration. A "mismatch" between training programs offered especially by international development agencies and training needs for employability is also causing mass-unemployment of youth. An alignment of future development programming with the needs of the poor to assure a "right to stay" should be addressed by international policy makers with highest priority.

  19. Migration und Flucht aus Afrika südlich der Sahara. Historische Ursachen, aktuelle Auswirkungen, Lösungsansätze

    Science.gov (United States)

    Spaeth, Andreas

    2018-04-01

    Since decolonization till todays "New Odyssey"—the current European refugee crisis—(Kingsley 2016) we witnessed an unhindered and unrestricted migration to Europe from Africa south of the Sahara. Regulated migration was even promoted for medical staff, soldiers and seamen. This was induced by a shortage of qualified staff in receiving ex-colonial powers and the need maintaining mercenary armies for todays international conflicts. Political refugees were often hoped to form new western-friendly governments in cases of socialist Ethiopia and dictatorial regimes in esp. ex-Zaire, Togo, Guinea-Conakry, Uganda, Ghana and Zimbabwe. Todays migration out of Africa south of the Sahara is often caused by political and humanitarian crises, but specifically accelerated by the long-lasting negligence of donors for small-scale agricultural development. Land grabbing and the challenge to bring millions of youth with formal training into a meaningful occupation are seen as further important causes of rural outmigration. A "mismatch" between training programs offered especially by international development agencies and training needs for employability is also causing mass-unemployment of youth. An alignment of future development programming with the needs of the poor to assure a "right to stay" should be addressed by international policy makers with highest priority.

  20. : tous les projets | Page 308 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    End Date: 22 novembre 2012. Sujet: HUMAN RIGHTS, GENDER EQUALITY, DEMOCRATIZATION, CULTURAL RELATIONS. Région: Middle East, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, Jordan, Lebanon, Morocco, Yemen, Bahrain, Palestine, Kuwait. Programme: Gouvernance et justice.

  1. All projects related to ethiopia | Page 4 | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2009-06-30

    Start Date: June 30, 2009. End Date: January 1, 2013. Topic: RESEARCH NETWORKS, RESEARCH RESULTS, HEALTH POLICY, POLICY MAKING. Region: North of Sahara, South of Sahara, Cameroon, Central African Republic, Ethiopia, Mali, Mozambique, Burkina Faso, Zambia. Program: Maternal and Child Health.

  2. All projects related to | Page 396 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2009-06-30

    Start Date: June 30, 2009. End Date: January 1, 2013. Topic: RESEARCH NETWORKS, RESEARCH RESULTS, HEALTH POLICY, POLICY MAKING. Region: North of Sahara, South of Sahara, Cameroon, Central African Republic, Ethiopia, Mali, Mozambique, Burkina Faso, Zambia. Program: Maternal and Child Health.

  3. When Is Humiliation More Intense? The Role of Audience Laughter and Threats to the Self

    Directory of Open Access Journals (Sweden)

    Agneta H. Fischer

    2017-04-01

    Full Text Available In personal accounts, humiliation is often reported as a very intense, painful, negative emotion. We report two scenario studies in which we explored two factors that may contribute to the intense character of humiliation: (1 unwanted, negative public exposure, and (2 a threat to central aspects of one's identity. Study 1 (N = 115 assessed emotional reactions to a public insult when an audience responded with either laughter or not and when someone from the audience offered support after the insult or no support was offered. Results showed that the intensity of humiliation increased when people laughed after the insult. However, support offered after the insult had no effect on reported humiliation. Study 2 (N = 99 focused on threats to different self-related values and showed stronger reports of humiliation when central self-related values were threatened than when less central self-related values were threatened. Study 2 also replicated the audience-effect from Study 1, but only when central self-related values were threatened and not when less central self-related values were threatened. Limitations of these studies (e.g., the use of scenarios and potential avenues for future research, such as the (long-term consequences of humiliation and humiliation in the context of social media, are discussed.

  4. : tous les projets | Page 465 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: CHILDREN, RECRUITMENT, MILITARY SERVICE, PEACE RESEARCH, CONFLICT RESOLUTION. Région: North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia. Programme: Gouvernance et justice. Financement total : CA$ 100,000.00. Enfants soldats. Projet. La participation des enfants aux ...

  5. All projects related to | Page 464 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Topic: RESEARCH NETWORKS, DEMOCRATIZATION, HUMAN RIGHTS, ECONOMIC REFORM, ADVOCACY. Region: Middle East, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, United States. Program: Foundations for Innovation. Total Funding: CA$ 770,000.00. AIDS Prevention for the ...

  6. : tous les projets | Page 206 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: Capacity building, Science and Technology, MEDIA, FRENCH SPEAKING AFRICA, JOURNALISM, COMPUTER NETWORKS, BUSINESS ORGANIZATION. Région: Middle East, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia. Programme: Économies en réseaux. Financement total : CA$ ...

  7. A comparison of the physical properties of desert dust retrieved from the sunphotometer observation of major events in the Sahara, Sahel, and Arabian Peninsula

    KAUST Repository

    Masmoudi, Mohamed

    2015-05-01

    © 2015 Elsevier B.V. The objective of this work is to assess the variability of the size-distribution, real (n) and imaginary (k) parts of the refractive index, asymmetry parameter (g), and single scattering albedo (SSA) of desert dust events observed in the Sahara, Sahel, and Arabian Peninsula areas. For this we use the level-2 inversions of 14 AERONET sunphotometers representative of the area of study. In the dataset, the dust-dominated events are discriminated on the basis of their large optical depth and low (<. 0.3) Ångström exponent (α) calculated between 440. nm and 870. nm. In all the volume size-distributions a coarse mode (CM) of particles is observed but a fine mode (FM) of particles with radii. <. 0.2. μm is also present. The volume fraction represented by the FM is lower (3%) during the most intense dust storms than during moderate ones (12%). The inter-site variability of the characteristics of the CM-dominated situations is found to be non-significant and at 440, 675, 870, and 1020. nm a common set of values can be adopted for n (1.54 ± 0.03, 1.53 ± 0.02, 1.50 ± 0.02, 1.48 ± 0.02), k (0.0037 ± 0.0007, 0.0012 ± 0.0002, 0.0011 ± 0.0002, 0.0012 ± 0.0002), g (0.77 ± 0.01, 0.74 ± 0.01, 0.73 ± 0.01, 0.74 ± 0.01), and the SSA (0.90 ± 0.02, 0.97 ± 0.01, 0.98 ± 0.01, 0.98 ± 0.01). However; during the less intense dust-events the growing influence of the FM leads to regional differentiation of the dust properties and 2 main areas can be distinguished: 1) the relatively clean central Sahara/Sahel, and 2) the more polluted continuum constituted by the Mediterranean coast and the Arabian Peninsula.

  8. A comparison of the physical properties of desert dust retrieved from the sunphotometer observation of major events in the Sahara, Sahel, and Arabian Peninsula

    KAUST Repository

    Masmoudi, Mohamed; Alfaro, Sté phane C.; El Metwally, Mossad

    2015-01-01

    © 2015 Elsevier B.V. The objective of this work is to assess the variability of the size-distribution, real (n) and imaginary (k) parts of the refractive index, asymmetry parameter (g), and single scattering albedo (SSA) of desert dust events observed in the Sahara, Sahel, and Arabian Peninsula areas. For this we use the level-2 inversions of 14 AERONET sunphotometers representative of the area of study. In the dataset, the dust-dominated events are discriminated on the basis of their large optical depth and low (<. 0.3) Ångström exponent (α) calculated between 440. nm and 870. nm. In all the volume size-distributions a coarse mode (CM) of particles is observed but a fine mode (FM) of particles with radii. <. 0.2. μm is also present. The volume fraction represented by the FM is lower (3%) during the most intense dust storms than during moderate ones (12%). The inter-site variability of the characteristics of the CM-dominated situations is found to be non-significant and at 440, 675, 870, and 1020. nm a common set of values can be adopted for n (1.54 ± 0.03, 1.53 ± 0.02, 1.50 ± 0.02, 1.48 ± 0.02), k (0.0037 ± 0.0007, 0.0012 ± 0.0002, 0.0011 ± 0.0002, 0.0012 ± 0.0002), g (0.77 ± 0.01, 0.74 ± 0.01, 0.73 ± 0.01, 0.74 ± 0.01), and the SSA (0.90 ± 0.02, 0.97 ± 0.01, 0.98 ± 0.01, 0.98 ± 0.01). However; during the less intense dust-events the growing influence of the FM leads to regional differentiation of the dust properties and 2 main areas can be distinguished: 1) the relatively clean central Sahara/Sahel, and 2) the more polluted continuum constituted by the Mediterranean coast and the Arabian Peninsula.

  9. Evaluative threat and ambulatory blood pressure: cardiovascular effects of social stress in daily experience.

    Science.gov (United States)

    Smith, Timothy W; Birmingham, Wendy; Uchino, Bert N

    2012-11-01

    Physiological effects of social evaluation are central in models of psychosocial influences on physical health. Experimental manipulations of evaluative threat evoke substantial cardiovascular and neuroendocrine responses in laboratory studies, but only preliminary evidence is available regarding naturally occurring evaluative threats in daily life. In such nonexperimental ambulatory studies, it is essential to distinguish effects of evaluative threat from related constructs known to alter stress, such as ability perceptions and concerns about appearance. 94 married, working couples (mean age 29.2 years) completed a 1-day (8 a.m. to 10 p.m.) ambulatory blood pressure protocol with random interval-contingent measurements using a Suntech monitor and Palm Pilot-based measures of control variables and momentary experiences of social-evaluative threat, concerns about appearance, and perceived ability. In hierarchical analyses for couples and multiple measurement occasions (Proc Mixed; SAS) and controlling individual differences (BMI, age, income) and potential confounds (e.g., posture, activity), higher reports of social-evaluative threat were associated with higher concurrent systolic (estimate = .87, SE = .34) and diastolic blood pressure (estimate = 1.06; SE = .26), both p social-evaluative threat remained significant when perceived ability and appearance concerns were controlled. Naturally occurring social-evaluative threat during daily activity is associated with increased systolic and diastolic blood pressure. Given associations between ambulatory blood pressure and risk of cardiovascular disease, the findings support conceptual models of threats to the social self as a potentially important influence on physical health.

  10. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    Science.gov (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  11. Measuring Entrepreneurial Activity in the Middle East and North Africa

    International Development Research Centre (IDRC) Digital Library (Canada)

    Total funding. CA$ 678,500. Country(s). Middle East, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia. Project Leader. Dr. Mohamed Derrabi. Institution. Al Akhawayn University. Institution Country. Morocco. Institution Website. http://www.aui.ma. Project Leader. Abedou Abderrahamne. Institution.

  12. All projects related to | Page 542 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2009-12-01

    End Date: December 1, 2009. Topic: EMPLOYMENT STATISTICS, EMPLOYMENT POLICY, YOUTH UNEMPLOYMENT. Region: Middle East, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, Jordan, Morocco, Egypt. Program: Employment and Growth. Total Funding: CA$ 353,700.00. Poverty, Job ...

  13. What we do | Page 119 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Pharmaceutical Innovation, Incremental Patenting and Compulsory Licensing. There is growing evidence of a proliferation of patents over minor variants of existing products, both in developed and developing countries. India, South Africa, North Of Sahara, South Of Sahara, North And Central America, South America, ...

  14. : tous les projets | Page 483 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Date de début : 31 mars 2008. End Date: 31 janvier 2010. Sujet: INFORMATION TECHNOLOGY, INFORMATION CENTRES, COMMUNITY FACILITIES, INFORMATION NETWORKS. Région: Egypt, Middle East, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, Lebanon, Syria. Financement total ...

  15. All projects related to | Page 346 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Topic: BIOLOGY, BIODIVERSITY, ECOLOGY. Region: Argentina, South America, Costa Rica, North and Central America, Kenya, Peru, South Africa, North of Sahara, South of Sahara, Mexico, Canada. Program: Agriculture and Food Security. Total Funding: CA$ 2,158,187.00. International Barcode of Life Project : Engaging ...

  16. All projects related to | Page 345 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Topic: BIOLOGY, BIODIVERSITY, ECOLOGY. Region: Argentina, South America, Costa Rica, North and Central America, Kenya, Peru, South Africa, North of Sahara, South of Sahara, Mexico, Canada. Program: Agriculture and Food Security. Total Funding: CA$ 2,158,187.00. International Barcode of Life Project : Engaging ...

  17. Thinking Globally, Acting Locally: Preparing the Canadian Foreign ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Building on the experience of its predecessor, the Canadian Institute for ... Middle East, North of Sahara, South of Sahara, North and Central America, ... prevent gender-based violence, and make digital platforms work for inclusive development. ... including heat stress, water management, and climate-related migration.

  18. All projects related to | Page 531 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2007-03-31

    Start Date: March 31, 2007. End Date: August 1, 2011. Topic: INFORMATION TECHNOLOGY, Internet, Economic and social development. Region: South Asia, North of Sahara, South of Sahara, Central Asia, Far East Asia, United Kingdom. Total Funding: CA$ 798,547.00. Partnership : Information and Communication ...

  19. : tous les projets | Page 107 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: MIDDLE EAST, MANUFACTURING, EXPORT DIVERSIFICATION, ECONOMIC GROWTH, EMPLOYMENT GROWTH. Région: Middle East, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, Philippines. Financement total : CA$ 102,100.00. Examen de la complexité économique du monde ...

  20. Groundwater geochemistry of a Mio-Pliocene aquifer in the northeastern Algerian Sahara (Djamaa region)

    Science.gov (United States)

    Houari, Idir Menad; Nezli, Imed Eddine; Belksier, Mohamed Salah

    2018-05-01

    The groundwater resources in the Northern Sahara are represented by two superimposed major aquifer systems: the Intercalary Continental (CI) and the Terminal Complex (CT). The waters of these aquifers pose serious physical and chemical quality problems; they are highly mineralized and very hard. The present work aims to describe the water's geochemical evolution of sand groundwater (Mio-Pliocene) of the Terminal Complex in the area of Djamaa, by the research of the relationship between water's chemical composition and lithology of aquifer formations through. The results obtained show that the water's chemistry is essentially governed by the dissolution of evaporate formations, which gives to, waters an excessive mineralization expressed by high concentrations of sulfates, chlorides and sodium.

  1. Interpretación del Arte Rupestre Centro-Sahariano: una aproximación al estilo de Cabezas Redondas = Interpretation of Central Sahara Rock Art: an approach to The Round Head style

    Directory of Open Access Journals (Sweden)

    Hugo Alexander van Teslaar

    2015-11-01

    Full Text Available El estudio del arte rupestre sahariano ha comenzado en las últimas décadas a tener una agenda propia dentro de la investigación prehistórica y a despegar como sub-disciplina arqueológica. África ha pasado de ser vista como un continente baldío a apreciarse como una fuente autónoma de cultura, y el Sahara como recipiente de un inmenso legado cultural y artístico del que los investigadores sólo ahora están empezando a comprender en todo su alcance. Este legado cultural y artístico es el objeto de numerosos estudios encaminados a entender los contextos específicos de producción del arte. El estilo característico de Têtes Rondes es el que mayores dificultades de interpretación plantea a los investigadores. Por ello, ocupa una parte importante de este artículo. La carencia en muchos lugares de información contextual (restos materiales que ayudaría a validar o refutar las hipótesis de los investigadores y lo importante y necesario que resulta para el estudio del arte no quedarse en la lectura «superficial» de las imágenes, son algunos de los aspectos que veremos. Este artículo sostiene que para superar algunos de estos problemas es esencial el uso de enfoques y planteamientos interpretativos abiertos, permitiendo así que las premisas de las que parten los investigadores no estén encorsetadas desde sus inicios por una u otra corriente teórica. Adaptar las teorías interpretativas a los vestigios arqueológicos y no al revés resulta fundamental para mejorar nuestro conocimiento de los tiempos pretéritos.In the last decades the study of Sahara rock art begun to have its own agenda within prehistoric research and to take off as an archaeological sub-discipline. Africa has gone from being seen as an empty continent to an autonomous source of culture, and the Sahara as a container of an immense cultural and artistic legacy whose scope researchers are only now starting to comprehend. This cultural and

  2. What we do | Page 176 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    AIDS Review 2005 : What's Cooking? ... de la Información - REDIS/DIRSI) is a multidisciplinary network that supports effective participation in ... Middle East, North Of Sahara, South Of Sahara, Central Asia, Far East Asia, South Asia ... consumer goods, marketing services, financial services, and other goods and services.

  3. : tous les projets | Page 556 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    End Date: 1 décembre 2008. Sujet: POLITICAL PARTIES, POLITICAL REFORM, ISLAM, HUMAN RIGHTS, CIVIL RIGHTS, WOMEN'S RIGHTS. Région: Jordan, Middle East, Morocco, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, Egypt, Yemen, Kuwait, United Kingdom. Programme: Fondements ...

  4. All projects related to | Page 349 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Region: Middle East, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, Algeria, Iraq, Jordan, Lebanon, Morocco, Egypt, Yemen, Bahrain, Kuwait. Program: Governance and Justice. Total Funding: CA$ 370,000.00. Arab Democracy Barometer. Project. The joint Arab Democracy Barometer constitutes ...

  5. All projects related to | Page 348 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Region: Middle East, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, Algeria, Iraq, Jordan, Lebanon, Morocco, Egypt, Yemen, Bahrain, Kuwait. Program: Governance and Justice. Total Funding: CA$ 370,000.00. Arab Democracy Barometer. Project. The joint Arab Democracy Barometer constitutes ...

  6. All projects related to | Page 524 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2008-03-31

    Region: Egypt, Middle East, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, Lebanon, Morocco, Syria. Total Funding: CA$ 181,735.00. Networks : Empowering Communities through Telecentre Networking. Project. In 2006 IDRC's telecentre. Start Date: March 31, 2008. End Date: January 31, 2010.

  7. All projects related to | Page 331 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Region: South America, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, Philippines, Switzerland, South Africa, Lebanon, Burkina Faso, Bangladesh, Kenya, Viet Nam, Ethiopia, Peru, United Kingdom. Program: Maternal and Child Health. Total Funding: CA$ 3,430,000.00. Strengthening Equity ...

  8. All projects related to | Page 332 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Region: South America, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, Philippines, Switzerland, South Africa, Lebanon, Burkina Faso, Bangladesh, Kenya, Viet Nam, Ethiopia, Peru, United Kingdom. Program: Maternal and Child Health. Total Funding: CA$ 3,430,000.00. Strengthening Equity ...

  9. All projects related to mexico | Page 3 | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Development luminaries like Jeffrey Sachs and Muhammad Yunus espouse the ... The Role of Civil Society in Influencing Public Health Policy for Indigenous Women ... Tobacco Taxes and Tobacco Control Policies in Brazil, Mexico, and Uruguay ... of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, Russia.

  10. peru : tous les projets | Page 5 | CRDI - Centre de recherches pour ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: BIOLOGY, BIODIVERSITY, ECOLOGY. Région: Argentina, South America, Costa Rica, North and Central America, Kenya, Peru, South Africa, North of Sahara, South of Sahara, Mexico, Canada. Programme: Agriculture et sécurité alimentaire. Financement total : CA$ 2,158,187.00. Renforcement du dialogue entre ...

  11. All projects related to | Page 5 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    In Africa and Asia, regulations governing communications are not designed to facilitate poverty reduction and economic growth. Region: North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, Sri Lanka. Program: Networked Economies. Total Funding: CA$ 522,000.00. Building emerging leaders in ...

  12. All projects related to Kenya | Page 9 | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Topic: BIOLOGY, BIODIVERSITY, ECOLOGY. Region: Argentina, South America, Costa Rica, North and Central America, Kenya, Peru, South Africa, North of Sahara, South of Sahara, Mexico, Canada. Program: Agriculture and Food Security. Total Funding: CA$ 2,158,187.00. Transitional Justice and the Role of Truth and ...

  13. What we do | Page 126 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Transnational Research on Decentralization in West and Central Africa. Although decentralization keeps coming up in the political discourse, it is fair to question its viability and effectiveness in the hands of local actors. North Of Sahara, South Of Sahara, Cameroon, Ghana, Mali, Niger, Senegal, Burkina Faso. PROJECT ...

