WorldWideScience

Sample records for device threat assessment

  1. Performance Assessment of Communication Enhancement Devices TEA HI Threat Headset

    Science.gov (United States)

    2015-08-01

    AFRL-RH-WP-TR-2015-0076 Performance Assessment of Communication Enhancement Devices: TEA HI Threat Headset Hilary L. Gallagher...of Communication Enhancement Devices: TEA HI Threat Headset 5a. CONTRACT NUMBER FA8650-14-D-6501 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...technology in military applications. Objective performance data provided an assessment of the performance of these devices. The TEA HI Threat headset

  2. Portable Integrated Wireless Device Threat Assessment to Aircraft Radio Systems

    Science.gov (United States)

    Salud, Maria Theresa P.; Williams, Reuben A. (Technical Monitor)

    2004-01-01

    An assessment was conducted on multiple wireless local area network (WLAN) devices using the three wireless standards for spurious radiated emissions to determine their threat to aircraft radio navigation systems. The measurement process, data and analysis are provided for devices tested using IEEE 802.11a, IEEE 802.11b, and Bluetooth as well as data from portable laptops/tablet PCs and PDAs (grouping known as PEDs). A comparison was made between wireless LAN devices and portable electronic devices. Spurious radiated emissions were investigated in the radio frequency bands for the following aircraft systems: Instrument Landing System Localizer and Glideslope, Very High Frequency (VHF) Communication, VHF Omnidirectional Range, Traffic Collision Avoidance System, Air Traffic Control Radar Beacon System, Microwave Landing System and Global Positioning System. Since several of the contiguous navigation systems were grouped under one encompassing measurement frequency band, there were five measurement frequency bands where spurious radiated emissions data were collected for the PEDs and WLAN devices. The report also provides a comparison between emissions data and regulatory emission limit.

  3. Portable Wireless Device Threat Assessment for Aircraft Navigation Radios

    Science.gov (United States)

    Nguyen, Truong X.; Koppen, Sandra V.; Ely, Jay J.; Williams, Reuben A.; Smith, Laura J.; Salud, Maria Theresa P.

    2004-01-01

    This paper addresses the concern for Wireless Local Area Network devices and two-way radios to cause electromagnetic interference to aircraft navigation radio systems. Spurious radiated emissions from various IEEE 802.11a, 802.11b, and Bluetooth devices are characterized using reverberation chambers. The results are compared with baseline emissions from standard laptop computer and personal digital assistants (PDAs) that are currently allowed for use on aircraft. The results indicate that the WLAN devices tested are not more of a threat to aircraft navigation radios than standard laptop computers and PDAs in most aircraft bands. In addition, spurious radiated emission data from seven pairs of two-way radios are provided. These two-way radios emit at much higher levels in the bands considered. A description of the measurement process, device modes of operation and the measurement results are reported.

  4. Joint Improvised-Threat Defeat Agency Needs to Improve Assessment and Documentation of Counter-Improvised Explosive Device Initiatives (Redacted)

    Science.gov (United States)

    2016-08-09

    E XC E L L E N C E Joint Improvised ‑Threat Defeat Agency Needs to Improve Assessment and Documentation of Counter‑ Improvised Explosive Device...USE ONLY DODIG-2016-120 (Project No. D2015-D000AE-0222.000) │ i Results in Brief Joint Improvised ‑Threat Defeat Agency Needs to Improve Assessment and...Documentation of Counter‑ Improvised Explosive Device Initiatives Visit us at www.dodig.mil Objective Our audit objective was to determine whether

  5. Terrorism: the threat of a radiological device

    International Nuclear Information System (INIS)

    Kingshott, B.F.

    2005-01-01

    Full text: This paper will discuss terrorism from the perspective of a terrorist organization building and detonating a 'dirty bomb' with a radiological component. The paper will discuss how such devices are made and how security of radiological material world wide will minimize the risk of such devices being used. It will discuss the threat assessments against nuclear waste processing and storage sites, threats to nuclear plants and other sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device be detonated. (author)

  6. An assessment of the terrorist threat to use a nuclear or radiological device in an attack

    Energy Technology Data Exchange (ETDEWEB)

    Kingshott, B.F. [Grand Valley State University, 275C DeVos Center, 401 West Fulton Street, Grand Rapids, MI 49504 (United States)]. E-mail: kingshob@gvsu.edu

    2006-07-01

    This paper will discuss terrorism from the perspective of a terrorist organisation acquiring nuclear material to build weapons and how security of radiological material world wide will minimise the risk of such devices being used. It will discuss the need to improve security at nuclear waste processing and storage sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device containing nuclear material be detonated. (author)

  7. High Altitude Electromagnetic Pulse (HEMP) and High Power Microwave (HPM) Devices: Threat Assessments

    National Research Council Canada - National Science Library

    Wilson, Clay

    2004-01-01

    .... civilian computer systems to the effects of EMP has been discussed in the media. EMP can be produced on a large scale using a single nuclear explosion, and on a smaller, non-nuclear scale using a device with batteries or chemical explosives...