  14. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  15. Sahara dust, ocean spray, volcanoes, biomass burning: pathways of nutrients into Andean rainforests

    Science.gov (United States)

    Fabian, P.; Rollenbeck, R.; Spichtinger, N.; Brothers, L.; Dominguez, G.; Thiemens, M.

    2009-10-01

    Regular rain and fogwater sampling in the Podocarpus National Park, on the humid eastern slopes of the Ecuadorian Andes, along an altitude profile between 1960 and 3180 m, has been carried out since 2002. The samples, accumulated over about 1-week intervals, were analysed for pH, conductivity and major ions (K+, Na+, NH4+, Ca2+, Mg2+, Cl-, SO42-, NO3-, PO43-). About 35% of the weekly samples had very low ion contents, with pH mostly above 5 and conductivity below 10 μS/cm. 10-days back trajectories (FLEXTRA) showed that respective air masses originated in pristine continental areas, with little or no obvious pollution sources. About 65%, however, were significantly loaded with cations and anions, with pH as low as 3.5 to 4.0 and conductivity up to 50 μS/cm. The corresponding back trajectories clearly showed that air masses had passed over areas of intense biomass burning, active volcanoes, and the ocean, with episodic Sahara and/or Namib desert dust interference. Enhanced SO42- and NO3+ were identified, by combining satellite-based fire pixel observations with back trajectories, as predominantly resulting from biomass burning. Analyses of oxygen isotopes 16O, 17O, and 18O in nitrate show that nitrate in the samples is indeed a product of atmospheric conversion of precursors. Some SO42-, about 10% of the total input, could be identified to originate from active volcanoes, whose plumes were encountered by about 10% of all trajectories. Enhanced Na+, K+, and Cl- were found to originate from ocean spray sources. They were associated with winds providing Atlantic air masses to the receptor site within less than 5 days. Episodes of enhanced Ca2+ and Mg2+ were found to be associated with air masses from African deserts. Satellite aerosol data confirm desert sources both on the Northern (Sahara) as on the Southern Hemisphere (Namib), depending on the season. A few significant PO43- peaks are related with air masses originating from North African phosphate mining fields.

  16. Highways and outposts: economic development and health threats in the central Brazilian Amazon region.

    Science.gov (United States)

    Barcellos, Christovam; Feitosa, Patrícia; Damacena, Giseli N; Andreazzi, Marco A

    2010-06-17

    Economic development is often evoked as a driving force that has the capacity to improve the social and health conditions of remote areas. However, development projects produce uneven impacts on local communities, according to their different positions within society. This study examines the spatial distribution of three major health threats in the Brazilian Amazon region that may undergo changes through highway construction. Homicide mortality, AIDS incidence and malaria prevalence rates were calculated for 70 municipalities located within the areas of influence of the Cuiabá-Santarém highway (BR-163), i.e. in the western part of the state of Pará state and the northern part of Mato Grosso. The municipalities were characterized using social and economic indicators such as gross domestic product (GDP), urban and indigenous populations, and recent migration. The municipalities' connections to the region's main transportation routes (BR-163 and Trans-Amazonian highways, along with the Amazon and Tapajós rivers) were identified by tagging the municipalities that have boundaries crossing these routes, using GIS overlay operations. Multiple regression was used to identify the major driving forces and constraints relating to the distribution of health threats. The main explanatory variables for higher malaria prevalence were: proximity to the Trans-Amazonian highway, high proportion of indigenous population and low proportion of migrants. High homicide rates were associated with high proportions of migrants, while connection to the Amazon River played a protective role. AIDS incidence was higher in municipalities with recent increases in GDP and high proportions of urban population. Highways induce social and environmental changes and play different roles in spreading and maintaining diseases and health threats. The most remote areas are still protected against violence but are vulnerable to malaria. Rapid economic and demographic growth increases the risk of AIDS

  17. Highways and outposts: economic development and health threats in the central Brazilian Amazon region

    Directory of Open Access Journals (Sweden)

    Damacena Giseli N

    2010-06-01

    Full Text Available Abstract Background Economic development is often evoked as a driving force that has the capacity to improve the social and health conditions of remote areas. However, development projects produce uneven impacts on local communities, according to their different positions within society. This study examines the spatial distribution of three major health threats in the Brazilian Amazon region that may undergo changes through highway construction. Homicide mortality, AIDS incidence and malaria prevalence rates were calculated for 70 municipalities located within the areas of influence of the Cuiabá-Santarém highway (BR-163, i.e. in the western part of the state of Pará state and the northern part of Mato Grosso. Results The municipalities were characterized using social and economic indicators such as gross domestic product (GDP, urban and indigenous populations, and recent migration. The municipalities' connections to the region's main transportation routes (BR-163 and Trans-Amazonian highways, along with the Amazon and Tapajós rivers were identified by tagging the municipalities that have boundaries crossing these routes, using GIS overlay operations. Multiple regression was used to identify the major driving forces and constraints relating to the distribution of health threats. The main explanatory variables for higher malaria prevalence were: proximity to the Trans-Amazonian highway, high proportion of indigenous population and low proportion of migrants. High homicide rates were associated with high proportions of migrants, while connection to the Amazon River played a protective role. AIDS incidence was higher in municipalities with recent increases in GDP and high proportions of urban population. Conclusions Highways induce social and environmental changes and play different roles in spreading and maintaining diseases and health threats. The most remote areas are still protected against violence but are vulnerable to malaria. Rapid

  18. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  19. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    OpenAIRE

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2012-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stere...

  20. All projects related to | Page 562 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Region: North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, Cambodia, China, Indonesia, Laos, Viet Nam, Thailand. Program: Food, Environment, and Health. Total Funding: CA$ 5,093,453.00. Meeting the Challenge of Zoonotic Emerging Infectious Diseases in Southeast Asia. Project. The health of ...

  1. : tous les projets | Page 405 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: TRADE NEGOTIATIONS, TRADE AGREEMENTS, REGIONAL INTEGRATION. Région: North of Sahara, South of Sahara, North and Central America, South America, West Indies. Programme: Emploi et croissance. Financement total : CA$ 1,425,000.00. Soutien analytique pour les pays d'Afrique et des Caraïbes en ...

  2. All projects related to | Page 640 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Region: Bahrain, Middle East, Algeria, Iraq, Lebanon, Morocco, Yemen, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, Turkey. Program: Foundations for Innovation. Total Funding: CA$ 455,953.00. Faith, Social Activism and Politics : Role of Faith Based Organizations in Influencing Public Policy ...

  3. Highways and outposts: economic development and health threats in the central Brazilian Amazon region

    OpenAIRE

    Barcellos, Christovam; Feitosa, Patrícia; Damacena, Giseli N; Andreazzi, Marco A

    2010-01-01

    Abstract Background Economic development is often evoked as a driving force that has the capacity to improve the social and health conditions of remote areas. However, development projects produce uneven impacts on local communities, according to their different positions within society. This study examines the spatial distribution of three major health threats in the Brazilian Amazon region that may undergo changes through highway construction. Homicide mortality, AIDS incidence and malaria ...

  4. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  5. How threats influence the evolutionary resolution of within-group conflict.

    Science.gov (United States)

    Cant, Michael A; Johnstone, Rufus A

    2009-06-01

    Most examples of cooperation in nature share a common feature: individuals can interact to produce a productivity benefit or fitness surplus, but there is conflict over how these gains are shared. A central question is how threats to exercise outside options influence the resolution of conflict within such cooperative associations. Here we show how a simple principle from economic bargaining theory, the outside option principle, can help to solve this problem in biological systems. According to this principle, outside options will affect the resolution of conflict only when the payoff of taking up these options exceeds the payoffs individuals can obtain from bargaining or negotiating within the group; otherwise, threats to exercise outside options are not credible and are therefore irrelevant. We show that previous attempts to incorporate outside options in synthetic models of reproductive conflict fail to distinguish between credible and incredible threats, and then we use the outside option principle to develop credible synthetic models in two contexts: reproductive skew and biparental care. A striking prediction of our analysis is that outside options are least relevant to the resolution of conflict in cooperative groups of kin and are most relevant in transient associations or interactions among nonrelatives. Our analysis shows a way to link the resolution of within-group conflict to the environmental setting in which it occurs, and it illuminates the role of threats in the evolution of social behavior.

  6. All projects related to | Page 472 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Region: Middle East, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, Iran, Iraq, Jordan, Lebanon, Morocco, Egypt, Palestine, Israel. Program: Foundations for Innovation. Total Funding: CA$ 500,000.00. Governance, Reform and Islamism in the Middle East and North Africa. Project. Over the past ...

  7. : tous les projets | Page 55 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Ce projet fournit un soutien continu à la Global Commission on Internet Governance (GCIG) pour favoriser la participation du monde en développement à des discussions d'importance sur la gouvernance d'Internet. Sujet: TELECOMMUNICATIONS. Région: Middle East, North of Sahara, South of Sahara, Central Asia, Far ...

  8. : tous les projets | Page 430 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Région: Middle East, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, Iran, Iraq, Jordan, Lebanon, Morocco, Syria, Egypt, Palestine, Israel. Programme: Fondements pour l'innovation. Financement total : CA$ 500,000.00. Gouvernance, réformes et islamisme au Moyen-Orient et en Afrique du Nord.

  9. : tous les projets | Page 431 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Région: Middle East, North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, Iran, Iraq, Jordan, Lebanon, Morocco, Syria, Egypt, Palestine, Israel. Programme: Fondements pour l'innovation. Financement total : CA$ 500,000.00. Gouvernance, réformes et islamisme au Moyen-Orient et en Afrique du Nord.

  10. Afrique du Sud : tous les projets | Page 5 | CRDI - Centre de ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: BIOLOGY, BIODIVERSITY, ECOLOGY. Région: Argentina, South America, Costa Rica, North and Central America, Kenya, Peru, South Africa, North of Sahara, South of Sahara, Mexico, Canada. Programme: Agriculture et sécurité alimentaire. Financement total : CA$ 2,158,187.00. Vulnérabilité et adaptation face aux ...

  11. : tous les projets | Page 306 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Le code barre ADN est un nouvel outil de recherche taxinomique. Date de début : 1 avril 2010. End Date: 1 octobre 2013. Sujet: BIOLOGY, BIODIVERSITY, ECOLOGY. Région: Argentina, South America, Costa Rica, North and Central America, Kenya, Peru, South Africa, North of Sahara, South of Sahara, Mexico, Canada.

  12. : tous les projets | Page 305 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Le code barre ADN est un nouvel outil de recherche taxinomique. Date de début : 1 avril 2010. End Date: 1 octobre 2013. Sujet: BIOLOGY, BIODIVERSITY, ECOLOGY. Région: Argentina, South America, Costa Rica, North and Central America, Kenya, Peru, South Africa, North of Sahara, South of Sahara, Mexico, Canada.

  13. south africa : tous les projets | Page 5 | CRDI - Centre de recherches ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: BIOLOGY, BIODIVERSITY, ECOLOGY. Région: Argentina, South America, Costa Rica, North and Central America, Kenya, Peru, South Africa, North of Sahara, South of Sahara, Mexico, Canada. Programme: Agriculture et sécurité alimentaire. Financement total : CA$ 2,158,187.00. Vulnérabilité et adaptation face aux ...

  14. Kenya : tous les projets | Page 6 | CRDI - Centre de recherches pour ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Le code barre ADN est un nouvel outil de recherche taxinomique. Date de début : 1 avril 2010. End Date: 1 octobre 2013. Sujet: BIOLOGY, BIODIVERSITY, ECOLOGY. Région: Argentina, South America, Costa Rica, North and Central America, Kenya, Peru, South Africa, North of Sahara, South of Sahara, Mexico, Canada.

  15. Mexico : tous les projets | Page 4 | CRDI - Centre de recherches ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Le code barre ADN est un nouvel outil de recherche taxinomique. Date de début : 1 avril 2010. End Date: 1 octobre 2013. Sujet: BIOLOGY, BIODIVERSITY, ECOLOGY. Région: Argentina, South America, Costa Rica, North and Central America, Kenya, Peru, South Africa, North of Sahara, South of Sahara, Mexico, Canada.

  16. Pérou : tous les projets | Page 5 | CRDI - Centre de recherches pour ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Le code barre ADN est un nouvel outil de recherche taxinomique. Date de début : 1 avril 2010. End Date: 1 octobre 2013. Sujet: BIOLOGY, BIODIVERSITY, ECOLOGY. Région: Argentina, South America, Costa Rica, North and Central America, Kenya, Peru, South Africa, North of Sahara, South of Sahara, Mexico, Canada.

  17. : tous les projets | Page 478 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Plusieurs experts commencent à remettre en question la notion de syndrome de stress post-traumatique (SSPT). Date de début : 28 octobre 2007. End Date: 22 mars 2009. Sujet: PEACE RESEARCH, CONFLICT RESOLUTION. Région: Middle East, South Asia, North of Sahara, South of Sahara, North and Central America, ...

  18. Former Military Networks a Threat to Peace? The Demobilisation and Remobilization of Renamo in Central Mozambique

    Directory of Open Access Journals (Sweden)

    Nikkie Wiegink

    2015-11-01

    Full Text Available Renamo’s recent upsurge against the Mozambican Frelimo-led government after 22 years of relative stability has challenged the country’s often celebrated disarmament, demobilization and reintegration process (1992 to 1994. Drawing on ethnographic fieldwork conducted in Maringue (Sofala province, the location of the rebels’ wartime headquarters and a post-war Renamo stronghold, this paper shows that while the DDR program supposedly ended Renamo’s command and control structure, the former rebel network continued to be a central feature of ex-combatants’ social worlds. Former Renamo combatants spend most of their time in the company of their ‘colleagues of the trenches’ and engaged in relationships of dependency with political Renamo leaders and former commanders. These relationships were not only shaped by the former military structure, but also by friendship, marriage, and patronage dynamics, providing ex-Renamo combatants with physical and economic safety, a sense of belonging and economic possibilities. Recent events in Mozambique suggest that the post-conflict continuation of informal wartime networks is a threat to peace and a failure of demobilization. Nevertheless, the fieldwork conducted in Maringue reveals that the dismantling of the command and control structure is often in vain, as it may be worthwhile for ex-combatants to maintain ties with their former military group for various reasons. Therefore, I argue that it may be useful to consider these networks based on the former armed group in processes of violence reduction, also in the development of DDR programs, as these may offer possibilities for the re-positioning and transformation of (former armed actors.

  19. The Role of Meteorology and Surface Condition to Multi-Decadal Variations of Dust Emission in Sahara and Sahel

    Science.gov (United States)

    Kim, D.; Chin, M.; Diehl, T. L.; Bian, H.; Brown, M. E.; Remer, L. A.; Stockwell, W. R.

    2014-12-01

    North Africa is the world's largest dust source region influencing regional and global climate, human health, and even the local economy. However North Africa as a dust source is not uniform but it consists of the arid region (Sahara) and the semi-arid region (Sahel) with emission rates depending on meteorological and surface conditions. Several recent studies have shown that dust from North Africa seems to have a decreasing trend in the past three decades. The goal of this study is to better understand the controlling factors that determine the change of dust in North Africa using observational data and model simulations. First we analyze surface bareness conditions determined from a long-term satellite observed Normalized Difference Vegetation Index for 1980-2008. Then we examine the key meteorological variables of precipitation and surface winds. Modeling experiments were conducted using the NASA Goddard Chemistry Aerosol Radiation and Transport (GOCART) model, which has been recently updated with a dynamic dust source function. Using the method we separate the dust originating from the Sahel from that of the Sahara desert. We find that the surface wind speed is the most dominant factor affecting Sahelian dust emission while vegetation has a modulating effect. We will show regional differences in meteorological variables, surface conditions, dust emission, and dust distribution and address the relationships among meteorology, surface conditions, and dust emission/loading in the past three decades (1980-2008).

  20. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  1. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  2. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    Science.gov (United States)

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  3. Environmental isotopes in the aquifers of the North Western Sahara

    International Nuclear Information System (INIS)

    Conrad, G.

    1975-09-01

    The isotopic composition of single rains at Beni-Abbes (Algeria) has been determined from 1964 to 1975. The weighed mean delta 18 O value is -3.54 %o vs. SMOW for all rains, -6.29 for rains higher than 10 mm. Only these more intense rains are believed to contribute significantly to groundwater recharge. Tritium content of precipitation varies from 900 TU in a 1964 rain, to 235 in 1967, 215 in 1968 and about 50 in 1972. The isotopic and chemical composition of water from a small salt lake nearby Beni-Abbes show variations depending on the evaporation rate and on the amount and origin of inflow. Groundwater in the Western Ground Erg contain significant amount of tritium, indicating recent recharge. The water is however submitted to evaporation as indicated by its 18 O and deuterium content. The so-called Continental Intercalaire aquifer, which extends over most of the Sahara desert, appears to be presently recharged in the outcropping areas like in Tidikelt, as shown by tritium and 14 C, and by the Western Ground Erg aquifer in the Gourara area, as shown by stable isotopes

  4. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  5. Private Higher Education in a Cold War World: Central America

    Science.gov (United States)

    Harrington, James J.

    2009-01-01

    In Central America the Cold War support of the elites by the United States was designed to ward off the communist threat. At the same time social and economic demands by the working and middle classes created revolutionary movements in the face of rigid and violent responses by Central American governments. Issues of social justice pervaded the…

  6. Tobacco and Poverty in Niger | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The majority of African countries South of Sahara are at the first stage of the tobacco epidemic, but tobacco consumption is increasing rapidly. Aware of the worldwide threat, the World Health Organization (WHO) initiated the Framework Convention on Tobacco Control (FTCT) and the majority of African countries have ...

  7. Strengthening the Legal and Regulatory Framework of the Tobacco ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The majority of African countries South of Sahara are at the first stage of the tobacco epidemic, but tobacco consumption is increasing rapidly. Aware of the worldwide threat, the World Health Organization (WHO) initiated the Framework Convention on Tobacco Control (FTCT) and the majority of African countries have ...

  8. Activity alterations in the bed nucleus of the stria terminalis and amygdala during threat anticipation in generalized anxiety disorder.

    Science.gov (United States)

    Buff, Christine; Brinkmann, Leonie; Bruchmann, Maximilian; Becker, Michael P I; Tupak, Sara; Herrmann, Martin J; Straube, Thomas

    2017-11-01

    Sustained anticipatory anxiety is central to Generalized Anxiety Disorder (GAD). During anticipatory anxiety, phasic threat responding appears to be mediated by the amygdala, while sustained threat responding seems related to the bed nucleus of the stria terminalis (BNST). Although sustained anticipatory anxiety in GAD patients was proposed to be associated with BNST activity alterations, firm evidence is lacking. We aimed to explore temporal characteristics of BNST and amygdala activity during threat anticipation in GAD patients. Nineteen GAD patients and nineteen healthy controls (HC) underwent functional magnetic resonance imaging (fMRI) during a temporally unpredictable threat anticipation paradigm. We defined phasic and a systematic variation of sustained response models for blood oxygen level-dependent responses during threat anticipation, to disentangle temporally dissociable involvement of the BNST and the amygdala. GAD patients relative to HC responded with increased phasic amygdala activity to onset of threat anticipation and with elevated sustained BNST activity that was delayed relative to the onset of threat anticipation. Both the amygdala and the BNST displayed altered responses during threat anticipation in GAD patients, albeit with different time courses. The results for the BNST activation hint towards its role in sustained threat responding, and contribute to a deeper understanding of pathological sustained anticipatory anxiety in GAD. © The Author (2017). Published by Oxford University Press.

  9. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  10. US POLICY TOWARDS CENTRAL ASIA UNDER TRUMP

    Directory of Open Access Journals (Sweden)

    Lance Alred

    2017-10-01

    Full Text Available U.S. policy faces numerous challenges in Central Asia, such as the decreasing U.S. military and economic resources in the region; Russian and Chinese hostility to a long-term U.S. military presence in Eurasia; restrictions on religious and other freedoms due partly to counterterrorism concerns; limited U.S. involvement in the region compared to other external players (like Japan as well as Russia and China; an undeveloped U.S. policy regarding regional multinational institutions; and the indifference and ignorance of U.S. business toward regional commercial opportunities beyond the energy sector. However, advocates of “America First” in the Trump administration do not see these threats as sufficiently serious to garner U.S. military intervention beyond occasional training, equipping, and intelligence sharing. Terrorism, drug trafficking, economic isolation, and human rights restrictions in Central Asia do not present an immediate existential threat to the United States, sowing ambivalence over the future of U.S. foreign policy in the region.

  11. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  12. : tous les projets | Page 59 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Ce projet formera jusqu'à 36 nouveaux leaders en matière de changements climatiques dans le domaine du financement de l'adaptation, qui soutient les efforts visant à s'adapter aux répercussions des changements climatiques. Région: North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, North and ...

  13. : tous les projets | Page 520 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Région: North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, Cambodia, China, Laos, Viet Nam, Thailand. Programme: Alimentation, environnement et santé. Financement total : CA$ 5,093,453.00. Relever le défi posé par les zoonoses infectieuses émergentes en Asie du Sud-Est. Projet. La santé des ...

  14. The quest for the oil and gas infrastructure protection in central Asia : time bombs and policy options

    Energy Technology Data Exchange (ETDEWEB)

    Bi, J. [Carleton Univ., Ottawa, ON (Canada). Norman Paterson School of International Affairs

    2006-03-15

    The growing economies of China and India have increased global anxieties over dwindling fossil fuel resources. Regional countries in central Asia have advocated for more extensive strategic partnerships within the oil and gas industry as insurance against the pressures of more powerful nations. However, non-traditional threats such as terrorism raise serious questions about critical oil and gas infrastructure protection in central Asia. This paper assessed the vulnerability and threats inherent in protecting the critical oil and gas infrastructure of Central Asia, with a specific focus on Kazakhstan, Turkmenistan, Uzbekistan, and the region of Xinjiang in China. An-depth analysis of the development strategies, terrorist threats, and water issues confronted by Central Asian powers was conducted to demonstrate their vulnerability. The analysis was then used to consider options available for managing oil and gas infrastructure in the regions. It was observed that different perceptions and technological difficulties have made cooperation on critical oil and gas infrastructure protection less important than national sovereignty and domestic stability. It was concluded that a low-key approach to homeland security and oil and gas infrastructure may be the best strategy for Central Asia and China. 44 refs.

  15. Surface features on Sahara soil dust particles made visible by atomic force microscope (AFM phase images

    Directory of Open Access Journals (Sweden)

    M. O. Andreae

    2008-10-01

    Full Text Available We show that atomic force microscopy (AFM phase images can reveal surface features of soil dust particles, which are not evident using other microscopic methods. The non-contact AFM method is able to resolve topographical structures in the nanometer range as well as to uncover repulsive atomic forces and attractive van der Waals' forces, and thus gives insight to surface properties. Though the method does not allow quantitative assignment in terms of chemical compound description, it clearly shows deposits of distinguishable material on the surface. We apply this technique to dust aerosol particles from the Sahara collected over the Atlantic Ocean and describe micro-features on the surfaces of such particles.

  16. Geochronological data on the Amsinassene-Tefedest Block (Central Hoggar, Algerian Sahara) and evidence for its polycyclic evolution

    International Nuclear Information System (INIS)

    Vialette, Y.; Vitel, G.

    1979-01-01

    The history of the Amsinassene-Tefedest Block, in the central Hoggar domain, is characterized by a polycyclic evolution. The unreliable 1970 Ma age obtained on the Arechchoum gneisses, known to be Suggarian-Eburnean, might represent the effect of the Eburnean orogeny. A Rb/Sr whole-rock age on the leucocratic fractions of gneisses point to a kibaran migmatization. This age confirms the existence of a Kibaran orogeny shown in the Aleksod area. The Pharusian-Pan African cycle, in this domain, is characterized by the emplacement of huge granitic bodies during two distinct magnetic phases: one of Late Proterozoic age (670 Ma) or Imezzarian phase, the other of Cambrian age as shown by the 546 and 515 Ma Rb/Sr whole-rock ages obtained on late kinematic granitic plutons, Iskelian phase. The younger mineral ages (470-430 Ma) indicate late vertical uplift of the central Hoggar. (Auth.)

  17. Accountable care organizations and radiology: threat or opportunity?

    Science.gov (United States)

    Abramson, Richard G; Berger, Paul E; Brant-Zawadzki, Michael N

    2012-12-01

    Although the anticipated rise of accountable care organizations brings certain potential threats to radiologists, including direct threats to revenue and indirect systemic changes jeopardizing the bargaining leverage of radiology groups, accountable care organizations, and other integrated health care delivery models may provide radiology with an important opportunity to reassert its leadership and assume a more central role within health care systems. Capitalizing on this potential opportunity, however, will require radiology groups to abandon the traditional "film reader" mentality and engage actively in the design and implementation of nontraditional systems service lines aimed at adding differentiated value to larger health care organizations. Important interlinked and mutually reinforcing components of systems service lines, derived from radiology's core competencies, may include utilization management and decision support, IT leadership, quality and safety assurance, and operational enhancements to meet organizational goals. Such systems-oriented service products, tailored to the needs of individual integrated care entities and supported by objective performance metrics, may provide market differentiation to shield radiology from commoditization and could become an important source of new nonclinical revenue. Copyright © 2012 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  18. The role of genomics in the identification, prediction, and prevention of biological threats.

    Directory of Open Access Journals (Sweden)

    W Florian Fricke

    2009-10-01

    Full Text Available In all likelihood, it is only a matter of time before our public health system will face a major biological threat, whether intentionally dispersed or originating from a known or newly emerging infectious disease. It is necessary not only to increase our reactive "biodefense," but also to be proactive and increase our preparedness. To achieve this goal, it is essential that the scientific and public health communities fully embrace the genomic revolution, and that novel bioinformatic and computing tools necessary to make great strides in our understanding of these novel and emerging threats be developed. Genomics has graduated from a specialized field of science to a research tool that soon will be routine in research laboratories and clinical settings. Because the technology is becoming more affordable, genomics can and should be used proactively to build our preparedness and responsiveness to biological threats. All pieces, including major continued funding, advances in next-generation sequencing technologies, bioinformatics infrastructures, and open access to data and metadata, are being set in place for genomics to play a central role in our public health system.

  19. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  20. Bio-threat microparticle simulants

    Energy Technology Data Exchange (ETDEWEB)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  1. Groundwater resources exploration in the Zug area (Tiris, Western Sahara); Prospeccion de recursos hidricos subterraneos en el area de Zug (Tiris, Sahara Occidental)

    Energy Technology Data Exchange (ETDEWEB)

    Ahmed, B.; Villarroya, F.; Rebollo, L. F.; Olaiz, A.; Lopez, J.

    2015-07-01

    The area of Zug is located in the southwestern corner of the Tiris dorsal, in the Western Sahara. The area is characterized by outcrops of materials, mainly gneisses of archaic age and fractured granitic rocks, which in the southern sector are covered by aeolian sand sheets. A hydrogeological survey of the territory has been carried out, and boreholes and dug wells have been located and analyzed and this information integrated with the sparse outcrops. Based on this study, two hydrogeological domains have been established: Zug and Azzefal. From the analysis of satellite images, field work, geophysical profiles, a well inventory and chemical analysis, three priority areas for the location of future water supply wells have been identified: 1) alluvial fans, preferably located on the slopes of the dikes that cross the Tiris dorsal; 2) sabkhas (salt flats) as places of con- centration of ephemeral runoff and subsurface infiltration of accumulated water; 3) highly fractured granitic areas. Some of these three cases coincide with existing wells in this area. Electrical tomography shows how, in specific locations, low resistivity values reach 50 metres, opening up the possibility of finding sufficient water to meet the aforementioned needs. The water quality is not suitable for human supply directly from the well without chemical treatment. The area is still full of opportunities for future research, but only when a more stable political situation exists. (Author)

  2. ‘Everybody knows’, but the rest of the world: the case of a caterpillar-borne reproductive loss syndrome in dromedary camels observed by Sahrawi pastoralists of Western Sahara

    NARCIS (Netherlands)

    Volpato, G.; Nardo, Di A.; Rossi, D.; Lamin Saleh, S.; Broglia, A.

    2013-01-01

    Background The traditional knowledge of local communities throughout the world is a valuable source of novel ideas and information to science. In this study, the ethnoveterinary knowledge of Sahrawi pastoralists of Western Sahara has been used in order to put forward a scientific hypothesis

  3. From violence to more violence in Central America

    Directory of Open Access Journals (Sweden)

    Israel Medina

    2014-11-01

    Full Text Available Many Central American migrants flee their home country as a result of violence and threats from the criminal gangs. A large number of them also encounter the same type of violence that they are fleeing when on the migratory routes through Mexico.

  4. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  5. Dust and Biological Aerosols from the Sahara and Asia Influence Precipitation in the Western US

    Energy Technology Data Exchange (ETDEWEB)

    Creamean, Jessie; Suski, Kaitlyn; Rosenfeld, Daniel; Cazorla, Alberto; DeMott, Paul J.; Sullivan, Ryan C.; White, Allen B.; Ralph, F. M.; Minnis, Patrick; Comstock, Jennifer M.; Tomlinson, Jason M.; Prather, Kimberly

    2013-03-29

    Winter storms in California’s Sierra Nevada increase seasonal snowpack and provide critical water resources for the state. Thus, the mechanisms influencing precipitation in this region have been the subject of research for decades. Previous studies suggest Asian dust enhances cloud ice and precipitation (1), while few studies consider biological aerosols as an important global source of ice nuclei (IN). Here, we show that dust and biological aerosols transported from as far as the Sahara were present in glaciated high-altitude clouds coincident with elevated IN concentrations and ice-induced precipitation. This study presents the first direct cloud and precipitation measurements showing that Saharan and Asian dust and biological aerosols likely serve as IN and play an important role in orographic precipitation processes over the western United States.

  6. Prototyping of CBRN threat assessment system. Phase 1

    International Nuclear Information System (INIS)

    Ina, Shinichiro; Suzuki, Tomoyuki; Maeno, Akihiro; Sakaue, Motoki

    2015-01-01

    Recently, chemical, biological, radiological and nuclear threats, that is, CBRN threats have emerged. In order to support the Japan Self Defense Forces unit coping with the CBRN threats, it is important to take measures against these invisible threats. Our CBRN threat assessment system will make invisible CBRN threats visible. This report describes a prototyping of the CBRN threat assessment system (PHASE 1) carried out from fiscal year 2012-2014. (author)

  7. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  8. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    Science.gov (United States)

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  9. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  10. The Spread of Islam in the Niger and Senegal Valleys before the Rise of Almoravids

    Directory of Open Access Journals (Sweden)

    Ahmed Elyas Hussein

    2001-12-01

    Full Text Available This study traces the early contacts of the middle and upper Niger and Senegal Rivers with the Muslims in the first five centuries after hijrah and shows the spread of Islam and the rise of states long before the emergence of Al-Moravids. It analyses the early Muslim expansion in the Western Sahara, the role of the Ibāḍiyyah in central Sahara and the efforts of the Sanhadja in the Western Sahara which resulted in the spread of Islam and rise of Islamic kingdoms in the Niger and the Senegal Valleys before the 5th centaury AH.

  11. Mobile Workforce, Mobile Technology, Mobile Threats

    International Nuclear Information System (INIS)

    Garcia, J.

    2015-01-01

    Mobile technologies' introduction into the world of safeguards business processes such as inspection creates tremendous opportunity for novel approaches and could result in a number of improvements to such processes. Mobile applications are certainly the wave of the future. The success of the application ecosystems has shown that users want full fidelity, highly-usable, simple purpose applications with simple installation, quick responses and, of course, access to network resources at all times. But the counterpart to opportunity is risk, and the widespread adoption of mobile technologies requires a deep understanding of the threats and vulnerabilities inherent in mobile technologies. Modern mobile devices can be characterized as small computers. As such, the threats against computing infrastructure apply to mobile devices. Meanwhile, the attributes of mobile technology that make it such an obvious benefit over traditional computing platforms all have elements of risk: pervasive, always-on networking; diverse ecosystems; lack of centralized control; constantly shifting technological foundations; intense competition among competitors in the marketplace; the scale of the installation base (from millions to billions); and many more. This paper will explore the diverse and massive environment of mobile, the number of attackers and vast opportunities for compromise. The paper will explain how mobile devices prove valuable targets to both advanced and persistent attackers as well as less-skilled casual hackers. Organized crime, national intelligence agencies, corporate espionage are all part of the landscape. (author)

  12. Autobiographical memory sources of threats in dreams.

    Science.gov (United States)

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. Conventional and New Ways of Governing Forest Threats: A Study of Stakeholder Coherence in Sweden

    Science.gov (United States)

    Eriksson, Louise

    2018-01-01

    Based on a framework for analyzing stakeholder coherence horizontally and vertically, the present study examined the governance of forest threats in Sweden. Opinions of forest risk governance in stakeholder groups with and without a connection to private forestry were compared ( n = 2496) and the opinions were analyzed in relation to current governance practices. More specifically, forest threat appraisals, trust in the Swedish Forest Agency (SFA), and the acceptability of forest risk policy measures directed at private forest owners were assessed. Results revealed an overall coherence between different stakeholders in this context. However, the groups differed in, for example, the acceptability of the hypothetical regulative measure aiming to reduce damages threatening the forest long-term (e.g., climate change). Furthermore, an extensive use of advice for a fee may challenge particularly the internal, but also the external, legitimacy of forest risk governance. The forest owner stakeholder group showed lower threat appraisals when evaluating threat to one's own forest rather than to the Swedish forest, except regarding browsing by animals. Regulations were not disapproved of in any of the stakeholder groups, although the forest owner group generally displayed higher acceptability of encouraging measures compared to the general public. Trust in the SFA was furthermore confirmed as an important driver of policy acceptability, and higher threat appraisals of novel threats, such as climate change and fire, resulted in a higher acceptability of measures less central or new in this context. The value of analyzing stakeholder coherence for natural resource management and governance is discussed.

  14. Conventional and New Ways of Governing Forest Threats: A Study of Stakeholder Coherence in Sweden.

    Science.gov (United States)

    Eriksson, Louise

    2018-01-01

    Based on a framework for analyzing stakeholder coherence horizontally and vertically, the present study examined the governance of forest threats in Sweden. Opinions of forest risk governance in stakeholder groups with and without a connection to private forestry were compared (n = 2496) and the opinions were analyzed in relation to current governance practices. More specifically, forest threat appraisals, trust in the Swedish Forest Agency (SFA), and the acceptability of forest risk policy measures directed at private forest owners were assessed. Results revealed an overall coherence between different stakeholders in this context. However, the groups differed in, for example, the acceptability of the hypothetical regulative measure aiming to reduce damages threatening the forest long-term (e.g., climate change). Furthermore, an extensive use of advice for a fee may challenge particularly the internal, but also the external, legitimacy of forest risk governance. The forest owner stakeholder group showed lower threat appraisals when evaluating threat to one's own forest rather than to the Swedish forest, except regarding browsing by animals. Regulations were not disapproved of in any of the stakeholder groups, although the forest owner group generally displayed higher acceptability of encouraging measures compared to the general public. Trust in the SFA was furthermore confirmed as an important driver of policy acceptability, and higher threat appraisals of novel threats, such as climate change and fire, resulted in a higher acceptability of measures less central or new in this context. The value of analyzing stakeholder coherence for natural resource management and governance is discussed.

  15. Invasion of central-European habitats by the moss Campylopus introflexus

    Czech Academy of Sciences Publication Activity Database

    Mikulášková, E.; Fajmonová, Zuzana; Hájek, Michal

    2012-01-01

    Roč. 84, č. 4 (2012), s. 863-886 ISSN 0032-7786 Institutional support: RVO:67985939 Keywords : Campylopus introflexus * central Europe * invasive species * plant communities * threat * cultivation Subject RIV: EF - Botanics Impact factor: 2.833, year: 2012

  16. The Sources of Moisture in the Sand Dunes – The Example of the Western Sahara Dune Field

    Directory of Open Access Journals (Sweden)

    Żmudzka Elwira

    2014-09-01

    Full Text Available Climatic and meteorological conditions may limit the aeolian transport within barchans. An explanation of that issue was the main goal of the investigation held in Western Sahara dune fields located around Tarfaya and Laâyoune. Particular attention was paid to the factors causing the moisture content rising of the sand dune surface layer, which could influence the wind threshold shear velocity in the aeolian transport. The wetted surface layer of sand, when receiving moisture from precipitation or suspensions, reduces the aeolian transport, even in case of wind velocity above 4-5 m s-1. Fog and dew condensation does not affect the moisture of deeper sand layers, what occurs after rainfall.

  17. Ongoing neurogenesis in the adult dentate gyrus mediates behavioral responses to ambiguous threat cues.

    Directory of Open Access Journals (Sweden)

    Lucas R Glover

    2017-04-01

    Full Text Available Fear learning is highly adaptive if utilized in appropriate situations but can lead to generalized anxiety if applied too widely. A role of predictive cues in inhibiting fear generalization has been suggested by stress and fear learning studies, but the effects of partially predictive cues (ambiguous cues and the neuronal populations responsible for linking the predictive ability of cues and generalization of fear responses are unknown. Here, we show that inhibition of adult neurogenesis in the mouse dentate gyrus decreases hippocampal network activation and reduces defensive behavior to ambiguous threat cues but has neither of these effects if the same negative experience is reliably predicted. Additionally, we find that this ambiguity related to negative events determines their effect on fear generalization, that is, how the events affect future behavior under novel conditions. Both new neurons and glucocorticoid hormones are required for the enhancement of fear generalization following an unpredictably cued threat. Thus, adult neurogenesis plays a central role in the adaptive changes resulting from experience involving unpredictable or ambiguous threat cues, optimizing behavior in novel and uncertain situations.

  18. Sahara and Sahel vulnerability to climate changes, lessons from the past

    Science.gov (United States)

    Lezine, Anne-Marie; Hély, Christelle; Grenier, Christophe; Braconnot, Pascale

    2010-05-01

    Since the Sahelian drought in the 1970s, climate variability in north tropical Africa has been the subject of intensive research focusing on the functioning of the Atlantic monsoon system as well as on past variations in rainfall from historical and natural archives. An "abrupt" climate change has been recorded off the Mauritanian coast at the end of the African Humid Period (AHP) 5500 years ago illustrating the onset of the modern climate regime [deMenocal et al., 2000]. At lake Yoa in NE Chad, [Kroepelin et al., 2008] report a "gradual" environmental change. Was this change abrupt or gradual, and amplified or not through vegetation change and feedbacks to the atmosphere is still the subject of debate. Here, we compile paleohydrological and palynological data between 10 and 28°N in the Sahara and Sahel with the purpose of understanding the response of the hydrological system and the vegetation cover to rainfall fluctuations from the onset of the AHP. Our data set is extracted from published studies. It is composed of 1651 dated samples from about 420 localities in the present day Sahara and Sahel. The occurrence of high and intermediate lake levels, fluvial terraces and wetlands as well as of dune edification are analysed with a 1000 yr period from 16 000 yrs BP to present. Clear trends are observed in the evolution of paleohydrological indicators versus time and latitude showing the progression of the centre of the distribution of humidity from south to north during the humid period and to the south after the AHP. The humidity maximum is observed with some temporal delay as compared to the June solar radiation maximum at 30°N. The reasons are investigated along the line of pure climate based processes and/or hydrological impacts. Further, the overall coherence among these signals is examined. Using climate simulations for different key periods in the Holocene, we investigate the relative impact of the insolation forcing, of the remnant ice sheet in the early

  19. Defending Against Advanced Persistent Threats Using Game-Theory.

    Science.gov (United States)

    Rass, Stefan; König, Sandra; Schauer, Stefan

    2017-01-01

    Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailable. Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APTs, such as disagreement among qualitative expert risk assessments, unknown adversarial incentives and uncertainty about the current system state (in terms of how deeply the attacker may have penetrated into the system's protective shells already). Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest.