  8. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  9. Bomb Threat Assessments. Fact Sheet

    Science.gov (United States)

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  10. Threat Assessment in College Settings

    Science.gov (United States)

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  11. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  12. Eastern forest environmental threat assessment center

    Science.gov (United States)

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  13. A Model for Situation and Threat Assessment

    Science.gov (United States)

    2006-12-01

    CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD 20855 UNITED STATES steinberg@cubrc.org A model is presented for situation and threat assessment...PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Subject Matter Expert (SME) Calspan-UB Research Center ( CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD...1 A Model for Situation and Threat Assessment Alan Steinberg CUBRC , Inc. steinberg@cubrc.org November, 2005 2 Objectives • Advance the state-of

  14. Prototyping of CBRN threat assessment system. Phase 1

    International Nuclear Information System (INIS)

    Ina, Shinichiro; Suzuki, Tomoyuki; Maeno, Akihiro; Sakaue, Motoki

    2015-01-01

    Recently, chemical, biological, radiological and nuclear threats, that is, CBRN threats have emerged. In order to support the Japan Self Defense Forces unit coping with the CBRN threats, it is important to take measures against these invisible threats. Our CBRN threat assessment system will make invisible CBRN threats visible. This report describes a prototyping of the CBRN threat assessment system (PHASE 1) carried out from fiscal year 2012-2014. (author)

  15. Al Qaeda: Profile and Threat Assessment

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2005-01-01

    .... interests abroad, and against Western countries. But many believe that the Al Qaeda organization and its leadership are no longer as relevant to assessing the global Islamic terrorist threat as they were on September 11, 2001. Some believe U.S...

  16. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    Science.gov (United States)

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  17. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    OpenAIRE

    Diane M. Zierhoffer

    2014-01-01

    This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999) poses ten questions about t...

  18. Organizational Security Threats Related to Portable Data Storage Devices: Qualitative Exploratory Inquiry

    Science.gov (United States)

    Cooper, Paul K.

    2017-01-01

    There has been a significant growth of portable devices capable of storing both personal data as well as sensitive organizational data. This growth of these portable devices has led to an increased threat of cyber-criminal activity. The purpose of this study was to gain a better understanding of security threats to the data assets of organizations…

  19. The concept of leakage in threat assessment.

    Science.gov (United States)

    Meloy, J Reid; O'Toole, Mary Ellen

    2011-01-01

    Leakage in the context of threat assessment is the communication to a third party of an intent to do harm to a target. Third parties are usually other people, but the means of communication vary, and include letters, diaries, journals, blogs, videos on the internet, emails, voice mails, and other social media forms of transmission. Leakage is a type of warning behavior that typically infers a preoccupation with the target, and may signal the research, planning, and implementation of an attack. Nomothetic data suggest that leakage occurs in a majority of cases of attacks on and assassinations of public figures, adult mass murders, adolescent mass murders, and school or campus shootings: very low-frequency, but catastrophic acts of intended and targeted violence. Idiographic or case data illustrate the various permutations of leakage. We discuss the operational importance of the concept, place it in the context of other warning behaviors, emphasize the need for further research, and outline risk management strategies for the mitigation of such acts of violence in both law enforcement and clinical mental health settings. Copyright © 2011 John Wiley & Sons, Ltd.

  20. ITAC, an insider threat assessment computer program

    International Nuclear Information System (INIS)

    Eggers, R.F.; Giese, E.W.