  20. Safe from harm: learned, instructed, and symbolic generalization pathways of human threat-avoidance.

    Directory of Open Access Journals (Sweden)

    Simon Dymond

    Full Text Available Avoidance of threatening or unpleasant events is usually an adaptive behavioural strategy. Sometimes, however, avoidance can become chronic and lead to impaired daily functioning. Excessive threat-avoidance is a central diagnostic feature of anxiety disorders, yet little is known about whether avoidance acquired in the absence of a direct history of conditioning with a fearful event differs from directly learned avoidance. In the present study, we tested whether avoidance acquired indirectly via verbal instructions and symbolic generalization result in similar levels of avoidance behaviour and threat-beliefs to avoidance acquired after direct learning. Following fear conditioning in which one conditioned stimulus was paired with shock (CS+ and another was not (CS-, participants either learned or were instructed to make a response that cancelled impending shock. Three groups were then tested with a learned CS+ and CS- (learned group, instructed CS+ (instructed group, and generalized CS+ (derived group presentations. Results showed similar levels of avoidance behaviour and threat-belief ratings about the likelihood of shock across each of the three pathways despite the different mechanisms by which they were acquired. Findings have implications for understanding the aetiology of clinical avoidance in anxiety.

  1. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    Science.gov (United States)

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  2. All projects related to | Page 301 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Topic: KNOWLEDGE, RESEARCH NETWORKS, INTERNATIONAL RELATIONS, DEVELOPMENT RESEARCH, DEVELOPMENT THEORY, STRATEGIC PLANNING. Region: Middle East, Central Asia, Far East Asia, South Asia, West Indies, North and Central America, South America, North of Sahara, Canada.

  3. Comparison of efficacy of unheated and heat-treated Sahara honey on wound healing in rabbits

    Directory of Open Access Journals (Sweden)

    Baghdad Khiati

    2015-02-01

    Full Text Available Objective: To investigate the efficacy of unheated and heat-treated Sahara honey on wound healing in rabbits on the basis of macroscopic observation changes. Methods: Eight female rabbits were used. Using aseptic surgical technique, a 3 cm incision was made on the back of each rabbit and two rabbits with injuries in each group were treated daily with a topical application of unheated and heated honey, sulfadiazine and sterile saline, respectively. Results: The unheated honey demonstrated the highest activity on the wound compared to reference ointment silver sulfadiazine, heat-treated honey and sterile saline respectively. Further the present investigation proves that unheated honey is possessing superior wound healing activity than that of heat-treated honey. Conclusions: The result of this study confirms that unheated honey had the best wound healing effect even better than heat-treated honey.

  4. Local Human Development in contexts of permanent crisis: Women’s experiences in the Western Sahara

    Directory of Open Access Journals (Sweden)

    María López Belloso

    2009-04-01

    Full Text Available Sahrawi women are active agents in the social dynamics of the refugee camps, in which they have developeda number of coping strategies to overcome the hardships of a deteriorating humanitarian situation. Since the outbreak of the con#ict and the forced settlement in Tindouf, Algeria, women have been responsible for the entire management of refugee camps, assuming leadership roles in many sectors of society.This paper highlights the Sahrawi women’s contribution to the process of local human development in a context of protracted refuge such as the one in the Western Sahara. In addition to the enlargement of the refugee population’s capacities in relation to material and physical assets, social and organizational abilities, and motivational strengths, one of the major achievements of Sahrawi women has been their own individual and collective process of empowerment within the camp life.

  5. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    OpenAIRE

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  6. Effect of evaluation threat on procrastination behavior.

    Science.gov (United States)

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  7. Does imminent threat capture and hold attention?

    Science.gov (United States)

    Koster, Ernst H W; Crombez, Geert; Van Damme, Stefaan; Verschuere, Bruno; De Houwer, Jan

    2004-09-01

    According to models of attention and emotion, threat captures and holds attention. In behavioral tasks, robust evidence has been found for attentional holding but not for attentional capture by threat. An important explanation for the absence of attentional capture effects is that the visual stimuli used posed no genuine threat. The present study investigated whether visual cues that signal an aversive white noise can elicit attentional capture and holding effects. Cues presented in an attentional task were simultaneously provided with a threat value through an aversive conditioning procedure. Response latencies showed that threatening cues captured and held attention. These results support recent views on attention to threat, proposing that imminent threat captures attention in everyone. (c) 2004 APA, all rights reserved

  8. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  9. Modulation of instrumental responding by a conditioned threat stimulus requires lateral and central amygdala

    Directory of Open Access Journals (Sweden)

    Vincent eCampese

    2015-10-01

    Full Text Available Two studies explored the role of the amygdala in response modulation by an aversive conditioned stimulus (CS in rats. Experiment 1 investigated the role of amygdala circuitry in conditioned suppression using a paradigm in which licking for sucrose was inhibited by a tone CS that had been previously paired with footshock. Electrolytic lesions of the lateral amygdala impaired suppression relative to sham-operated animals, and produced the same pattern of results when applied to central amygdala. In addition, disconnection of the lateral and central amygdala, by unilateral lesion of each on opposite sides of the brain, also impaired suppression relative to control subjects that received lesions of both areas on the same side. In each case, lesions were placed following Pavlovian conditioning and instrumental training, but before testing. This procedure produced within-subjects measures of the effects of lesion on freezing and between-group comparisons for the effects on suppression. Experiment 2 extended this analysis to a task where an aversive CS suppressed shuttling responses that had been previously food reinforced and also found effects of bilateral lesions of the central amygdala in a pre-post design. Together, these studies demonstrate that connections between the lateral and central amygdala constitute a serial circuit involved in processing aversive Pavlovian stimuli, and add to a growing body of findings implicating central amygdala in the modulation of instrumental behavior.

  10. Climate Change and Global Warming: Implications for Sub-Saharan ...

    African Journals Online (AJOL)

    The study reviews the potential threats of climate change in sub-Sahara Africa. It paints a picture of how the major green house gases (GHGs)-CO2, CH4 will grow in the sub-continent before the year 2015. The study also highlights the potential causes of climate change in the sub-continent based on anthropogenic and ...

  11. Fluctuations in [¹¹C]SB207145 PET binding associated with change in threat-related amygdala reactivity in humans

    DEFF Research Database (Denmark)

    Fisher, Patrick MacDonald; Haahr, Mette Ewers; Jensen, Christian Gaden

    2015-01-01

    resonance imaging while performing a gender discrimination task of fearful, angry, and neutral faces. This offered a unique opportunity to evaluate whether individual fluctuations in central serotonin levels, indexed by change in [11C]SB207145 binding, predicted changes in threat-related reactivity (ie...

  12. Characterization of potential zones of dust generation at eleven stations in the southern Sahara

    Science.gov (United States)

    Clark, I.; Assamoi, P.; Bertrand, J.; Giorgi, F.

    Synoptic wind data for multi-decadal periods at eleven stations located in the southern Sahara region (Agadez, Atar, Bilma, Dori, Gao, Kayes, Nema, Niamey, Nouadhibou, Ouagadougou and Tessalit) are used to study the monthly dust deflation power over the region. We found that, regardless of the conditions of the soil, the deflation power (or wind efficiency) is not sufficient to generate significant amounts of aerosols south of 15°N. North of this latitude, the deflation power is much larger, with potential zones of either very strong deflation (Nouadhibou and Bilma) or severe deflation (Gao, Tessalit, Nema, Atar, Agadez). Stations in the Sahel region such as Gao, Agadez and Tessalit are characterized by a gradual reinforcement of the deflation power between 1970 and 1984 in correspondence of increasing desertification over the region. During this same period, Bilma, a well know region of dust source, experienced a major reduction in deflation power due to shifts in large scale wind patterns.

  13. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    Science.gov (United States)

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  14. Stereotype threat spillover: how coping with threats to social identity affects aggression, eating, decision making, and attention.

    Science.gov (United States)

    Inzlicht, Michael; Kang, Sonia K

    2010-09-01

    Stereotype threat spillover is a situational predicament in which coping with the stress of stereotype confirmation leaves one in a depleted volitional state and thus less likely to engage in effortful self-control in a variety of domains. We examined this phenomenon in 4 studies in which we had participants cope with stereotype and social identity threat and then measured their performance in domains in which stereotypes were not "in the air." In Study 1 we examined whether taking a threatening math test could lead women to respond aggressively. In Study 2 we investigated whether coping with a threatening math test could lead women to indulge themselves with unhealthy food later on and examined the moderation of this effect by personal characteristics that contribute to identity-threat appraisals. In Study 3 we investigated whether vividly remembering an experience of social identity threat results in risky decision making. Finally, in Study 4 we asked whether coping with threat could directly influence attentional control and whether the effect was implemented by inefficient performance monitoring, as assessed by electroencephalography. Our results indicate that stereotype threat can spill over and impact self-control in a diverse array of nonstereotyped domains. These results reveal the potency of stereotype threat and that its negative consequences might extend further than was previously thought. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

  15. Power and threat in intergroup conflict : How emotional and behavioral responses depend on amount and content of threat

    NARCIS (Netherlands)

    Kamans, Elanor; Otten, Sabine; Gordijn, Ernestine H.

    We propose that in intergroup conflict threat content is important in understanding the reactions of those who experience threats the most: the powerless. Studies 1 and 2 show that powerless groups experience more threat than powerful groups, resulting in the experience of both more anger and fear.

  16. Insular threat associations within taxa worldwide.

    Science.gov (United States)

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  17. Ce que nous faisons | Page 167 | CRDI - Centre de recherches pour ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Modèles commerciaux libres (Amérique latine). Le Centro de Tecnologia e Sociedade (CTS - centre pour la technologie et la société) fait partie de la Faculté de droit de la Fundação Getulio Vargas à Rio de Janeiro. Brésil, Amérique Du Sud, Nigéria, Nord Du Sahara, Sud Du Sahara, Amérique Nord Et Centrale. PROJECT ...

  18. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  19. The Right to Self-Determination and Natural Resources: The Case of Western Sahara

    Directory of Open Access Journals (Sweden)

    Hans Morten Haugen

    2007-06-01

    Full Text Available Phosphate, fish and possibly oil and gas all constitute important natural resources found on the territory and in the waters of Western Sahara. The importance of these natural resources must be recognised in order to understand the stalemate in the attempted process of decolonisation from Morocco which has been going on for more than 30 years. The article analyses the ‘resource dimension’ of the right to self-determination, as recognised in human rights treaties and in Resolution III of the UN Conference on the Law of the Seas, as well as several resolutions from the United Nations General Assembly. If the resources are exploited in a manner which does not benefit the peoples seeking to enjoy the right to self-determination, such exploitation is illegal. The article shows that the current exploitation takes place in a manner contrary to the interests of the local population, the Saharawis. The article also demonstrates that recent license agreements with Saharawi authorities in the field of oil and gas, signal a potentially new and constructive approach by international corporations.

  20. Carboniferous bioconstructions of the Bechar Basin, Algerian Sahara: Sedimentology, diagenesis, and petroleum potential. Les bioconstructions carboniferes du Bassin de Bechar, Sahara algerien: Sedimentologie, diagenese et potentiel petrolifere

    Energy Technology Data Exchange (ETDEWEB)

    Madi, A.

    1994-01-01

    Carbonate massifs which surface on the northwest of the Bechar Basin in the Algerian Sahara are studied, in particular the lithostratigraphic section of the upper Visean of the Grand Erg Occidental. The latter corresponds to a succession of 13 shallowing-upward parasequences. An ideal parasequence comprises a massive biohermal assemblage, constructed by the association of Fenestelles and sponges, buried under strata of crinoidal and/or oolithic grainstones. The vertical distribution of the microflora within the facies translates into a zonation as function of depth. An idealized ecological succession formed from seven benthic assemblages is proposed. Diagenetic analysis of the studied sequences has revealed nine diagenetic phases corresponding to six calcitic cements, two dolomitization phases, and one of silicification. Most of these diagenetic events were produced in medium to deep burial, after 650 m. The stratified oolithic-crinoidal carbonates could have served as reservoir rocks if trapping conditions were present. A hypothesis has been formed according to which the porous strata formed natural conduits on a regional scale and three trapping possibilities are proposed. These models, which integrate all the parameters which influence the existence of a petroleum deposit, could contribute to the establishment of an exploration strategy for the Bechar Basin Carboniferous carbonate strata. 146 refs., 61 figs., 29 tabs.

  1. Establishing 'design basis threat' in Norway

    International Nuclear Information System (INIS)

    Maerli, M.B.; Naadland, E.; Reistad, O.

    2002-01-01

    Full text: INFCIRC 225 (Rev. 4) assumes that a state's physical protection system should be based on the state's evaluation of the threat, and that this should be reflected in the relevant legislation. Other factors should also be considered, including the state's emergency response capabilities and the existing and relevant measures of the state's system of accounting for and control of nuclear material. A design basis threat developed from an evaluation by the state of the threat of unauthorized removal of nuclear material and of sabotage of nuclear material and nuclear facilities is an essential element of a state's system of physical protection. The state should continuously review the threat, and evaluate the implications of any changes in that threat for the required levels and the methods of physical protection. As part of a national design basis threat assessment, this paper evaluates the risk of nuclear or radiological terrorism and sabotage in Norway. Possible scenarios are presented and plausible consequences are discussed with a view to characterize the risks. The need for more stringent regulatory requirements will be discussed, together with the (positive) impact of improved systems and procedures of physical protection on nuclear emergency planning. Special emphasis is placed on discussing the design basis threat for different scenarios in order to systemize regulatory efforts to update the current legislation, requirement for operators' contingency planning, response efforts and the need for emergency exercises. (author)

  2. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  3. Linking terrestrial and marine conservation planning and threats analysis.

    Science.gov (United States)

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  4. Canada : tous les projets | Page 9 | CRDI - Centre de recherches ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: AFRICA SOUTH OF SAHARA, BIOTECHNOLOGY, AGRICULTURAL INNOVATIONS, Disease control, AGRICULTURAL RESEARCH, ECONOMIC DEVELOPMENT. Région: Kenya, North ... Région: Brazil, South America, Canada, North and Central America, India, Far East Asia, South Korea, Central Asia, South Asia.

  5. Climate change and global warming: implications for sub-Saharan Africa

    Energy Technology Data Exchange (ETDEWEB)

    Christian, E.

    2010-07-01

    The study reviews the potential threats of climate change in sub-Sahara Africa. It paints a picture of how the major green house gases (GHGs) -- CO{sub 2}, CH{sub 4} -- will grow in the sub-continent before the year 2015. The study also highlights the potential causes of climate change in the sub-continent based on anthropogenic and physical factors. It further examined the impacts of climate change in the sub-region based on the sensitivity, vulnerability and adaptations opened to the sub-region. Observation shows that overall social and economic activities in sub-Sahara Africa will be substantially worse than in any other developing world. Consequently, mitigation and adaptation measures were suggested to alleviate the impacts of climate change in the sub-region.

  6. Bomb Threat Assessments. Fact Sheet

    Science.gov (United States)

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  7. Stereotype threat in classroom settings: the interactive effect of domain identification, task difficulty and stereotype threat on female students' maths performance.

    Science.gov (United States)

    Keller, Johannes

    2007-06-01

    Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths performance. The study was designed to test theoretical ideas derived from stereotype threat theory and assumptions outlined in the Yerkes-Dodson law proposing a nonlinear relationship between arousal, task difficulty and performance. Participants were 108 high school students attending secondary schools. Participants worked on a test comprising maths problems of different difficulty levels. Half of the participants learned that the test had been shown to produce gender differences (stereotype threat). The other half learned that the test had been shown not to produce gender differences (no threat). The degree to which participants identify with the domain of maths was included as a quasi-experimental factor. Maths-identified female students showed performance decrements under conditions of stereotype threat. Moreover, the stereotype threat manipulation had different effects on low and high domain identifiers' performance depending on test item difficulty. On difficult items, low identifiers showed higher performance under threat (vs. no threat) whereas the reverse was true in high identifiers. This interaction effect did not emerge on easy items. Domain identification and test item difficulty are two important factors that need to be considered in the attempt to understand the impact of stereotype threat on performance.

  8. Threats Management Throughout the Software Service Life-Cycle

    Directory of Open Access Journals (Sweden)

    Erlend Andreas Gjære

    2014-04-01

    Full Text Available Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime. In this paper we describe an approach where we model composite services and threats together, which allows us to create preventive measures at design-time. At runtime, our specification also allows the service runtime environment (SRE to receive alerts about active threats that we have not handled, and react to these automatically through adaptation of the composite service. A goal-oriented security requirements modelling tool is used to model business-level threats and analyse how they may impact goals. A process flow modelling tool, utilising Business Process Model and Notation (BPMN and standard error boundary events, allows us to define how threats should be responded to during service execution on a technical level. Throughout the software life-cycle, we maintain threats in a centralised threat repository. Re-use of these threats extends further into monitoring alerts being distributed through a cloud-based messaging service. To demonstrate our approach in practice, we have developed a proof-of-concept service for the Air Traffic Management (ATM domain. In addition to the design-time activities, we show how this composite service duly adapts itself when a service component is exposed to a threat at runtime.

  9. An overview of non-traditional nuclear threats

    International Nuclear Information System (INIS)

    Geelhood, B.D.; Wogman, N.A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or 'dirty' bombs. The consequences of these nuclear and radiological threats are both economic and life threatening. The defense against undesirable materials entering our borders involves extensive radiation monitoring at ports of entry. The radiation and other signatures of potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve radiation detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo. (author)

  10. Spatially explicit multi-threat assessment of food tree species in Burkina Faso: A fine-scale approach.

    Directory of Open Access Journals (Sweden)

    Hannes Gaisberger

    regeneration in the central part where the current threat level is high due to overexploitation. In the same way, population-specific recommendations can be derived from the individual and combined threat maps of the other 15 food tree species. The approach can be easily transferred to other countries and can be used to analyze general and species specific threats at finer and more local as well as at broader (continental scales in order to plan more selective and efficient conservation actions in time. The concept can be applied anywhere as long as appropriate spatial data are available as well as knowledgeable experts.

  11. Stereotype threat can reduce older adults' memory errors.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research, we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment. Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 and 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well.

  12. Sahara dust, ocean spray, volcanoes, biomass burning: pathways of nutrients into Andean rainforests

    Directory of Open Access Journals (Sweden)

    P. Fabian

    2009-10-01

    Full Text Available Regular rain and fogwater sampling in the Podocarpus National Park, on the humid eastern slopes of the Ecuadorian Andes, along an altitude profile between 1960 and 3180 m, has been carried out since 2002. The samples, accumulated over about 1-week intervals, were analysed for pH, conductivity and major ions (K+, Na+, NH4+, Ca2+, Mg2+, Cl, SO42−, NO3, PO43−.

    About 35% of the weekly samples had very low ion contents, with pH mostly above 5 and conductivity below 10 μS/cm. 10-days back trajectories (FLEXTRA showed that respective air masses originated in pristine continental areas, with little or no obvious pollution sources.

    About 65%, however, were significantly loaded with cations and anions, with pH as low as 3.5 to 4.0 and conductivity up to 50 μS/cm. The corresponding back trajectories clearly showed that air masses had passed over areas of intense biomass burning, active volcanoes, and the ocean, with episodic Sahara and/or Namib desert dust interference.

    Enhanced SO42− and NO3+ were identified, by combining satellite-based fire pixel observations with back trajectories, as predominantly resulting from biomass burning. Analyses of oxygen isotopes 16O, 17O, and 18O in nitrate show that nitrate in the samples is indeed a product of atmospheric conversion of precursors. Some SO42−, about 10% of the total input, could be identified to originate from active volcanoes, whose plumes were encountered by about 10% of all trajectories.

    Enhanced Na+, K+, and Cl were found to originate from ocean spray sources. They were associated with winds providing Atlantic air masses to the receptor site within less than 5 days. Episodes of

  13. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  14. The central extended amygdala in fear and anxiety: Closing the gap between mechanistic and neuroimaging research.