    1988-01-01

    The insider threat assessment computer program, ITAC, is used to evaluate the vulnerability of nuclear material processing facilities to theft of special nuclear material by one or more authorized insider adversaries. The program includes two main parts: one is used to determine the timeliness of nuclear material accounting tests for loss of special nuclear material, and the other determines pathway aggregate detection probabilities for physical protection systems and material control procedures that could detect the theft. Useful features of ITAC include its ability to (1) evaluate and quantify the timeliness of material accounting tests, (2) analyze branching systems of physical pathways and adversary strategies, (3) analyze trickle or abrupt theft situations for combinations of insiders, (4) accept input probabilities and times in the form of ranges rather than discrete points, and (5) simulate input data using Monte Carlo methods to produce statistically distributed aggregate delay times and detection probabilities. The ITAC program was developed by the Security Applications Center of Westinghouse Hanford Comapny and Boeing Computer Services, Richland, WA

  1. The Practice of Campus-Based Threat Assessment: An Overview

    Science.gov (United States)

    Pollard, Jeffrey W.; Nolan, Jeffrey J.; Deisinger, Eugene R. D.

    2012-01-01

    This article provides an overview of threat assessment and management as implemented on campuses of higher education. Standards of practice and state calls for implementation are cited. An overview of some of the basic principles for threat assessment and management implementation is accompanied by examples of how they are utilized. Pitfalls…

  2. The Enemy Within: The Emerging Threats to Healthcare from Malicious Mobile Devices

    OpenAIRE

    Zawoad, Shams; Hasan, Ragib

    2012-01-01

    With the proliferation of wireless networks, mobile devices and medical devices are increasingly being equipped with wireless interfaces, such as Bluetooth and WiFi to allow easy access to and control of the medical devices. Unfortunately, the very presence and usage of such interfaces also expose the medical devices to novel attacks from malicious parties. The emerging threat from malicious mobile devices is significant and severe, since attackers can steal confidential data from a patient's...

  3. Assessment of the Emerging Biocruise Threat

    Science.gov (United States)

    2000-08-01

    more about Los Angeles than they do about Taiwan.”15 And obviously believing in the efficacy of their long-range nuclear missile capability in... vaccinated against anthrax. Apparently, Hussein was deterred from using his WMD by U.S. and Israeli threats of nuclear retaliation. The credibility of the...gangrene, aflatoxin, trichothecene mycotoxins, wheat cover smut, ricin, hemorrhagic conjunctivitis virus, rotavirus , camel pox Israel Researching

  4. Threat evaluation for impact assessment in situation analysis systems

    Science.gov (United States)

    Roy, Jean; Paradis, Stephane; Allouche, Mohamad

    2002-07-01

    Situation analysis is defined as a process, the examination of a situation, its elements, and their relations, to provide and maintain a product, i.e., a state of situation awareness, for the decision maker. Data fusion is a key enabler to meeting the demanding requirements of military situation analysis support systems. According to the data fusion model maintained by the Joint Directors of Laboratories' Data Fusion Group, impact assessment estimates the effects on situations of planned or estimated/predicted actions by the participants, including interactions between action plans of multiple players. In this framework, the appraisal of actual or potential threats is a necessary capability for impact assessment. This paper reviews and discusses in details the fundamental concepts of threat analysis. In particular, threat analysis generally attempts to compute some threat value, for the individual tracks, that estimates the degree of severity with which engagement events will potentially occur. Presenting relevant tracks to the decision maker in some threat list, sorted from the most threatening to the least, is clearly in-line with the cognitive demands associated with threat evaluation. A key parameter in many threat value evaluation techniques is the Closest Point of Approach (CPA). Along this line of thought, threatening tracks are often prioritized based upon which ones will reach their CPA first. Hence, the Time-to-CPA (TCPA), i.e., the time it will take for a track to reach its CPA, is also a key factor. Unfortunately, a typical assumption for the computation of the CPA/TCPA parameters is that the track velocity will remain constant. When a track is maneuvering, the CPA/TCPA values will change accordingly. These changes will in turn impact the threat value computations and, ultimately, the resulting threat list. This is clearly undesirable from a command decision-making perspective. In this regard, the paper briefly discusses threat value stabilization

  5. Protected areas in tropical Africa: assessing threats and conservation activities.

    Science.gov (United States)

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A; Davenport, Tim R B; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C; Holbech, Lars H; Huijbregts, Bas; Kühl, Hjalmar S; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G; Petre, Charles-Albert; Rainey, Hugo J; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  6. Protected areas in tropical Africa: assessing threats and conservation activities.

    Directory of Open Access Journals (Sweden)

    Sandra Tranquilli

    Full Text Available Numerous protected areas (PAs have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  7. Classification of Device Behaviour in Internet of Things Infrastructures: Towards Distinguishing the Abnormal From Security Threats

    OpenAIRE

    Ferrando, Roman; Stacey, Paul

    2017-01-01

    Increasingly, Internet of Things (IoT) devices are being woven into the fabric of our physical world. With this rapidly expanding pervasive deployment of IoT devices, and supporting infrastructure, we are fast approaching the point where the problem of IoT based cyber-security attacks is a serious threat to industrial operations, business activity and social interactions that leverage IoT technologies. The number of threats and successful attacks against connected systems using IoT devices an...

  8. Assessment of Containment Structures Against Missile Impact Threats

    Institute of Scientific and Technical Information of China (English)

    LI Q M

    2006-01-01

    In order to ensure the highest safety requirements,nuclear power plant structures (the containment structures,the fuel storages and transportation systems) should be assessed against all possible internal and external impact threats.The internal impact threats include kinetic missiles generated by the failure of high pressure vessels and pipes,the failure of high speed rotating machineries and accidental drops.The external impact threats may come from airborne missiles,aircraft impact,explosion blast and fragments.The impact effects of these threats on concrete and steel structures in a nuclear power plant are discussed.Methods and procedures for the impact assessment of nuclear power plants are introduced.Recent studies on penetration and perforation mechanics as well as progresses on dynamic properties of concrete-like materials are presented to increase the understanding of the impact effects on concrete containment structures.

  9. Do New Mobile Devices in Enterprises Pose A Serious Security Threat?

    OpenAIRE

    Ali A Altalbe

    2013-01-01

    The purpose of this paper is to introduce a research proposal designed to explore the network securityissues concerning mobile devices protection. Many threats exist and they harm not only computers but handheld devices as well. The mobility of phones and their excessive use make them more vulnerable. The findings suggest a list of protections that can provide high level of security for new mobile devices.

  10. Rapid Assessment of Protected area Pressures and Threats in ...

    African Journals Online (AJOL)

    Regular evaluation of protected area operations can enable policy makers develop strategic responses to pervasive management problems. Pressures and threats in seven National Parks of the National Park Service (NPS) were therefore assessed using the Rapid Assessment and Prioritization of Protected Area ...

  11. External Threat Risk Assessment Algorithm (ExTRAA)

    Energy Technology Data Exchange (ETDEWEB)

    Powell, Troy C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    Two risk assessment algorithms and philosophies have been augmented and combined to form a new algorit hm, the External Threat Risk Assessment Algorithm (ExTRAA), that allows for effective and statistically sound analysis of external threat sources in relation to individual attack methods . In addition to the attack method use probability and the attack method employment consequence, t he concept of defining threat sources is added to the risk assessment process. Sample data is tabulated and depicted in radar plots and bar graphs for algorithm demonstration purposes. The largest success of ExTRAA is its ability to visualize the kind of r isk posed in a given situation using the radar plot method.

  12. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    Directory of Open Access Journals (Sweden)

    Diane M. Zierhoffer

    2014-10-01

    Full Text Available This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999 poses ten questions about the patterns of thinking and behaviors that may precipitate an attack of targeted violence. Three terrorists are studied to assess the model’s value as a predictor of terrorism. It is assessed for its use within law enforcement, during an investigation of someone brought to attention as a possible terrorist and for family members or friends who suspect potential terrorist behavior. Would these questions encourage someone to report a friend to prevent a possible attack? This threat assessment model provides a foundation for future research focused on developing a structured risk assessment for lone terrorists. In its present form, the questions can assist both citizens and law enforcement personnel in identifying the patterns of thought and behavior potentially indicative of a lone terrorist.

  13. Worldwide Threat Assessment of the US Intelligence Community

    Science.gov (United States)

    2014-01-29

    the Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition ( SCADA ) systems used in water management, oil and gas pipelines ...Statement for the Record Worldwide Threat Assessment of the US Intelligence Community Senate Select Committee on Intelligence...reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions

  14. Law Enforcement Use of Threat Assessments to Predict Violence

    Science.gov (United States)

    Wood, Tracey Michelle

    2016-01-01

    The purpose of this qualitative, descriptive multiple case study was to explore what process, policies and procedures, or set of empirically supported norms governed law enforcement officers in a selected county in the southwest region of the United States when threat assessments were conducted on potentially violent subjects threatening mass…

  15. Assessment of terrorist threats to the Canadian energy sector

    Energy Technology Data Exchange (ETDEWEB)

    Shull, A. [Carleton Univ., Ottawa, ON (Canada). Norman Paterson School of International Affairs]|[Ottawa Univ., ON (Canada). Faculty of Law

    2006-03-15

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs.

  16. Assessment of terrorist threats to the Canadian energy sector

    International Nuclear Information System (INIS)

    Shull, A.