    Science.gov (United States)

    Fox, Andrew S; Shackman, Alexander J

    2017-11-30

    Anxiety disorders impose a staggering burden on public health, underscoring the need to develop a deeper understanding of the distributed neural circuits underlying extreme fear and anxiety. Recent work highlights the importance of the central extended amygdala, including the central nucleus of the amygdala (Ce) and neighboring bed nucleus of the stria terminalis (BST). Anatomical data indicate that the Ce and BST form a tightly interconnected unit, where different kinds of threat-relevant information can be integrated to assemble states of fear and anxiety. Neuroimaging studies show that the Ce and BST are engaged by a broad spectrum of potentially threat-relevant cues. Mechanistic work demonstrates that the Ce and BST are critically involved in organizing defensive responses to a wide range of threats. Studies in rodents have begun to reveal the specific molecules, cells, and microcircuits within the central extended amygdala that underlie signs of fear and anxiety, but the relevance of these tantalizing discoveries to human experience and disease remains unclear. Using a combination of focal perturbations and whole-brain imaging, a new generation of nonhuman primate studies is beginning to close this gap. This work opens the door to discovering the mechanisms underlying neuroimaging measures linked to pathological fear and anxiety, to understanding how the Ce and BST interact with one another and with distal brain regions to govern defensive responses to threat, and to developing improved intervention strategies. Copyright © 2017. Published by Elsevier B.V.

  15. CLASSIFICATION OF THREATS OF ECONOMIC SECURITY OF TAJIKISTAN

    Directory of Open Access Journals (Sweden)

    Blinichkina N. Yu.

    2016-06-01

    Full Text Available Ensuring of the state economic security suggests the fight against threats to such security. At the same time it is extremely important, firstly, to understand the essence of a threat to economic security and, secondly, to identify the common characteristics of threats allowing to systematize them and to determine the necessary measures to neutralize them on this basis. The traditional approach offers a classification of economic security threats depending on areas of their origin but it is impossible to determine the gravity of the threat to the economy and ways of neutralizing it.In this context we propose allocation of the economic threats to five groups depends on a number of characteristics that determine the level of their negative impact to the economy. Such classification of threats to economic security of Tajikistan helped to determine neutralization of which of them requires outside support, what requires priority within the framework of the strategy of economic security and national economic policy, and what does not require serious government efforts and may be neutralized automatically during neutralization of the other threats.

  16. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  17. Hildenbrandia rivularis (Rhodophyta in central Poland

    Directory of Open Access Journals (Sweden)

    Joanna Żelazna-Wieczorek

    2011-01-01

    Full Text Available Freshwater red algae Hildenbrandia rivularis has been noted for the first time in central Poland near the Lodz agglomeration. Until now, this alga was recorded only in mountain and Polish Lowland areas. The wide range of habitat conditions influencing the occurrence for this protected species has been determined in the spring niche. The possible threat to habitat where H. rivularis occurs, is connected with construction and exploitation of the A2 highway.

  18. Hildenbrandia rivularis (Rhodophyta) in central Poland

    OpenAIRE

    Joanna Żelazna-Wieczorek; Maciej Ziułkiewicz

    2011-01-01

    Freshwater red algae Hildenbrandia rivularis has been noted for the first time in central Poland near the Lodz agglomeration. Until now, this alga was recorded only in mountain and Polish Lowland areas. The wide range of habitat conditions influencing the occurrence for this protected species has been determined in the spring niche. The possible threat to habitat where H. rivularis occurs, is connected with construction and exploitation of the A2 highway.

  19. Stereotype threat affects financial decision making.

    Science.gov (United States)

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  20. Effects of an invasive plant on a desert sand dune landscape

    Science.gov (United States)

    Barrows, C.W.; Allen, E.B.; Brooks, M.L.; Allen, M.F.

    2009-01-01

    Given the abundance of non-native species invading wildland habitats, managers need to employ informed triage to focus control efforts on weeds with the greatest potential for negative impacts. Our objective here was to determine the level of threat Sahara mustard, Brassica tournefortii, represents to meeting regional goals for protecting biodiversity. Sahara mustard has spread throughout much of the Mojave and lower Sonoran Deserts. It has occurred in southern California's Coachella Valley for nearly 80 years, punctuated by years of extremely high abundance following high rainfall. In those years the mustard has clear negative impacts on the native flora. Using mustard removal experiments we identified reductions in native plant reproduction, shifting composition increasingly toward Sahara mustard while decreasing the fraction of native species. High between-year variance in precipitation may be a key to maintaining biodiversity as the mustard is less abundant in drier years. Sahara mustard impacts to the native fauna were much less evident. Of the animal species evaluated, only the Coachella Valley fringe-toed lizard, Uma inornata, demonstrated a negative response to mustard abundance; however the impacts were short-lived, lasting no more than a year after the mustard's dominance waned. Without control measures the long-term impacts to desert biodiversity may rest on the changing climate. Wetter conditions or increased periodicity of high rainfall years will favor Sahara mustard and result in reduced biodiversity, especially of native annual plants. Drier conditions will keep the mustard from becoming dominant but may have other negative consequences on the native flora and fauna. ?? 2008 Springer Science+Business Media B.V.

  1. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  2. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  3. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  4. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  5. Trapping or tethering stones (TS: A multifunctional device in the Pastoral Neolithic of the Sahara.

    Directory of Open Access Journals (Sweden)

    Marina Gallinaro

    Full Text Available The Pierres de Ben Barour, also known as trapping or tethering stones (TS, are stone artefacts with notches or grooves usually interpreted as hunting devices on the basis of rock art engravings. Though their presence is a peculiar feature of desert landscapes from the Sahara to the Arabian Peninsula, we know little about their age, context and function. Here we present a new approach to the study of these artefacts based on a large dataset (837 items recorded in the Messak plateau (SW Libya. A statistically-based geoarchaeological survey carried out between 2007 and 2011 in Libya, alongside landscape and intra-site analyses of specific archaeological features (such as rock art, settlement and ceremonial contexts, reveal that these artefacts were used for a prolonged period, probably from the early Holocene. This was followed by a multifunctional use of these devices, particularly during the Pastoral Neolithic phase (ca. 6400-3000 cal BC, with the highest concentrations being found near ceremonial contexts related to cattle burials.

  6. Threat Assessment in College Settings

    Science.gov (United States)

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  7. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  8. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  9. An Examination of Age-Based Stereotype Threat About Cognitive Decline.

    Science.gov (United States)

    Barber, Sarah J

    2017-01-01

    "Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.

  10. Nuclear theft and sabotage. Priorities for reducing new threats

    International Nuclear Information System (INIS)

    Bunn, Matthew; Bunn, George

    2001-01-01

    The appalling attacks of 11 September 2001 in the United States make clear that the threat of large, well-organized global terrorist groups bent on causing mass destruction is not hypothetical but real. The attackers achieved horrifying destruction with box-cutters. The results could have been even more horrific if the attackers would have had access to, and used, weapons of mass destruction. Ensuring that technologies and materials for weapons of mass destruction - especially weapons-usable nuclear materials, whose acquisition is the most difficult part of making a nuclear bomb - do not fall into the hands of terrorist groups or hostile States must be a central element of the coming global effort to prevent catastrophic terrorism. At the same time, nuclear facilities and materials - along with a wide range of other especially hazardous facilities and materials must be protected from mass-consequence sabotage. Securing these materials and facilities must be a top priority on the international agenda - pursued at every opportunity, at every level of authority, until the job is done. At the same time, the threats against which we must defend have to be fundamentally reconsidered. On 11 September, the threat revealed itself to be bigger, smarter, better organized, and more deadly than the threats most of the world's security systems were designed to defend against. We must ensure that our defensive response is every bit as intelligent and capable as the September attackers. And we may have to rethink some of the approaches to nuclear energy that the world has been pursuing or contemplating. Every reasonable effort must be made to ensure that nuclear materials and facilities are effectively secured. In the past, many scenarios with enormously high consequences were dismissed as too unlikely to contribute much to overall risk - but now many of these probability estimates will have to be revised. A far-reaching new effort is needed to strengthen security for nuclear

  11. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  12. Kenya : tous les projets | Page 8 | CRDI - Centre de recherches pour ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Région: Americas, Argentina, South America, Asia, India, South and Central Asia, Africa, Kenya, South of Sahara, Mexico, North and Central America, Southern Africa, Global. Programme: Emploi et ... Sujet: DIET, FOOD CROPS, CROP DIVERSIFICATION, MICRONUTRIENTS, BIODIVERSITY. Région: Africa, Benin, South ...

  13. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  14. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  15. Applying the multi-threat framework of stereotype threat in the context of digital gaming

    OpenAIRE

    Pennington, C. R.; Kaye, L. K.; McCann, J. J.

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-targe...

  16. Microbial Threats to Health. Emerging Infections: Microbial Threats to Health in the United States.

    Science.gov (United States)

    1992-10-01

    and HIV in- fection. Although in the United States, HIV infection occurs predominately in male homosexuals and intravenous substance abusers, the rate...Davis. W. A., J. G. Kane, and V. G. Garagusi. 1978. Human Aerononas infections : a review of the literature and a case report of endocarditis ...AD-A257 841 AD____ GRANT NO: DAMD17-90-Z-0047 TITLE: MICROBIAL THREATS TO HEALTH SUBTITLE: REmerging Infections - Microbial Threats to Health in the

  17. GEOCHEMISTRY AND ISOTOPE HYDROLOGY OF AN URBAN AQUIFER, SUBTROPICAL AFRICA, CENTRAL AFRICAN REPUBLIC

    International Nuclear Information System (INIS)

    HUSSEIN, M.F.; ISLAM, A.; GAMAL, S.; GAETAN, M.; DJEBEBE, C.

    2008-01-01

    Africa south of the Great Sahara has abundant water resources, however, its aquifers are seldom studied and/or inadequately managed. This study presents a geochemical and isotope hydrology study on the aquifer of Bangui city, the capital of the Central African Republic (RCA), on the northern borders of Congo with RCA.The obtained chemical data demonstrated the role of biogenic CO 2 gas, solid phases and cation exchange in the hydrochemistry of the studied groundwater. The conjunctive use of the major dissolved constituents and the isotope contents ( 18 O and 2 H) showed that the alteration of primary silicates and the dissolution of carbonates are the predominant processes that locally define the zones of dilute and relatively charged groundwater, respectively.The isotope data illustrated that evaporation is non-significantly contributing to the water loss from the aquifer, while transpiration (process that goes almost without isotopic fractionation) is prevailing in the water balance of the local drainage basin, with a significant fraction of the transpired vapour being recycled. An isotopic i nverse continental effect(eastward from Cameron to RCA) is explained through differences in air temperatures, amount and altitude of precipitation rather than by inverse movement of humid air masses westward in Central Africa

  18. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    Science.gov (United States)

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  19. Hypersonic Threats to the Homeland

    Science.gov (United States)

    2017-03-28

    ADAM) system . This ground based system protects 7 soldiers against rocket threats and utilizes a 10 kW laser with an effective range out to...early warning systems for response to hypersonic threats . The integration of directed energy defensive systems with Space Based Infrared Sensors (SBIRS...and early warning radars already in operation will save costs. By capitalizing on Terminal High Altitude Area Defense (THAAD) system capabilities

  20. Key issues in body armour: threats, materials and design

    OpenAIRE

    Horsfall, Ian

    2012-01-01

    This chapter will examine the mechanics and materials of body armour in military, police and some security related applications to protect the wearer from penetrative threats. These threats will include battlefield threats such as shell fragments and high velocity bullets, and threats to law enforcement personnel such as handgun bullets and knives. Regardless of whether the threat is a high velocity bullet, or a knife, the essential requirements of body armour are the same; first an interacti...

  1. Gender, Stereotype Threat and Mathematics Test Scores

    OpenAIRE

    Ming Tsui; Xiao Y. Xu; Edmond Venator

    2011-01-01

    Problem statement: Stereotype threat has repeatedly been shown to depress womens scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: ...

  2. Kenya : tous les projets | Page 6 | CRDI - Centre de recherches pour ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: Biodiversity, INTELLECTUAL PROPERTY. Région: Asia, China, Far East Asia, India, South ... Région: Americas, Argentina, South America, Asia, India, South and Central Asia, Africa, Kenya, South of Sahara, Mexico, North and Central America, Southern Africa, Global. Programme: Emploi et croissance. Financement ...

  3. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala–BNST connectivity during periods of threat vs safety

    Science.gov (United States)

    Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Abstract Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants’ self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala–BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. PMID:29126127

  4. Stereotype Threat Lowers Older Adults' Self-Reported Hearing Abilities.

    Science.gov (United States)

    Barber, Sarah J; Lee, Soohyoung Rain

    2015-01-01

    Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults' subjective assessments of their own abilities or to the impact of stereotype threat in noncognitive domains. Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adults' subjective hearing abilities. To test this, 115 adults (mean age 50.03 years, range 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40s and early 50s were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50s and 60s rated their hearing as being subjectively worse when under stereotype threat. The current study provides a clear demonstration that stereotype threat negatively impacts older adults' subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype threat-free testing environment and also include assessments of stereotype threat within their studies. © 2015 S. Karger AG, Basel.

  5. Stereotype threat lowers older adults’ self-reported hearing abilities

    Science.gov (United States)

    Barber, Sarah J.; Lee, Soohyoung Rain

    2016-01-01

    Background Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults’ subjective assessments of their own abilities or to the impact of stereotype threat in non-cognitive domains. Objective Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adult's subjective hearing abilities. Methods To test this, 115 adults (M age = 50.02, range = 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. Results The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40's and early 50's were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50's and 60's rated their hearing as being subjectively worse when under stereotype threat. Conclusion The current study provides a clear demonstration that stereotype threat negatively impacts older adults’ subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype-threat free testing environment and also include assessments of stereotype threat within their studies. PMID:26461273

  6. 49 CFR 1546.301 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  7. Holding Norwegian companies accountable: the case of Western Sahara : an exploration of the Norwegian government's approach to dealing with Norwegian companies' complicity in violations of human rights abroad

    OpenAIRE

    Skogsrud, Marte

    2011-01-01

    Morocco illegally occupies the non-self-governing territory of Western Sahara, and they are strategically exploiting the natural resources rightfully belonging to the local Saharawi people. Both of these actions are in violation of international law and fundamental human rights. Norwegian companies have been complicit in Morroco‟s trade in natural resources thereby legitimising the occupation and exploitation in political, legal, moral and economic terms. In this context this thesis invest...

  8. From Threat to Relief: Expressing Prejudice toward Atheists as a Self-Regulatory Strategy Protecting the Religious Orthodox from Threat

    Science.gov (United States)

    Kossowska, Małgorzata; Szwed, Paulina; Czernatowicz-Kukuczka, Aneta; Sekerdej, Maciek; Wyczesany, Miroslaw

    2017-01-01

    We claim that religious orthodoxy is related to prejudice toward groups that violate important values, i.e., atheists. Moreover, we suggest that expressing prejudice may efficiently reduce the threat posed by this particular group among people who hold high levels, but not low levels, of orthodox belief. We tested these assumptions in an experimental study in which, after being exposed to atheistic worldviews (value-threat manipulation), high and low orthodox participants were allowed (experimental condition) or not (control condition) to express prejudice toward atheists. Threat was operationalized by cardiovascular reactivity, i.e., heart rate (HR); the higher the HR index, the higher the threat. The results found that people who hold high (vs. low) levels of orthodox belief responded with increased HR after the threat manipulation. However, we observed decreased HR after the expression of prejudice toward atheists among highly orthodox participants compared to the control condition. We did not find this effect among people holding low levels of orthodox belief. Thus, we conclude that expressing prejudice toward this particular group may be an efficient strategy to cope with the threat posed by this group for highly orthodox people. The results are discussed in light of previous findings on religious beliefs and the self-regulatory function of prejudice. PMID:28611715

  9. Biophysics and the Challenges of Emerging Threats

    CERN Document Server

    Puglisi, Joseph D

    2009-01-01

    This volume is a collection of articles from the proceedings of the International School of Structural Biology and Magnetic Resonance 8th Course: Biophysics and the Challenges of Emerging Threats. This NATO Advance Study Institute (ASI) was held in Erice at the Ettore Majorana Foundation and Centre for Scientific Culture on 19 through 30 June 2007. The ASI brought together a diverse group of experts who bridged the fields of virology and biology, biophysics, chemistry and physics. Prominent lecturers and students from around the world representant a total of 24 countries participated in the NATO ASI organized by Professors Joseph Puglisi (Stanford University, USA) and Alexander Arseniev (Moscow, RU). The central hypothesis underlying this ASI was that interdisciplinary research, merging principles of physics, chemistry and biology, can drive new discovery in detecting and fighting bioterrorism agents, lead to cleaner environments, and help propel development in NATO partner countries. The ASI merged the relat...

  10. The emerging threat of domestic terrorism: a systematic review of evolving needs, threats, and opportunities

    OpenAIRE

    Wright, Lynn M.

    2014-01-01

    Approved for public release; distribution is unlimited The domestic terrorist threat in the United States is active and complex, with ongoing threats from violent left- and right-wing extremist groups, and radicalization and recruitment efforts by international terrorist groups. In response, domestic intelligence agencies, at all levels of government, have instituted reforms and improvements since 9/11, but there are still gaps in information-sharing and community engagement. For example, ...

  11. Work-related fear and the threats of fear among emergency department nursing staff and physicians in Finland.

    Science.gov (United States)

    Mikkola, Riitta; Huhtala, Heini; Paavilainen, Eija

    2017-10-01

    To describe fear, the threats causing fear and the occurrence of fear among emergency department nursing staff and physicians. The emergency department is a challenging workplace where the staff is often confronted by factors that cause fear. A cross-sectional study. A survey was conducted in 16 hospitals (n = 544). Nurses, practical nurses, orderlies and physicians from those hospitals participated in the survey. The survey questionnaire was based on the analysis of interviews of 30 nurses from one university hospital and one central hospital. The results of the interviews were analysed using the inductive content analysis method. The analysis of the survey was performed using statistical methods, such as frequencies, cross-tabulation and principal component analysis. The results showed that nearly all of the emergency department personnel had experienced work-related fear. Generally, the fear had been momentary. According to the survey results, fear was most often caused by medication errors, the resuscitation of a child, a catastrophic accident, urgent or violent situations or patients armed with weapons. Threats that caused fear included insecurity, danger in the work environment, threat of loss of one's health and threat of the consequences of one's mistakes and actions. The staff of emergency departments often encountered factors or situations that caused fear. The main threats causing fear that were raised by the respondents were insecurity and danger in the work environment. The data obtained from this study can be utilised in identifying and describing work-related fear and threats of fear among emergency department nursing staff and physicians. Based on the information herein, it will be possible to develop methods to prevent situations that cause fear in emergency departments. © 2016 John Wiley & Sons Ltd.

  12. All projects related to india | Page 18 | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Topic: ECONOMIC REFORM, TRADE LIBERALIZATION, ECONOMIC LEGISLATION, SOCIAL ... Program: Employment and Growth ... Region: Argentina, South America, India, Kenya, Mexico, North and Central America, North of Sahara, South ...

  13. Meteorological and dust aerosol conditions over the western Saharan region observed at Fennec Supersite-2 during the intensive observation period in June 2011

    Science.gov (United States)

    Todd, M. C.; Allen, C. J. T.; Bart, M.; Bechir, M.; Bentefouet, J.; Brooks, B. J.; Cavazos-Guerra, C.; Clovis, T.; Deyane, S.; Dieh, M.; Engelstaedter, S.; Flamant, C.; Garcia-Carreras, L.; Gandega, A.; Gascoyne, M.; Hobby, M.; Kocha, C.; Lavaysse, C.; Marsham, J. H.; Martins, J. V.; McQuaid, J. B.; Ngamini, J. B.; Parker, D. J.; Podvin, T.; Rocha-Lima, A.; Traore, S.; Wang, Y.; Washington, R.

    2013-08-01

    The climate of the Sahara is relatively poorly observed and understood, leading to errors in forecast model simulations. We describe observations from the Fennec Supersite-2 (SS2) at Zouerate, Mauritania during the June 2011 Fennec Intensive Observation Period. These provide an improved basis for understanding and evaluating processes, models, and remote sensing. Conditions during June 2011 show a marked distinction between: (i) a "Maritime phase" during the early part of the month when the western sector of the Sahara experienced cool northwesterly maritime flow throughout the lower troposphere with shallow daytime boundary layers, very little dust uplift/transport or cloud cover. (ii) A subsequent "heat low" phase which coincided with a marked and rapid westward shift in the Saharan heat low towards its mid-summer climatological position and advection of a deep hot, dusty air layer from the central Sahara (the "Saharan residual layer"). This transition affected the entire western-central Sahara. Dust advected over SS2 was primarily from episodic low-level jet (LLJ)-generated emission in the northeasterly flow around surface troughs. Unlike Fennec SS1, SS2 does not often experience cold pools from moist convection and associated dust emissions. The diurnal evolution at SS2 is strongly influenced by the Atlantic inflow (AI), a northwesterly flow of shallow, cool and moist air propagating overnight from coastal West Africa to reach SS2 in the early hours. The AI cools and moistens the western Saharan and weakens the nocturnal LLJ, limiting its dust-raising potential. We quantify the ventilation and moistening of the western flank of the Sahara by (i) the large-scale flow and (ii) the regular nocturnal AI and LLJ mesoscale processes.