    2006-01-01

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs

  17. Current Status of the Cyber Threat Assessment for Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyun Doo [KINAC, Daejeon (Korea, Republic of)

    2016-05-15

    In December 2014, unknown hackers hacked internal documents sourced from Korea Hydro and Nuclear Power (KHNP) and those electronic documents were posted five times on a Social Network Service (SNS). The data included personal profiles, flow charts, manuals and blueprints for installing pipes in the nuclear power plant. Although the data were not critical to operation or sabotage of the plant, it threatened people and caused social unrest in Korea and neighboring countries. In December 2015, cyber attack on power grid caused a blackout for hundreds of thousands of people in Ukraine. The power outage was caused by a sophisticated attack using destructive malware called 'BlackEnergy'. Cyber attacks are reality in today's world and critical infrastructures are increasingly targeted. Critical infrastructures, such as the nuclear power plant, need to be proactive and protect the nuclear materials, assets and facilities from potential cyber attacks. The threat assessment document and its detailed procedure are confidential for the State. Nevertheless, it is easy to find cooperation on assessing and evaluating the threats of nuclear materials and facilities with other government departments or agencies including the national police. The NSSC and KINAC also cooperated with the National Intelligence Service (NIS) and National Security Research Institute (NSR). However, robust cyber threat assessment system and regular consultative group should be established with domestic and overseas organization including NIS, NSR, the National Police Agency and the military force to protect and ensure to safety of people, public and environment from rapidly changing and upgrading cyber threats.

  18. Current Status of the Cyber Threat Assessment for Nuclear Facilities

    International Nuclear Information System (INIS)

    Kim, Hyun Doo

    2016-01-01

    In December 2014, unknown hackers hacked internal documents sourced from Korea Hydro and Nuclear Power (KHNP) and those electronic documents were posted five times on a Social Network Service (SNS). The data included personal profiles, flow charts, manuals and blueprints for installing pipes in the nuclear power plant. Although the data were not critical to operation or sabotage of the plant, it threatened people and caused social unrest in Korea and neighboring countries. In December 2015, cyber attack on power grid caused a blackout for hundreds of thousands of people in Ukraine. The power outage was caused by a sophisticated attack using destructive malware called 'BlackEnergy'. Cyber attacks are reality in today's world and critical infrastructures are increasingly targeted. Critical infrastructures, such as the nuclear power plant, need to be proactive and protect the nuclear materials, assets and facilities from potential cyber attacks. The threat assessment document and its detailed procedure are confidential for the State. Nevertheless, it is easy to find cooperation on assessing and evaluating the threats of nuclear materials and facilities with other government departments or agencies including the national police. The NSSC and KINAC also cooperated with the National Intelligence Service (NIS) and National Security Research Institute (NSR). However, robust cyber threat assessment system and regular consultative group should be established with domestic and overseas organization including NIS, NSR, the National Police Agency and the military force to protect and ensure to safety of people, public and environment from rapidly changing and upgrading cyber threats

  19. TANDI: threat assessment of network data and information

    Science.gov (United States)

    Holsopple, Jared; Yang, Shanchieh Jay; Sudit, Moises

    2006-04-01

    Current practice for combating cyber attacks typically use Intrusion Detection Sensors (IDSs) to passively detect and block multi-stage attacks. This work leverages Level-2 fusion that correlates IDS alerts belonging to the same attacker, and proposes a threat assessment algorithm to predict potential future attacker actions. The algorithm, TANDI, reduces the problem complexity by separating the models of the attacker's capability and opportunity, and fuse the two to determine the attacker's intent. Unlike traditional Bayesian-based approaches, which require assigning a large number of edge probabilities, the proposed Level-3 fusion procedure uses only 4 parameters. TANDI has been implemented and tested with randomly created attack sequences. The results demonstrate that TANDI predicts future attack actions accurately as long as the attack is not part of a coordinated attack and contains no insider threats. In the presence of abnormal attack events, TANDI will alarm the network analyst for further analysis. The attempt to evaluate a threat assessment algorithm via simulation is the first in the literature, and shall open up a new avenue in the area of high level fusion.

  20. A combined emitter threat assessment method based on ICW-RCM

    Science.gov (United States)

    Zhang, Ying; Wang, Hongwei; Guo, Xiaotao; Wang, Yubing

    2017-08-01

    Considering that the tradition al emitter threat assessment methods are difficult to intuitively reflect the degree of target threaten and the deficiency of real-time and complexity, on the basis of radar chart method(RCM), an algorithm of emitter combined threat assessment based on ICW-RCM (improved combination weighting method, ICW) is proposed. The coarse sorting is integrated with fine sorting in emitter combined threat assessment, sequencing the emitter threat level roughly accordance to radar operation mode, and reducing task priority of the low-threat emitter; On the basis of ICW-RCM, sequencing the same radar operation mode emitter roughly, finally, obtain the results of emitter threat assessment through coarse and fine sorting. Simulation analyses show the correctness and effectiveness of this algorithm. Comparing with classical method of emitter threat assessment based on CW-RCM, the algorithm is visual in image and can work quickly with lower complexity.

  1. Modeling and Security Threat Assessments of Data Processed in Cloud Based Information Systems

    Directory of Open Access Journals (Sweden)

    Darya Sergeevna Simonenkova

    2016-03-01

    Full Text Available The subject of the research is modeling and security threat assessments of data processed in cloud based information systems (CBIS. This method allow to determine the current security threats of CBIS, state of the system in which vulnerabilities exists, level of possible violators, security properties and to generate recommendations for neutralizing security threats of CBIS.

  2. Ecologically relevant neurobehavioral assessment of the development of threat learning.

    Science.gov (United States)

    Boulanger Bertolus, Julie; Mouly, Anne-Marie; Sullivan, Regina M

    2016-10-01

    As altricial infants gradually transition to adults, their proximate environment changes. In three short weeks, pups transition from a small world with the caregiver and siblings to a complex milieu rich in dangers as their environment expands. Such contrasting environments require different learning abilities and lead to distinct responses throughout development. Here, we will review some of the learned fear conditioned responses to threats in rats during their ontogeny, including behavioral and physiological measures that permit the assessment of learning and its supporting neurobiology from infancy through adulthood. In adulthood, odor-shock conditioning produces robust fear learning to the odor that depends upon the amygdala and related circuitry. Paradoxically, this conditioning in young pups fails to support fear learning and supports approach learning to the odor previously paired with shock. This approach learning is mediated by the infant attachment network that does not include the amygdala. During the age range when pups transition from the infant to the adult circuit (10-15 d old), pups have access to both networks: odor-shock conditioning in maternal presence uses the attachment circuit but the adult amygdala-dependent circuit when alone. However, throughout development (as young as 5 d old) the attachment associated learning can be overridden and amygdala-dependent fear learning supported, if the mother expresses fear in the presence of the pup. This social modulation of the fear permits the expression of defense reactions in life threatening situations informed by the caregiver but prevents the learning of the caregiver itself as a threat. © 2016 Boulanger Bertolus et al.; Published by Cold Spring Harbor Laboratory Press.

  3. Ecologically relevant neurobehavioral assessment of the development of threat learning

    Science.gov (United States)

    Mouly, Anne-Marie

    2016-01-01

    As altricial infants gradually transition to adults, their proximate environment changes. In three short weeks, pups transition from a small world with the caregiver and siblings to a complex milieu rich in dangers as their environment expands. Such contrasting environments require different learning abilities and lead to distinct responses throughout development. Here, we will review some of the learned fear conditioned responses to threats in rats during their ontogeny, including behavioral and physiological measures that permit the assessment of learning and its supporting neurobiology from infancy through adulthood. In adulthood, odor–shock conditioning produces robust fear learning to the odor that depends upon the amygdala and related circuitry. Paradoxically, this conditioning in young pups fails to support fear learning and supports approach learning to the odor previously paired with shock. This approach learning is mediated by the infant attachment network that does not include the amygdala. During the age range when pups transition from the infant to the adult circuit (10–15 d old), pups have access to both networks: odor–shock conditioning in maternal presence uses the attachment circuit but the adult amygdala-dependent circuit when alone. However, throughout development (as young as 5 d old) the attachment associated learning can be overridden and amygdala-dependent fear learning supported, if the mother expresses fear in the presence of the pup. This social modulation of the fear permits the expression of defense reactions in life threatening situations informed by the caregiver but prevents the learning of the caregiver itself as a threat. PMID:27634146

  4. Cyber threat impact assessment and analysis for space vehicle architectures

    Science.gov (United States)

    McGraw, Robert M.; Fowler, Mark J.; Umphress, David; MacDonald, Richard A.