  14. Digital Threat and Vulnerability Management: The SVIDT Method

    Directory of Open Access Journals (Sweden)

    Roland W. Scholz

    2017-04-01

    Full Text Available The Digital Revolution is inducing major threats to many types of human systems. We present the SVIDT method (a Strengths, Vulnerability, and Intervention Assessment related to Digital Threats for managing the vulnerabilities of human systems with respect to digital threats and changes. The method first performs a multilevel system–actor analysis for assessing vulnerabilities and strengths with respect to digital threats. Then, the method identifies threat scenarios that may become real. By constructing, evaluating, and launching interventions against all identified digital threats and their critical negative outcomes, the resilience of a specific human system can be improved. The evaluation of interventions is done when strengthening the adaptive capacity, i.e., a system’s capability to cope with negative outcomes that may take place in the future. The SVIDT method is embedded in the framework of coupled human–environment systems, the theory of risk and vulnerability assessment, types of adaptation (assimilation vs. accommodation, and a comprehensive sustainability evaluation. The SVIDT method is exemplarily applied to an enterprise (i.e., a Swiss casino for which online gaming has become an essential digital-business field. The discussion reflects on the specifics of digital threats and discusses both the potential benefits and limitations of the SVIDT method.

  15. HIV/AIDS in the transitional countries of Eastern Europe and Central Asia

    DEFF Research Database (Denmark)

    Donoghoe, Martin C; Lazarus, Jeff; Matic, Srdan

    2005-01-01

    In the 1990s, HIV/AIDS became a major threat to health, economic stability and human development in countries in eastern Europe and central Asia. Social, political and economic transition exacerbated the structural conditions that allowed HIV/AIDS to flourish as dramatic changes led to increasing...

  16. Paleoclimatic variations in Maknassy Basin (central Tunisia) during the Holocene period using multidisciplinary approaches

    International Nuclear Information System (INIS)

    Zouari, K.; Chkir, N.; Ouda, B.

    2002-01-01

    The signature of humid climatic episodes in the Holocene paleoclimatic history of Tunisia are evident in outcroppings along riverbanks almost all over the Tunisian drainage network. Previous multidisciplinary studies have already identified some sites where these remnants can contribute valuable information for reconstruction of paleoenvironmental and paleoclimatic variations in the presently hyper-arid zone of the Northern Sahara. Sedimentary deposits outcropping on Wadi Leben and Wadi Ben Sellam banks, in the Maknassy Basin (Central Tunisia), have been sampled. Multidisciplinary studies, including prehistory, sedimentology, mineralogy, ecology and radiochronology have been conducted to improve palaeoenvironmental interpretations and to determine a precise chronological history of humid episodes during the Holocene in Tunisia. This paper deals with the interpretation of results obtained from the Maknassy Basin in comparison with some other Tunisian sites in order to highlight Holocene humid episodes. Establishment of a precise chronological framework is prerequisite to exploring potential relationships between the occurrence of humid phases and recharge of aquifers located in this area. (author)

  17. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala-BNST connectivity during periods of threat vs safety.

    Science.gov (United States)

    Pedersen, Walker S; Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants' self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala-BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. © The Author (2017). Published by Oxford University Press.

  18. Study methods for borings carried out near the underground nuclear experiments in the Sahara. Part 2. techniques for studying the walls of the bore-holes

    International Nuclear Information System (INIS)

    Faure, J.

    1969-01-01

    Measurements by drilling have been carried out during the underground nuclear bomb explosions on the Sahara test site: observation of the rock by television and permeability measurements. After a presentation of the principle of the experiment, a description is given of the technique used, i.l. the equipment and its manipulation. Finally problems arising from the interpretation of the results are considered. The conclusion stresses the importance of the results of this work from the point of view of possible industrial applications. (author) [fr

  19. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  20. Study methods for the drillings around the underground nuclear explosions in the Sahara. Part 1. study of rock samples; Methodes d'etude des forages realises autour des explosions nucleaires souterraines au Sahara. Premiere partie: etude des echantillons de roche

    Energy Technology Data Exchange (ETDEWEB)

    Derlich, S [Commissariat a l' Energie Atomique, Bruyers-le-Chatel (France). Centre d' Etudes

    1969-07-01

    An examination of the mechanical effects produced on rocks by an underground nuclear explosion calls for the use of particular means of exploration which are described in this report, special attention being paid to the equipment used in connection with the French nuclear tests in the Sahara. The drilling methods used (rotary and turbo-drilling) are adapted to the particular conditions of the sampling programme, to the radioactivity and to the temperature in the region of the explosion. A study of the samples makes it possible to obtain the new characteristics of the rock and to assess the chemical and mechanical transformations which it has undergone. An examination of the core obtained from the drilling, together with a knowledge of the drilling parameters (depth of the probe, sample recovery, etc...), makes it possible to study the extent and the characteristics of the zones which have been damaged to different degrees according to their distance from the zero point: cavity, strongly powdered zone, fractured zone, chimney, zones containing high stresses leading to a particular type of fracture of the cores. The problems connected with the interpretation of the results are also presented. (author) [French] L'examen des effets mecaniques provoques par une explosion nucleaire souterraine sur la roche necessite la mise en oeuvre de moyens d'exploration particuliers dont l'expose fait l'objet de ce rapport, essentiellement pour les moyens utilises autour des essais nucleaires francais au Sahara. Les methodes de forage (rotary et turboforage) sont adaptees aux conditions particulieres dues au programme d'echantillonnage, a la radioactivite et a la temperature regnant a proximite du point de tir. L'etude des echantillons permet la determination des nouveaux caracteres de la roche et de ses transformations chimique et mecanique. L'examen des carottes et l'utilisation des parametres de forage (cotes sondeurs, recuperation des echantillons, etc...) permettent d'etudier l

  1. Affirmative Action and Stereotype Threat

    OpenAIRE

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  2. Temperature profiles from STD casts from the Spanish Sahara from NOAA Ship OCEANOGRAPHER as part of the International Decade of Ocean Exploration / Coastal Upwelling Ecosystems Analysis (IDOE/CUEA) from 1974-03-08 to 1974-05-01 (NODC Accession 9800112)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Temperature profiles were collected from STD casts off the Spanish Sahara from NOAA Ship OCEANOGRAPHER from 08 March 1974 to 01 May 1974. Data were collected by the...

  3. Penerapan Business Continuity Pada Bank Central Asia

    OpenAIRE

    Chandra, Keefe Darius

    2017-01-01

    Banks are financial institutions that have a major impact on the economic system and can affect people's lives. Hence, regulators concerned in organizing business continuity of the banking industries. PT. Bank Central Asia, Tbk. (BCA) represents businesses in the banking sector that can not escape from the natural and man threats which can interfere the bank's business. This case study presents a glimpse of how the business continuity run in BCA. Moreover, business continuity in banking can n...

  4. Dental indicators of adaptation in the Sahara Desert during the Late Holocene.

    Science.gov (United States)

    Nikita, E; Mattingly, D; Lahr, M M

    2014-10-01

    The present paper examines dental diseases and linear enamel hypoplasia among the Garamantes, a Late Holocene Saharan population, and aims to draw conclusions about nutrition and adaptation to a hyper-arid environment. Archaeological evidence suggests that the Garamantian diet included animal protein and local, Mediterranean and Near Eastern plants. Moreoever, although the Garamantes had developed urban centres, the size of these was not large enough to allow for particularly unhygienic conditions to appear. The above archaeological findings were partly corroborated by the current bioarchaeological study. At an intra-population level, the Garamantes showed limited sex differences in dental disease prevalence, while all dental conditions increased in frequency with age, as expected. At an inter-population level, the frequency of all dental conditions was comparable to that found among other North African groups, with the exception of ante-mortem tooth loss. The low frequency of most dental conditions is an indication that the Garamantian diet was overall balanced, while the high frequency of ante-mortem tooth loss may be related to factors such as oral hygiene, food preparation or eating mode, which cannot be controlled for osteologically. Finally, the low frequency of enamel hypoplasia suggests either that the Sahara did not inflict particular stresses on the population, or, more likely, that the Garamantes had developed effective mechanisms for coping with their natural environment. Copyright © 2014 Elsevier GmbH. All rights reserved.

  5. Groundwater Flow Computed with Modflow and Isotopic Age Tracer Data in the Continental Intercalaire (Sahara)

    Energy Technology Data Exchange (ETDEWEB)

    Petersen, J. O.; Goncalves, J.; Deschamps, P.; Hamelin, B. [Centre Europeen de Recherche et d' Enseignement de Geosciences de l' Environnement, Aix-en-Provence (France); Zouari, K. [Laboratoire de Radio-Analyses et Environnement, Sfax (Tunisia); Guendouz, A. [University of Blida, Science Engineering Faculty, Soummaa Blida (Algeria); Michelot, J. -L. [Interactions et Dynamique des Environnements de Surface, Universite Paris-Sud, Orsay (France)

    2013-07-15

    In one of the largest confined aquifers of the world, the Continental Intercalaire (Sahara), which is located in an arid region (57 mm/y of mean of precipitation), groundwater flow patterns are rather complex. Coupling measurements of isotopic composition of water and age mass calculations obtained by numerical simulations can allow, to a greater extent than a simple comparison, to constrain and validate the recharge scenario, transport and age of groundwater. First, the multiple tracers {sup 14}C, {sup 36}Cl, or {sup 234}U/{sup 238}U used in this study including noble gases such as {sup 4}He, allow investigation of a large range of groundwater ages. Then a MODFLOW simulation is built using (i) the distribution of hydrological parameters, (ii) geometrical limits and iii) the concept of age mass of water, accounting for the tracers data. This approach improves the understanding of the hydrodynamics of this system. In particular, the mixing of old and young waters should be better constrained and the interpretation of paleohydrological conditions is permitted. (author)

  6. SHUTTLE IMAGING RADAR: PHYSICAL CONTROLS ON SIGNAL PENETRATION AND SUBSURFACE SCATTERING IN THE EASTERN SAHARA.

    Science.gov (United States)

    Schaber, Gerald G.; McCauley, John F.; Breed, Carol S.; Olhoeft, Gary R.

    1986-01-01

    It is found that the Shuttle Imaging Radar A (SIR-A) signal penetration and subsurface backscatter within the upper meter or so of the sediment blanket in the Eastern Sahara of southern Egypt and northern Sudan are enhanced both by radar sensor parameters and by the physical and chemical characteristics of eolian and alluvial materials. The near-surface stratigraphy, the electrical properties of materials, and the types of radar interfaces found to be responsible for different classes of SIR-A tonal response are summarized. The dominant factors related to efficient microwave signal penetration into the sediment blanket include 1) favorable distribution of particle sizes, 2) extremely low moisture content and 3) reduced geometric scattering at the SIR-A frequency (1. 3 GHz). The depth of signal penetration that results in a recorded backscatter, called radar imaging depth, was documented in the field to be a maximum of 1. 5 m, or 0. 25 times the calculated skin depth, for the sediment blanket. The radar imaging depth is estimated to be between 2 and 3 m for active sand dune materials.

  7. Stereotype Threat Alters the Subjective Experience of Memory.

    Science.gov (United States)

    Mazerolle, Marie; Régner, Isabelle; Rigalleau, François; Huguet, Pascal

    2015-01-01

    There is now evidence that negative age-related stereotypes about memory reduce older adults' memory performance, and inflate age differences in this domain. Here, we examine whether stereotype threat may also influence the basic feeling that one is more or less able to remember. Using the Remember/Know paradigm, we demonstrated that stereotype threat conducted older adults to a greater feeling of familiarity with events, while failing to retrieve any contextual detail. This finding indicates that stereotype threat alters older adults' subjective experience of memory, and strengthens our understanding of the mechanisms underlying stereotype threat effects.

  8. Monitoring System with Two Central Facilities Protocol

    Directory of Open Access Journals (Sweden)

    Caesar Firdaus

    2017-03-01

    Full Text Available The security of data and information on government’s information system required proper way of defending against threat. Security aspect can be achieved by using cryptography algorithm, applying information hiding concept, and implementing security protocol. In this research, two central facilities protocol was implemented on Research and Development Center of Mineral and Coal Technology’s Cooperation Contract Monitoring System by utilizing AES and whitespace manipulation algorithm. Adjustment on the protocol by creating several rule of validation ID’s generation and checking processes could fulfill two of four cryptography objectives, consist of authentication and non-repudiation. The solid collaboration between central legitimization agency (CLA, central tabulating facility (CTF, and client is the main idea in two central facilities protocol. The utilization of AES algorithm could defend the data on transmission from man in the middle attack scenario. On the other hand, whitespace manipulation algorithm provided data integrity aspect of the document that is uploaded to the system itself. Both of the algorithm fulfill confidentiality, data integrity, and authentication.

  9. Eastern forest environmental threat assessment center

    Science.gov (United States)

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  10. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  11. Bomb Threats and Bomb Search Techniques.

    Science.gov (United States)

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  12. Self-Construal Priming Modulates Self-Evaluation under Social Threat

    Directory of Open Access Journals (Sweden)

    Tianyang Zhang

    2017-10-01

    Full Text Available Previous studies have shown that Westerners evaluate themselves in an especially flattering way when faced with a social-evaluative threat. The current study first investigated whether East Asians also have a similar pattern by recruiting Chinese participants and using social-evaluative threat manipulations in which participants perform self-evaluation tasks while adopting different social-evaluative feedbacks (Experiment 1. Then further examined whether the different response patterns can be modulated by different types of self-construal by using social-evaluative threat manipulations in conjunction with a self-construal priming task (Experiment 2. The results showed that, as opposed to Westerners' pattern, Chinese participants rated themselves as having significantly greater above-average effect only when faced with the nonthreatening feedback but not the social-evaluative threat. More importantly, we found that self-construal modulated the self-evaluation under social-evaluative threat: following independent self-construal priming, participants tended to show a greater above-average effect when faced with a social-evaluative threat. However, this pattern in conjunction with a social threat disappeared after participants received interdependent self-construal priming or neutral priming. These findings suggest that the effects of social-evaluative threat on self-evaluation are not culturally universal and is strongly modulated by self-construal priming.

  13. School Shooting : Threat Detection and Classification in Textual Leakage

    OpenAIRE

    Khan, Ajmal

    2013-01-01

    The continual occurrence of school shooting incidents underscores the need of taking preventive measures. Inductive measures of threat assessment have proved to be a bad strategy to solve the problem and new research is focusing on deductive approaches. Deductive threat assessment approaches are gaining ground and efforts are underway to mine text for automatic detection of threats in written text. Automatic detection and classification of threats in the digital world can help the decision ma...

  14. Modeling and simulation of botnet based cyber-threats

    Directory of Open Access Journals (Sweden)

    Kasprzyk Rafał

    2017-01-01

    Full Text Available The paper presents an analysis of cyber-threats, with particular emphasis on the threats resulting from botnet activity. Botnets are the most common types of threats and often perceived as crucial in terms of national security. Their classification and methods of spreading are the basis for creating cyberspace model including the presence of different types of cyber-threats. A well-designed cyberspace model enables to construct an experimental environment that allows for the analysis of botnet characteristics, testing its resistance to various events and simulation of the spread and evolution. For this purpose, dedicated platforms with capabilities and functional characteristics to meet these requirements have been proposed.

  15. Distance Measurement Methods for Improved Insider Threat Detection

    Directory of Open Access Journals (Sweden)

    Owen Lo

    2018-01-01

    Full Text Available Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can provide a solution, but these methods often fail to take into account changes of behaviour of users. This work builds on a published method of detecting insider threats and applies Hidden Markov method on a CERT data set (CERT r4.2 and analyses a number of distance vector methods (Damerau–Levenshtein Distance, Cosine Distance, and Jaccard Distance in order to detect changes of behaviour, which are shown to have success in determining different insider threats.

  16. The opportunity-threat theory of decision-making under risk

    OpenAIRE

    Mohan Pandey

    2018-01-01

    A new theory of decision-making under risk, the Opportunity-Threat Theory is proposed. Analysis of risk into opportunity and threat components allows description of behavior as a combination of opportunity seeking and threat aversion. Expected utility is a special case of this model. The final evaluation is an integration of the impacts of opportunity and threat with this expectation. The model can account for basic results as well as several ``new paradoxes'' that refuted c...

  17. Pervasive competition between threat and reward in the brain.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Spechler, Philip; Pessoa, Luiz

    2014-06-01

    In the current functional MRI study, we investigated interactions between reward and threat processing. Visual cues at the start of each trial informed participants about the chance of winning monetary reward and/or receiving a mild aversive shock. We tested two competing hypothesis: according to the 'salience hypothesis', in the condition involving both reward and threat, enhanced activation would be observed because of increased salience; according to the 'competition hypothesis', the processing of reward and threat would trade-off against each other, leading to reduced activation. Analysis of skin conductance data during a delay phase revealed an interaction between reward and threat processing, such that the effect of reward was reduced during threat and the effect of threat was reduced during reward. Analysis of imaging data during the same task phase revealed interactions between reward and threat processing in several regions, including the midbrain/ventral tegmental area, caudate, putamen, bed nucleus of the stria terminalis, anterior insula, middle frontal gyrus and dorsal anterior cingulate cortex. Taken together, our findings reveal conditions during which reward and threat trade-off against each other across multiple sites. Such interactions are suggestive of competitive processes and may reflect the organization of opponent systems in the brain. © The Author (2013). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  18. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    Science.gov (United States)

    Pennington, Charlotte R; Kaye, Linda K; McCann, Joseph J

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group's ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  19. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    Directory of Open Access Journals (Sweden)

    Charlotte R Pennington

    Full Text Available Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target or gender group's ability (group-as-target or would be non-diagnostic of gaming ability (control. In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source or males (out-group source, or would be non-diagnostic of ability (control. Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  20. Stereotype threat in salary negotiations is mediated by reservation salary.

    Science.gov (United States)

    Tellhed, Una; Björklund, Fredrik

    2011-04-01

    Women are stereotypically perceived as worse negotiators than men, which may make them ask for less salary than men when under stereotype threat (Kray et al., 2001). However, the mechanisms of stereotype threat are not yet properly understood. The current study investigated whether stereotype threat effects in salary negotiations can be explained by motivational factors. A total of 116 business students negotiated salary with a confederate and were either told that this was diagnostic of negotiating ability (threat manipulation) or not. Measures of minimum (reservation) and ideal (aspiration) salary goals and regulatory focus were collected. The finding (Kray et al., 2001) that women make lower salary requests than men when under stereotype threat was replicated. Women in the threat condition further reported lower aspiration salary, marginally significantly lower reservation salary and less eagerness/more vigilance than men. Reservation salary mediated the stereotype threat effect, and there was a trend for regulatory focus to mediate the effect. Thus, reservation salary partly explains why women ask for less salary than men under stereotype threat. Female negotiators may benefit from learning that stereotype threat causes sex-differences in motivation. © 2010 The Authors. Scandinavian Journal of Psychology © 2010 The Scandinavian Psychological Associations.

  1. Insider threat to secure facilities: data analysis

    International Nuclear Information System (INIS)

    1980-01-01

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs

  2. A combined emitter threat assessment method based on ICW-RCM

    Science.gov (United States)

    Zhang, Ying; Wang, Hongwei; Guo, Xiaotao; Wang, Yubing

    2017-08-01

    Considering that the tradition al emitter threat assessment methods are difficult to intuitively reflect the degree of target threaten and the deficiency of real-time and complexity, on the basis of radar chart method(RCM), an algorithm of emitter combined threat assessment based on ICW-RCM (improved combination weighting method, ICW) is proposed. The coarse sorting is integrated with fine sorting in emitter combined threat assessment, sequencing the emitter threat level roughly accordance to radar operation mode, and reducing task priority of the low-threat emitter; On the basis of ICW-RCM, sequencing the same radar operation mode emitter roughly, finally, obtain the results of emitter threat assessment through coarse and fine sorting. Simulation analyses show the correctness and effectiveness of this algorithm. Comparing with classical method of emitter threat assessment based on CW-RCM, the algorithm is visual in image and can work quickly with lower complexity.