    2014-06-01

    This paper covers research into an assessment of potential impacts and techniques to detect and mitigate cyber attacks that affect the networks and control systems of space vehicles. Such systems, if subverted by malicious insiders, external hackers and/or supply chain threats, can be controlled in a manner to cause physical damage to the space platforms. Similar attacks on Earth-borne cyber physical systems include the Shamoon, Duqu, Flame and Stuxnet exploits. These have been used to bring down foreign power generation and refining systems. This paper discusses the potential impacts of similar cyber attacks on space-based platforms through the use of simulation models, including custom models developed in Python using SimPy and commercial SATCOM analysis tools, as an example STK/SOLIS. The paper discusses the architecture and fidelity of the simulation model that has been developed for performing the impact assessment. The paper walks through the application of an attack vector at the subsystem level and how it affects the control and orientation of the space vehicle. SimPy is used to model and extract raw impact data at the bus level, while STK/SOLIS is used to extract raw impact data at the subsystem level and to visually display the effect on the physical plant of the space vehicle.

  5. Threat Assessment of Small Near-Earth Objects

    Science.gov (United States)

    Ryan, E.; Ryan, W.

    2010-09-01

    Researchers at the Magdalena Ridge Observatory’s (MRO) 2.4-meter telescope facility are in their third year of a program to derive physical characterization information on some of the smallest (less than 200 meters in diameter) objects in the Near-Earth Object (NEO) population. Tiny comets and asteroids are being discovered by survey programs on a routine basis, so targets available for study have been abundant. Our primary objective is to derive rotation rates for these objects, and to place the results in context with previous data to enhance our understanding of asteroid impact physics and better address the threat from NEOs having Earth-crossing orbits. Rotation rate can be used to infer internal structure, which is a physical property important to assessing the energy needed for object disruption or other forms of hazard mitigation. Since the existing database of rotational data derived from lightcurves of objects in this small size regime is sparse, collection of additional observational data is beneficial. Acquiring more knowledge about the physical nature of NEOs not only contributes to general scientific pursuits, but is important to planetary defense.

  6. Threat Assessment of Potential Terrorist Attacks to the Transport Infrastructure

    Directory of Open Access Journals (Sweden)

    Gabriel Nowacki

    2014-06-01

    Full Text Available The paper presents threat assessment of potential terrorist attacks to the transport infrastructure. The range of transportation infrastructure has spread and includes railway, inland waterways, road, maritime, air, intermodal transport infrastructure and intelligent transport systems (ITS. ITS service is the provision of an ITS application through a well-defined organisational and operational framework with the aim of contributing to the user safety, efficiency, comfort and/or to facilitate or support transport and travel operations. Terrorism means acts of violence committed by groups that view themselves as victimized by some notable historical wrong. Although these groups have no formal connection with governments, they usually have the financial and moral backing of sympathetic governments. Typically, they stage unexpected attacks on civilian targets, including transport infrastructure, with the aim of sowing fear and confusion. Based on the analyses, transportation infrastructure is potentially threatened with terrorism attacks, especially road and rail infrastructure (about 23 %, and to a smaller degree the maritime and air transport infrastructure (about 2 %. There were 90,3% of incidents involve land transport (74,5% – vehicles, 9,5% – buses, 6,3% - rail covered the 41-year period 1967-2007 in the USA. Legal steps to fight terrorism have been taken on the international level, furthermore, some institutions have been established for this purpose.

  7. Assessment of wind erosion threat for soils in cadastral area of Hajske

    International Nuclear Information System (INIS)

    Muchova, Z.; Stredanska, A.

    2008-01-01

    This contribution illustrates the application of methods of erosion threat assessment in lan adaptation projects. Calculations of the soil erosion index of particular soil blocks are demonstrated for the cadastral area of Hajske. Two methods for assessment of erosion threat have been applied. First the assessment based on the ecological soil-quality units (ESQU) has been performed. Next, the Pasak method for a detailed analysis of the soil erosion threat was applied. Both of the mentioned approaches are recommended for the land adaption projects. Based on the results, the soil blocks have been ranked by their soil erosion threat. (authors)

  8. Software Requirement Specifications For ASocial Media Threat Assessment Tool

    Science.gov (United States)

    2017-12-01

    media means a much higher volume of threats than before, which taxes law enforcement’s ability to investigate each one. Complicating the investigation...Obtaining the identity of a Twitter account holder requires court paperwork based on probable cause or exigent circumstances. Second, social media...instant connectivity of social media means a much higher number of threats than before, which taxes law enforcement’s ability to investigate each one

  9. Improvised Incendiary Devices: Risk Assessment, Threats, Vulnerabilities and Consequences

    Science.gov (United States)

    2006-09-01

    Earth Liberation Front (ELF). These groups are primarily concerned with attacking symbols of capitalism and exploitation: businesses they perceive to...that between 1,200 and 2,500 people perished in the Peshtigo fire. The Triangle Factory fire, which occurred in a sweatshop in New York City in 1911, is

  10. The Legal Side of Campus Threat Assessment and Management: What Student Counselors Need to Know

    Science.gov (United States)

    Nolan, Jeffrey J.; Moncure, Thomas M., Jr.