  3. Résultats de recherche | Page 437 | CRDI - Centre de recherches ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Glossaire. Glossaire Fichier de données XML conforme à la norme de l'IITA. Rapports. CENTRAL AFRICA Poverty alleviation ECONOMIC ASPECTS AFRICA SOUTH OF SAHARA SOCIAL SCIENCES POLICY MAKING WEST AFRICA ...

  4. Résultats de recherche | Page 435 | CRDI - Centre de recherches ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Glossaire. Glossaire Fichier de données XML conforme à la norme de l'IITA. Rapports. CENTRAL AFRICA Poverty alleviation ECONOMIC ASPECTS AFRICA SOUTH OF SAHARA SOCIAL SCIENCES POLICY MAKING WEST AFRICA ...

  5. Résultats de recherche | Page 433 | CRDI - Centre de recherches ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Glossaire. Glossaire Fichier de données XML conforme à la norme de l'IITA. Rapports. CENTRAL AFRICA Poverty alleviation ECONOMIC ASPECTS AFRICA SOUTH OF SAHARA SOCIAL SCIENCES POLICY MAKING WEST AFRICA ...

  6. Left-Wing Extremism: The Current Threat

    Energy Technology Data Exchange (ETDEWEB)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  7. Emerging and Future Cyber Threats to Critical Systems

    OpenAIRE

    Djambazova , Edita; Almgren , Magnus; Dimitrov , Kiril; Jonsson , Erland

    2010-01-01

    Part 2: Adversaries; International audience; This paper discusses the emerging and future cyber threats to critical systems identified during the EU/FP7 project ICT-FORWARD. Threats were identified after extensive discussions with both domain experts and IT security professionals from academia, industry, and government organizations. The ultimate goal of the work was to identify the areas in which cyber threats could occur and cause serious and undesirable consequences, based on the character...

  8. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  9. Advanced Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  10. Implicit self-esteem compensation: automatic threat defense.

    Science.gov (United States)

    Rudman, Laurie A; Dohn, Matthew C; Fairchild, Kimberly

    2007-11-01

    Four experiments demonstrated implicit self-esteem compensation (ISEC) in response to threats involving gender identity (Experiment 1), implicit racism (Experiment 2), and social rejection (Experiments 3-4). Under conditions in which people might be expected to suffer a blow to self-worth, they instead showed high scores on 2 implicit self-esteem measures. There was no comparable effect on explicit self-esteem. However, ISEC was eliminated following self-affirmation (Experiment 3). Furthermore, threat manipulations increased automatic intergroup bias, but ISEC mediated these relationships (Experiments 2-3). Thus, a process that serves as damage control for the self may have negative social consequences. Finally, pretest anxiety mediated the relationship between threat and ISEC (Experiment 3), whereas ISEC negatively predicted anxiety among high-threat participants (Experiment 4), suggesting that ISEC may function to regulate anxiety. The implications of these findings for automatic emotion regulation, intergroup bias, and implicit self-esteem measures are discussed. (c) 2007 APA, all rights reserved.

  11. Multinational tagging efforts illustrate regional scale of distribution and threats for east pacific green turtles (Chelonia mydas agassizii).

    Science.gov (United States)

    Hart, Catherine E; Blanco, Gabriela S; Coyne, Michael S; Delgado-Trejo, Carlos; Godley, Brendan J; Jones, T Todd; Resendiz, Antonio; Seminoff, Jeffrey A; Witt, Matthew J; Nichols, Wallace J

    2015-01-01

    To further describe movement patterns and distribution of East Pacific green turtles (Chelonia mydas agassizii) and to determine threat levels for this species within the Eastern Pacific. In order to do this we combined published data from existing flipper tagging and early satellite tracking studies with data from an additional 12 satellite tracked green turtles (1996-2006). Three of these were tracked from their foraging grounds in the Gulf of California along the east coast of the Baja California peninsula to their breeding grounds in Michoacán (1337-2928 km). In addition, three post-nesting females were satellite tracked from Colola beach, Michoacán to their foraging grounds in southern Mexico and Central America (941.3-3020 km). A further six turtles were tracked in the Gulf of California within their foraging grounds giving insights into the scale of ranging behaviour. Turtles undertaking long-distance migrations showed a tendency to follow the coastline. Turtles tracked within foraging grounds showed that foraging individuals typically ranged up to 691.6 km (maximum) from release site location. Additionally, we carried out threat analysis (using the cumulative global human impact in the Eastern Pacific) clustering pre-existing satellite tracking studies from Galapagos, Costa Rica, and data obtained from this study; this indicated that turtles foraging and nesting in Central American waters are subject to the highest anthropogenic impact. Considering that turtles from all three rookeries were found to migrate towards Central America, it is highly important to implement conservation plans in Central American coastal areas to ensure the survival of the remaining green turtles in the Eastern Pacific. Finally, by combining satellite tracking data from this and previous studies, and data of tag returns we created the best available distributional patterns for this particular sea turtle species, which emphasized that conservation measures in key areas may have

  12. Stereotype threat can both enhance and impair older adults' memory.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-12-01

    Negative stereotypes about aging can impair older adults' memory via stereotype threat; however, the mechanisms underlying this phenomenon are unclear. In two experiments, we tested competing predictions derived from two theoretical accounts of stereotype threat: executive-control interference and regulatory fit. Older adults completed a working memory test either under stereotype threat about age-related memory declines or not under such threat. Monetary incentives were manipulated such that recall led to gains or forgetting led to losses. The executive-control-interference account predicts that stereotype threat decreases the availability of executive-control resources and hence should impair working memory performance. The regulatory-fit account predicts that threat induces a prevention focus, which should impair performance when gains are emphasized but improve performance when losses are emphasized. Results were consistent only with the regulatory-fit account. Although stereotype threat significantly impaired older adults' working memory performance when remembering led to gains, it significantly improved performance when forgetting led to losses.

  13. The consequences of chronic stereotype threat: domain disidentification and abandonment.

    Science.gov (United States)

    Woodcock, Anna; Hernandez, Paul R; Estrada, Mica; Schultz, P Wesley

    2012-10-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s "leak" from each juncture of the academic scientific pipeline in disproportionately greater numbers than their White and Asian counterparts. Using structural equation modeling, we tested the stereotype threat-disidentification hypothesis across 3 academic years with a national longitudinal panel of undergraduate minority science students. Experience of stereotype threat was associated with scientific disidentification, which in turn predicted a significant decline in the intention to pursue a scientific career. Race/ethnicity moderated this effect, whereby the effect was evident for Hispanic/Latino(a) students but not for all African American students. We discuss findings in terms of understanding chronic stereotype threat.

  14. 41 CFR 60-741.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... individual or others in the workplace. (See § 60-741.2(y) defining direct threat.) ...

  15. Threat evaluation for impact assessment in situation analysis systems

    Science.gov (United States)

    Roy, Jean; Paradis, Stephane; Allouche, Mohamad

    2002-07-01

    Situation analysis is defined as a process, the examination of a situation, its elements, and their relations, to provide and maintain a product, i.e., a state of situation awareness, for the decision maker. Data fusion is a key enabler to meeting the demanding requirements of military situation analysis support systems. According to the data fusion model maintained by the Joint Directors of Laboratories' Data Fusion Group, impact assessment estimates the effects on situations of planned or estimated/predicted actions by the participants, including interactions between action plans of multiple players. In this framework, the appraisal of actual or potential threats is a necessary capability for impact assessment. This paper reviews and discusses in details the fundamental concepts of threat analysis. In particular, threat analysis generally attempts to compute some threat value, for the individual tracks, that estimates the degree of severity with which engagement events will potentially occur. Presenting relevant tracks to the decision maker in some threat list, sorted from the most threatening to the least, is clearly in-line with the cognitive demands associated with threat evaluation. A key parameter in many threat value evaluation techniques is the Closest Point of Approach (CPA). Along this line of thought, threatening tracks are often prioritized based upon which ones will reach their CPA first. Hence, the Time-to-CPA (TCPA), i.e., the time it will take for a track to reach its CPA, is also a key factor. Unfortunately, a typical assumption for the computation of the CPA/TCPA parameters is that the track velocity will remain constant. When a track is maneuvering, the CPA/TCPA values will change accordingly. These changes will in turn impact the threat value computations and, ultimately, the resulting threat list. This is clearly undesirable from a command decision-making perspective. In this regard, the paper briefly discusses threat value stabilization

  16. What we do | Page 171 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... Health, Livelihoods and Sustainable Production Systems (Sub-Saharan Africa) ... North And Central America, Panama, Peru, South America, North Of Sahara, ... IDRC supported the development and testing of a reliable and cost-efficient ...

  17. Identifying key conservation threats to Alpine birds through expert knowledge

    Science.gov (United States)

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  18. Identifying key conservation threats to Alpine birds through expert knowledge

    Directory of Open Access Journals (Sweden)

    Dan E. Chamberlain

    2016-02-01

    Full Text Available Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds. For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community.

  19. Actinopolyspora biskrensis sp. nov., a novel halophilic actinomycete isolated from Northern Sahara.

    Science.gov (United States)

    Saker, Rafika; Bouras, Noureddine; Meklat, Atika; Zitouni, Abdelghani; Schumann, Peter; Spröer, Cathrin; Klenk, Hans-Peter; Sabaou, Nasserdine

    2015-03-01

    A novel halophilic, filamentous actinomycete, designated H254(T), was isolated from a Saharan soil sample collected from Biskra (Northern Sahara), and subjected to a polyphasic taxonomic characterization. The strain is Gram-positive, aerobic, and halophilic, and the optimum NaCl concentration for growth is 15-20 % (w/v). The cell-wall hydrolysate contained meso-diaminopimelic acid, and the diagnostic whole-cell sugars were arabinose and galactose. The diagnostic phospholipid detected was phosphatidylcholine, and MK-9(H4) was the predominant menaquinone. The major fatty acid profiles were anteiso-C17:0 (32.8 %), C15:0 (28 %), and iso-C17:0 (12.3 %). Comparative analysis of the 16S rRNA gene sequences revealed that the strain H254(T) formed a well-separated sub-branch within the radiation of the genus Actinopolyspora, and the microorganism was most closely related to Actinopolyspora saharensis DSM 45459(T) (99.2 %), Actinopolyspora halophila DSM 43834(T) (99.1 %), and Actinopolyspora algeriensis DSM 45476(T) (99.0 %). Nevertheless, the strain had relatively lower mean values for DNA-DNA relatedness with the above strains (57.2, 68.4, and 45.6 %, respectively). Based on phenotypic features and phylogenetic position, we propose that strain H254(T) represents a novel species of the genus Actinopolyspora, for which the name Actinopolyspora biskrensis sp. nov. is proposed. The type strain of A. biskrensis is strain H254(T) (=DSM 46684(T) =CECT 8576(T)).

  20. Threat ≠ prevention, challenge ≠ promotion: the impact of threat, challenge and regulatory focus on attention to negative stimuli.

    Science.gov (United States)

    Sassenberg, Kai; Sassenrath, Claudia; Fetterman, Adam K

    2015-01-01

    The purpose of the current experiment was to distinguish between the impact of strategic and affective forms of gain- and loss-related motivational states on the attention to negative stimuli. On the basis of the counter-regulation principle and regulatory focus theory, we predicted that individuals would attend more to negative than to neutral stimuli in a prevention focus and when experiencing challenge, but not in a promotion focus and under threat. In one experiment (N = 88) promotion, prevention, threat, or challenge states were activated through a memory task, and a subsequent dot probe task was administered. As predicted, those in the prevention focus and challenge conditions had an attentional bias towards negative words, but those in promotion and threat conditions did not. These findings provide support for the idea that strategic mindsets (e.g., regulatory focus) and hot emotional states (e.g., threat vs. challenge) differently affect the processing of affective stimuli.

  1. Publications | Page 74 | IDRC - International Development Research ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Results 731 - 740 of 6335 ... Any -, Central Asia, Europe, Far East Asia, Middle East, North and Central America, North of Sahara ... Improving Nutrition in Ethiopia through Plant Breeding and Soil ... Sub-Saharan Africa, Asia and Latin America; final joint technical report ... A total of 129 dairy goats belonging to 108 farmers were ...

  2. Role of editors and journals in detecting and preventing scientific misconduct: strengths, weaknesses, opportunities, and threats.

    Science.gov (United States)

    Marusic, Ana; Katavic, Vedran; Marusic, Matko

    2007-09-01

    Scientific journals have a central place in protecting research integrity because published articles are the most visible documentation of research. We used SWOT analysis to audit (S)trengths and (W)eaknesses as internal and (O)pportunities and (T)hreats as external factors affecting journals' responsibility in addressing research integrity issues. Strengths include editorial independence, authority and expertise, power to formulate editorial policies, and responsibility for the integrity of published records. Weaknesses stem from having no mandate for legal action, reluctance to get involved, and lack of training. Opportunities for editors are new technologies for detecting misconduct, policies by editorial organization or national institutions, and greater transparency of published research. Editors face threats from the lack of legal regulation and culture of research integrity in academic communities, lack of support from stakeholders in scientific publishing, and different pressures. Journal editors cannot be the policing force of the scientific community but they should actively ensure the integrity of the scientific record.

  3. Occurrence of fluororichterite and fluorian biotite in the In Tifar trachyte neck (Tazrouk district, Hoggar volcanic province, Sahara, Algeria)

    Science.gov (United States)

    Azzouni-Sekkal, Abla; Bonin, Bernard; Ben El Khaznadji, Riad

    2013-09-01

    The unusual occurrence in the In Tifar trachyte neck (Tazrouk district, Hoggar volcanic province, Sahara, Algeria) of the fluorian biotite-fluororichterite association is presented. The two mineral species were previously unknown in the Hoggar and their association is uncommon worldwide. Ti-rich biotite has 28-40% OH sites occupied by fluorine, hence the use of the modifier "fluorian". Sodic-calcic fluororichterite has more than 55% OH sites filled by fluorine, hence the use of the prefix "fluoro". Well-defined F-Mg affinities are documented in both cases, while Cl remains very low. Temperatures are estimated roughly at 775-700 °C at low pressures. The fluorian biotite → fluororichterite sequence of crystallisation implies increasingly high fH2F2/fH2O ratios in metaluminous H2O-dominated evolving to peralkaline F-enriched fluids.

  4. Effects of threat management interactions on conservation priorities.

    Science.gov (United States)

    Auerbach, Nancy A; Wilson, Kerrie A; Tulloch, Ayesha I T; Rhodes, Jonathan R; Hanson, Jeffrey O; Possingham, Hugh P

    2015-12-01

    Decisions need to be made about which biodiversity management actions are undertaken to mitigate threats and about where these actions are implemented. However, management actions can interact; that is, the cost, benefit, and feasibility of one action can change when another action is undertaken. There is little guidance on how to explicitly and efficiently prioritize management for multiple threats, including deciding where to act. Integrated management could focus on one management action to abate a dominant threat or on a strategy comprising multiple actions to abate multiple threats. Furthermore management could be undertaken at sites that are in close proximity to reduce costs. We used cost-effectiveness analysis to prioritize investments in fire management, controlling invasive predators, and reducing grazing pressure in a bio-diverse region of southeastern Queensland, Australia. We compared outcomes of 5 management approaches based on different assumptions about interactions and quantified how investment needed, benefits expected, and the locations prioritized for implementation differed when interactions were taken into account. Managing for interactions altered decisions about where to invest and in which actions to invest and had the potential to deliver increased investment efficiency. Differences in high priority locations and actions were greatest between the approaches when we made different assumptions about how management actions deliver benefits through threat abatement: either all threats must be managed to conserve species or only one management action may be required. Threatened species management that does not consider interactions between actions may result in misplaced investments or misguided expectations of the effort required to mitigate threats to species. © 2015 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of Society for Conservation Biology.

  5. The Consequences of Chronic Stereotype Threat: Domain Disidentification and Abandonment

    OpenAIRE

    Woodcock, Anna; Hernandez, Paul R.; Estrada, Mica; Schultz, P. Wesley

    2012-01-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s “leak” from each juncture of the academic scientific pip...

  6. The Smallpox Threat: The School Nurse's Role

    Science.gov (United States)

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  7. Movements Indicate Threat Response Phases in Children at Risk for Anxiety.

    Science.gov (United States)

    McGinnis, Ellen W; McGinnis, Ryan S; Muzik, Maria; Hruschak, Jessica; Lopez-Duran, Nestor L; Perkins, Noel C; Fitzgerald, Kate; Rosenblum, Katherine L

    2017-09-01

    Temporal phases of threat response, including potential threat (anxiety), acute threat (startle, fear), and post-threat response modulation, have been identified as the underlying markers of anxiety disorders. Objective measures of response during these phases may help identify children at risk for anxiety; however, the complexity of current assessment techniques prevent their adoption in many research and clinical contexts. We propose an alternative technology, an inertial measurement unit (IMU), that enables noninvasive measurement of the movements associated with threat response, and test its ability to detect threat response phases in young children at a heightened risk for developing anxiety. We quantified the motion of 18 children (3-7 years old) during an anxiety-/fear-provoking behavioral task using an IMU. Specifically, measurements from a single IMU secured to the child's waist were used to extract root-mean-square acceleration and angular velocity in the horizontal and vertical directions, and tilt and yaw range of motion during each threat response phase. IMU measurements detected expected differences in child motion by threat phase. Additionally, potential threat motion was positively correlated to familial anxiety risk, startle range of motion was positively correlated with child internalizing symptoms, and response modulation motion was negatively correlated to familial anxiety risk. Results suggest differential theory-driven threat response phases and support previous literature connecting maternal child risk to anxiety with behavioral measures using more feasible objective methods. This is the first study demonstrating the utility of an IMU for characterizing the motion of young children to mark the phases of threat response modulation. The technique provides a novel and objective measure of threat response for mental health researchers.

  8. Toxicological Threats of Plastic

    Science.gov (United States)

    Plastics pose both physical (e.g., entanglement, gastrointestinal blockage, reef destruction) and chemical threats (e.g., bioaccumulation of the chemical ingredients of plastic or toxic chemicals sorbed to plastics) to wildlife and the marine ecosystem.

  9. External Threat Risk Assessment Algorithm (ExTRAA)

    Energy Technology Data Exchange (ETDEWEB)

    Powell, Troy C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    Two risk assessment algorithms and philosophies have been augmented and combined to form a new algorit hm, the External Threat Risk Assessment Algorithm (ExTRAA), that allows for effective and statistically sound analysis of external threat sources in relation to individual attack methods . In addition to the attack method use probability and the attack method employment consequence, t he concept of defining threat sources is added to the risk assessment process. Sample data is tabulated and depicted in radar plots and bar graphs for algorithm demonstration purposes. The largest success of ExTRAA is its ability to visualize the kind of r isk posed in a given situation using the radar plot method.

  10. All projects related to | Page 271 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Topic: SCIENCE AND TECHNOLOGY POLICY, INNOVATIONS, COMMUNICATION TECHNOLOGY, POVERTY MITIGATION, SOCIAL INEQUALITY, COOPERATION BETWEEN ORGANIZATIONS. Region: Brazil, South America, China, Far East Asia, India, Uruguay, South Africa, South of Sahara, North and Central America, ...

  11. Quality of Sulfadoxine-Pyrimethamine Given as Antimalarial Prophylaxis in Pregnant Women in Selected Health Facilities in Central Region of Ghana

    Directory of Open Access Journals (Sweden)

    Danny F. Yeboah

    2016-01-01

    Full Text Available The use of sulfadoxine-pyrimethamine (SP as an intermittent preventive treatment (IPT against malaria during pregnancy has become a policy in most sub-Sahara African countries and crucially depends on the efficacy of SP. This study sets out to evaluate the effectiveness of the SP given to the pregnant women in some selected health facilities in the Central Region of Ghana to prevent maternal malaria in pregnant women. A total of 543 pregnant women recruited from 7 selected health centres in Central Region of Ghana participated in the study. Parasite density of Plasmodium falciparum was determined from peripheral blood of the pregnant women using microscopy. High performance liquid chromatography (HPLC and dissolution tester were used to determine the quality of the SP. Malaria infection was recorded in 11.2% of pregnant women who had a history of SP consumption. SP failed the dissolution test. Pregnant women who did not receive IPT-SP were 44%. Low haemoglobin level was recorded in 73.5% of the pregnant women. The results indicated that SP was substandard. IPT-SP is ineffective in preventing malaria infection.

  12. Radiological threat, public and media: a psychosociological view

    Energy Technology Data Exchange (ETDEWEB)

    Arciszewski, T. [University Rene Descartes - Paris 5, 92 - Boulogne (France)

    2006-07-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  13. Radiological threat, public and media: a psychosociological view

    International Nuclear Information System (INIS)

    Arciszewski, T.

    2006-01-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  14. Threat affects risk preferences in movement decision making

    Science.gov (United States)

    O'Brien, Megan K.; Ahmed, Alaa A.

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks. PMID:26106311

  15. Threat affects risk preferences in movement decision making

    Directory of Open Access Journals (Sweden)

    Megan K. O'Brien

    2015-06-01

    Full Text Available Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching and whole-body leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory. Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the whole-body task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the whole-body movements than in arm-reaching at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects’ inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  16. Threat affects risk preferences in movement decision making.

    Science.gov (United States)

    O'Brien, Megan K; Ahmed, Alaa A

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  17. Can experience overcome stereotypes in times of terror threat?

    Directory of Open Access Journals (Sweden)

    Mirya R. Holman

    2017-02-01

    Full Text Available Research on evaluations of leaders has frequently found that female leaders receive lower ratings in times of national security crisis. However, less is known about countervailing factors. We contend that partisanship and leadership experience in relevant domains are two factors that can counteract the negative effects of terrorist threat on evaluations of female political leaders. To test this expectation, we implemented a national study in 2012 containing terrorist threat and non-threat conditions, and then asked participants to evaluate political leaders. The results show that Republican leaders, including women, are unaffected by terrorist threat; in contrast, Democratic leaders are punished during times of terrorist threat, but this negative effect is smaller for then-Secretary of State Hillary Clinton compared to Nancy Pelosi, who lacks similar experience. In short, Republican partisanship is a strong countervailing factor, while leadership experience in national security more modestly countervails.

  18. Relationships Among Attention Networks and Physiological Responding to Threat

    Science.gov (United States)

    Sarapas, Casey; Weinberg, Anna; Langenecker, Scott A.

    2016-01-01

    Although researchers have long hypothesized a relationship between attention and anxiety, theoretical and empirical accounts of this relationship have conflicted. We attempted to resolve these conflicts by examining relationships of attentional abilities with responding to predictable and unpredictable threat, related but distinct motivational process implicated in a number of anxiety disorders. Eighty-one individuals completed a behavioral task assessing efficiency of three components of attention – alerting, orienting, and executive control (Attention Network Test - Revised). We also assessed startle responding during anticipation of both predictable, imminent threat (of mild electric shock) and unpredictable contextual threat. Faster alerting and slower disengaging from non-emotional attention cues were related to heightened responding to unpredictable threat, whereas poorer executive control of attention was related to heightened responding to predictable threat. This double dissociation helps to integrate models of attention and anxiety and may be informative for treatment development. PMID:27816781

  19. Perceived control qualifies the effects of threat on prejudice.

    Science.gov (United States)

    Greenaway, Katharine H; Louis, Winnifred R; Hornsey, Matthew J; Jones, Janelle M

    2014-09-01

    People sometimes show a tendency to lash out in a prejudiced manner when they feel threatened. This research shows that the relationship between threat and prejudice is moderated by people's levels of perceived control: Threat leads to prejudice only when people feel concurrently low in control. In two studies, terrorist threat was associated with heightened prejudice among people who were low in perceived control over the threat (Study 1; N = 87) or over their lives in general (Study 2; N = 2,394), but was not associated with prejudice among people who were high in perceived control. Study 3 (N = 139) replicated this finding experimentally in the context of the Global Financial Crisis. The research identifies control as an important ingredient in threatening contexts that, if bolstered, can reduce general tendencies to lash out under threat. © 2013 The British Psychological Society.

  20. Does stereotype threat affect women in academic medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists.

  1. Counteracting effect of threat on reward enhancements during working memory.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Pessoa, Luiz

    2015-01-01

    Cognitive performance has been shown to be enhanced when performance-based rewards are at stake. On the other hand, task-irrelevant threat processing has been shown to have detrimental effects during several cognitive tasks. Crucially, the impact of reward and threat on cognition has been studied largely independently of one another. Hence, our understanding of how reward and threat simultaneously contribute to performance is incomplete. To fill in this gap, the present study investigated how reward and threat interact with one another during a cognitive task. We found that threat of shock counteracted the beneficial effect of reward during a working memory task. Furthermore, individual differences in self-reported reward-sensitivity and anxiety were linked to the extent to which reward and threat interacted during behaviour. Together, the current findings contribute to a limited but growing literature unravelling how positive and negative information processing jointly influence cognition.

  2. Assessment of Containment Structures Against Missile Impact Threats

    Institute of Scientific and Technical Information of China (English)

    LI Q M

    2006-01-01

    In order to ensure the highest safety requirements,nuclear power plant structures (the containment structures,the fuel storages and transportation systems) should be assessed against all possible internal and external impact threats.The internal impact threats include kinetic missiles generated by the failure of high pressure vessels and pipes,the failure of high speed rotating machineries and accidental drops.The external impact threats may come from airborne missiles,aircraft impact,explosion blast and fragments.The impact effects of these threats on concrete and steel structures in a nuclear power plant are discussed.Methods and procedures for the impact assessment of nuclear power plants are introduced.Recent studies on penetration and perforation mechanics as well as progresses on dynamic properties of concrete-like materials are presented to increase the understanding of the impact effects on concrete containment structures.

  3. Growing threat of intense tropical cyclones to East Asia over the period 1977–2010

    International Nuclear Information System (INIS)

    Park, Doo-Sun R; Ho, Chang-Hoi; Kim, Joo-Hong

    2014-01-01

    The threat of intense tropical cyclones (TCs) to East Asia has increased in recent decades. Integrated analyses of five available TC data sets for the period 1977–2010 revealed that the growing threat of TCs primarily results from the significant shift that the spatial positions of the maximum intensity of TCs moved closer to East Asian coastlines from Vietnam to Japan. This shift incurs a robust increase in landfall intensity over east China, Korea and Japan. In contrast, an increase of TC genesis frequency over the northern part of the South China Sea leads to a reduction in the maximum TC intensity before landfall, because of their short lifetime; thus, there are no clear tendencies in the landfall intensity across Vietnam, south China and Taiwan. All changes are related to the strengthening of the Pacific Walker circulation, closely linked with the recent manifestation that the warming trend of sea surface temperature in the tropical western Pacific is much higher than that in the central to eastern Pacific. (paper)

  4. Unhealthy interactions: the role of stereotype threat in health disparities.

    Science.gov (United States)

    Aronson, Joshua; Burgess, Diana; Phelan, Sean M; Juarez, Lindsay

    2013-01-01

    Stereotype threat is the unpleasant psychological experience of confronting negative stereotypes about race, ethnicity, gender, sexual orientation, or social status. Hundreds of published studies show how the experience of stereotype threat can impair intellectual functioning and interfere with test and school performance. Numerous published interventions derived from this research have improved the performance and motivation of individuals targeted by low-ability stereotypes. Stereotype threat theory and research provide a useful lens for understanding and reducing the negative health consequences of interracial interactions for African Americans and members of similarly stigmatized minority groups. Here we summarize the educational outcomes of stereotype threat and examine the implications of stereotype threat for health and health-related behaviors.

  5. Unleashing Latent Ability: Implications of Stereotype Threat for College Admissions

    Science.gov (United States)

    Logel, Christine R.; Walton, Gregory M.; Spencer, Steven J.; Peach, Jennifer; Mark, Zanna P.

    2012-01-01

    Social-psychological research conducted over the past 15 years provides compelling evidence that pervasive psychological threats are present in common academic environments--especially threats that originate in negative intellectual stereotypes--and that these threats undermine the real-world academic performance of non-Asian ethnic minority…

  6. Hindrances are not threats: advancing the multidimensionality of work stress.

    Science.gov (United States)

    Tuckey, Michelle R; Searle, Ben J; Boyd, Carolyn M; Winefield, Anthony H; Winefield, Helen R

    2015-04-01

    The challenge-hindrance framework has proved useful for explaining inconsistencies in relationships between work stressors and important outcomes. By introducing the distinction between threat and hindrance to this framework, we capture the potential for personal harm or loss (threat) associated with stressors, as distinct from the potential to block goal attainment (hindrance) or promote gain (challenge). In Study 1, survey data were collected from 609 retail workers, 220 of whom responded 6 months later. The results supported a 3-factor threat-hindrance-challenge stressor structure and showed that threat stressors are associated with increased psychological distress and emotional exhaustion, and reduced dedication, whereas hindrance stressors undermine dedication but may not be related to distress or exhaustion with threats included in the model. Study 2 utilized a diary study design, with data collected from 207 workers over 3 workdays. Findings revealed that the threat, hindrance, and challenge appraisals of individual workers are statistically distinct, and associated with stressors and well-being as anticipated: threats with role conflict and anxiety, hindrances with organizational constraints and fatigue, and challenges with skill demands and enthusiasm. Overall, moving to a 3-dimensional challenge-hindrance-threat framework for stressors and stress appraisals will support a more accurate picture regarding the nature, processes, and effects of stressors on individuals and organizations, and ensure prevention efforts are not misguided. (c) 2015 APA, all rights reserved).

  7. Interrelationships Among Men’s Threat Potential, Facial Dominance, and Vocal Dominance

    Directory of Open Access Journals (Sweden)

    Chengyang Han

    2017-03-01

    Full Text Available The benefits of minimizing the costs of engaging in violent conflict are thought to have shaped adaptations for the rapid assessment of others’ capacity to inflict physical harm. Although studies have suggested that men’s faces and voices both contain information about their threat potential, one recent study suggested that men’s faces are a more valid cue of their threat potential than their voices are. Consequently, the current study investigated the interrelationships among a composite measure of men’s actual threat potential (derived from the measures of their upper-body strength, height, and weight and composite measures of these men’s perceived facial and vocal threat potential (derived from dominance, strength, and weight ratings of their faces and voices, respectively. Although men’s perceived facial and vocal threat potential were positively correlated, men’s actual threat potential was related to their perceived facial, but not vocal, threat potential. These results present new evidence that men’s faces may be a more valid cue of these aspects of threat potential than their voices are.

  8. Functional effectiveness of threat appeals in exercise promotion messages

    Directory of Open Access Journals (Sweden)

    Olivier Mairesse

    2010-01-01

    Full Text Available As more than 70% of individuals in Western societies can be categorized as sedentary and inactivity has been recognized to lead to a series of serious physical and psychological disorders, the importance of physical activity promotion is ever more emphasized. Many social marketing campaigns use threat (or fear appeals to promote healthy behaviors. Theoretical models, such as the Extended Parallel Process Model integrate concepts as 'perceived threat' and 'perceived efficacy' to explain how such messages operate and can cause diverse behavioral reactions. It is however still not entirely clear how these different aspects are valuated and combined to determine desired versus undesired response behaviors in individuals. In a functional integration task, threat-appeal based exercise promotion messages varying in psychological threat and efficacy content were shown to sedentary employees in order to assess how they affect their intention to engage in physical exercise. Our results show that individuals can be categorized in 4 different clusters depending on the way they valuate threat and efficacy appeals: i.e. individuals sensitive to both types of cues, those sensitive to either the threat or the efficacy component in the message and those insensitive to either one of them. As different segments of receivers of the message react differently to threat and efficacy combinations, it is concluded that different approaches to designing effective mass media campaigns may be required for effective exercise promotion.

  9. NEW AREAS OF COOPERATION OF CHINA AND CENTRAL ASIAN COUNTRIES IN THE FIRST DECADE OF THE 2000s

    Directory of Open Access Journals (Sweden)

    E. V. Savkovic

    2011-01-01

    Full Text Available Abstract: At the end of 2000-s, regional relations between China and Central Asian states was under threat of the current World Financial Crisis. But it also provided the impetus to search for new mechanisms, forms and directions of the regional cooperation. It marks China’s new development plan for Xinjiang after ten years of Western Development Strategy of the central government.

  10. Architectural model for crowdsourcing for human security threats ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application ... Crowdsourcing for Human Security Threats Situation Information and Response System (CHSTSIRS) is proposed in this paper to report Human Security (HS) ... Keywords: Human security, Crowdsourcing, Threats, Situation Information, Agency, Google, Cloud Messaging ...

  11. Assessment of the Threats to the Biodiversity and Habitats in "Stara Reka" Reserve (Bulgaria and Its Adjacent Subalpine and Alpine Areas

    Directory of Open Access Journals (Sweden)

    Svetlana V. Yocheva

    2013-06-01

    Full Text Available The assessment of the threats in the “Stara Reka” reserve and its adjacent subalpine and alpine areas is important since it makes it possible the appropriate conservation measures to be taken in order to prevent or reduce the negative effects on the biodiversity and habitats. The assessment was based on systematic studies and visits in the “Stara Reka” Reserve, located within National Park “Central Balkan” (Bulgaria, during spring, summer and autumn seasons of 2010-2011. A number of threats were recorded, where those by anthropogenic origin were predominating. Tourists have negatively influenced the wild plants such as Allium ursinum, Inula helenium and Primula frondosa by picking them up. Damages were registered on the information system and signs. Waste disposal, fires, poaching and illegal fishing were also some of the recorded threats. Many natural succession changes quite dynamically vary the habitats in the reserve, but the most dangerous for the biodiversity and degradation of habitats remain fires, erosion and introduction of alien species.

  12. South Africa : tous les projets | Page 3 | CRDI - Centre de ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sujet: INTERNATIONAL FINANCE, INTERNATIONAL FINANCIAL MARKET, FINANCIAL POLICY, DEMOGRAPHY, DEMOGRAPHIC CHANGE, DEMOGRAPHIC TRANSITION. Région: Americas, Brazil, South America, Asia, China, Far East Asia, India, South and Central Asia, Global, Africa, South Africa, South of Sahara.

  13. Kidnapping and abduction minimizing the threat and lessons in survival

    CERN Document Server

    Heard, Brian John

    2014-01-01

    Terrorist groups and organized crime cartels pose an increasing threat of kidnapping throughout many regions in the word. At the same time, international travel has become more commonplace for both business and leisure purposes. Kidnapping and Abduction: Minimizing the Threat and Lessons in Survival provides a practical guide on the precautions travelers can take to avoid being kidnapped or derail a kidnapping attempt in progress. In the event this cannot be avoided, the book supplies advice on how to ensure survival during captivity. Readers will learn: The basic elements of kidnapping and abduction The motivations and mechanisms of kidnappers The hotspots where kidnapping/hostage taking is prevalent Vehicles best suited for avoidance of kidnap threat and proposals for up-armoring an existing vehicle How to recognize immediate threats and precautions to be taken in assessing threat level The types of weapons most favored by kidnappers and their threat level Available bullet-resistant materials and their use ...

  14. The Bright Side of Threatened Narcissism: Improved Performance Following Ego Threat.

    Science.gov (United States)

    Nevicka, Barbora; Baas, Matthijs; Ten Velden, Femke S

    2016-12-01

    Narcissistic individuals have highly positive self-views and overestimate their abilities. Consequently, they tend to react aggressively whenever they receive information that does not match their high self-views (ego threat). We argue that focusing on aggression merely portrays a one-sided view of narcissistic individuals and the manner in which they counter ego threats. We propose that following ego threat, narcissism can also fuel performance. In four studies, we measured nonclinical narcissism and allocated Dutch undergraduate university students (N 1  = 175, N 2  = 142, N 3  = 159, N 4  = 174) to either an ego threat or a no ego threat condition. Ego threat involved negative feedback (Studies 1-2) or threat to uniqueness (Studies 3-4). We measured participants' intentions to complete a challenging task (Study 1), their creative performance (Studies 2-3), and their performance on an anagram task (Study 4). Across Studies 1-3, we consistently found that following ego threat, higher nonclinical narcissism was associated with greater willingness to perform tasks that enabled demonstration of abilities and enhanced creative performance. These results were confirmed using a meta-analysis. However, anagram performance was not enhanced following ego threat. We provide additional analyses that might help explain this. Our findings thus reveal a more positive side to the way narcissistic individuals manage threats to their self-image. © 2015 Wiley Periodicals, Inc.

  15. Cave invertebrates in Espírito Santo state, Brazil: a primary analysis of endemism, threats and conservation priorities

    Directory of Open Access Journals (Sweden)

    Marconi Souza Silva

    2015-08-01

    Full Text Available The cave-dwelling invertebrates were studied according to their composition, biodiversity, distribution and threats in the Atlantic Forest Central Biodiversity Corridor, a priority area for conservation actions in Brazil. Twelve obligate cave species were found, plus 495 troglophile species. Araneae (103 spp., Coleoptera (61 spp., Diptera (56 spp. and Lepidoptera (38 spp. were the richest taxa. The richness was higher in the carbonate caves (63 spp., sd = 16.7 and the highest diversity in granitic caves (H´= 2.68, sd = 0.5. The spatial turnover was 63.45 and similarity less than 30%. The total richness was correlated with the linear extension of the caves (Rs = 0.757, p ≤ 0.05. Surrounding area deforestation and religious and tourist use were the main threats. Emergency attention is recommended regarding protective actions, management and conservation of caves of extremely high biological importance.

  16. Personality, threat and affective responses to cultural diversity

    NARCIS (Netherlands)

    Van der Zee, K.I.; Van Der Gang, Ineke

    The present study tried to reconcile assumptions from Terror Management Theory that individual differences in openness to diversity are enhanced by existential threat with own recent findings suggesting that individual differences are diminished by threat. A model was supported assuming that it is

  17. Web threat and its implication for E-business in Nigeria ...

    African Journals Online (AJOL)

    Web threat is any threat that uses the internet to facilitate identity theft , fraud, espionage and intelligence gathering. Web -based vulnerabilities now outnumber traditional computer security concerns. Such threats use multiple types of malware and fraud, all of which utilize HTTP or HTTPS protocols, but may also employ ...

  18. An Examination of Stereotype Threat Effects on Girls' Mathematics Performance

    Science.gov (United States)

    Ganley, Colleen M.; Mingle, Leigh A.; Ryan, Allison M.; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-01-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In…

  19. Does Stereotype Threat Affect Women in Academic Medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-01-01

    Multiple complex factors contribute to the slow pace of women’s advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including: (1) introducing the concept of stereotype threat to the academic medicine community; (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias; (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders; (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards; and (5) building leadership efficacy among female physicians and scientists. PMID:22361794

  20. Cognitive and affective components of challenge and threat states.

    Science.gov (United States)

    Meijen, Carla; Jones, Marc V; McCarthy, Paul J; Sheffield, David; Allen, Mark S

    2013-01-01

    We explored the cognitive and affective components of the Theory of Challenge and Threat States in Athletes (TCTSA) using a cross-sectional design. One hundred and seventy-seven collegiate athletes indicated how they typically approached an important competition on measures of self-efficacy, perceived control, achievement goals, emotional states and interpretation of emotional states. Participants also indicated to what extent they typically perceived the important competition as a challenge and/or a threat. The results suggest that a perception of challenge was not predicted by any of the cognitive components. A perception of threat was positively predicted by avoidance goals and negatively predicted by self-efficacy and approach goals. Both challenge and threat had a positive relationship with anxiety. Practical implications of this study are that an avoidance orientation appeared to be related to potentially negative constructs such as anxiety, threat and dejection. The findings may suggest that practitioners and researchers should focus on reducing an avoidance orientation, however the results should be treated with caution in applied settings, as this study did not examine how the combination of constructs exactly influences sport performance. The results provided partial support for the TCTSA with stronger support for proposed relationships with threat rather than challenge states.