    2012-01-01

    This article identifies what student mental health professionals need to know about legal issues of relevance to threat assessment and management. The article summarizes the common law duties and the common law and statutory standards of care that are likely to apply to the work of college and university threat assessment and management teams. The…

  11. Development, Evaluation, and Future Directions of the Virginia Student Threat Assessment Guidelines

    Science.gov (United States)

    Cornell, Dewey; Allen, Korrie

    2011-01-01

    The Virginia Student Threat Assessment Guidelines were developed in response to studies of school shootings conducted by the U.S. Federal Bureau of Investigation, U.S. Secret Service, and U.S. Department of Education that recommended schools should adopt a threat assessment approach to prevent targeted violence. This article reviews the…

  12. Security threat assessment of an Internet security system using attack tree and vague sets.

    Science.gov (United States)

    Chang, Kuei-Hu

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.

  13. A Cyber Security Risk Assessment of Hospital Infrastructure including TLS/SSL and other Threats

    OpenAIRE

    Millar, Stuart

    2016-01-01

    Cyber threats traditionally target governments, financial institutions and businesses. However, of growing concern is the threat to healthcare organizations. This study conducts a cyber security risk assessment of a theoretical hospital environment, to include TLS/SSL, which is an encryption protocol for network communications, plus other physical, logical and human threats. Despite significant budgets in the UK for the NHS, the spend on cyber security appears worryingly low and many hospital...

  14. Nationwide assessment of nonpoint source threats to water quality

    Science.gov (United States)

    Thomas C. Brown; Pamela Froemke

    2012-01-01

    Water quality is a continuing national concern, in part because the containment of pollution from nonpoint (diffuse) sources remains a challenge. We examine the spatial distribution of nonpoint-source threats to water quality. On the basis of comprehensive data sets for a series of watershed stressors, the relative risk of water-quality impairment was estimated for the...

  15. Including threat actor capability and motivation in risk assessment for Smart GRIDs

    NARCIS (Netherlands)

    Rossebo, J.E.Y.; Fransen, F.; Luiijf, H.A.M.

    2016-01-01

    The SEGRID (Security for Smart Electricity GRIDs) collaboration project, funded by the EU under the FP7 program investigates risk assessment methodologies and their possible need for enhancement. In this paper we discuss the need to include threat actor analysis in threat, vulnerability and risk

  16. Conservation physiology can inform threat assessment and recovery planning processes for threatened species

    DEFF Research Database (Denmark)

    Birnie-Gauvin, Kim; Walton, Sarah; Delle Palme, Caleigh A.

    2017-01-01

    threat assessments and work with partners to develop recovery plans. Here we argue that conservation physiology has much to offer for the threat assessment process and outline the ways in which this can be operationalized. For instance, conservation physiology is effective at revealing causal...... role in the conservation activities of bodies like the IUCN that are engaged in threat assessment and recovery of endangered organisms. Although we focus on activities at the international scale, these same concepts are relevant and applicable to national and regional bodies...

  17. Assessing the Biological Threat Posed by Suicide Bombers

    Science.gov (United States)

    2016-02-01

    the test by about 350’, it is clear some aerosol particles “ surfed ” the shockwave from the blast and were carried a distance upwind. Had the sampling...projectiles implantation in victims of suicide bombings and implications for health and emergency care provideres: the 7/7 experience, Ann R Coll Surg Engl...Ebola in East Africa and Implications for Global Health and Security, Global Policy 2013. (8) Ustun, C.; Ozgurler, O., Ebola: A Significant Threat as

  18. Nuclear Terrorism: Assessing the Threat, Developing a Response

    Science.gov (United States)

    2009-01-01

    milling facilities to crush the ore and extract the uranium concentrate, a process that yields what is often called yellowcake. The yellowcake would then...issued by the Baker-Cutler Task Force described the threat, “In a worst-case scenario, a nuclear engineer graduate with a grapefruit -sized lump of HEU...stealing spent power reactor fuel or fresh (unirradiated) MOX fuel, both of which would need to have their plutonium chemically extracted . While separating

  19. Algae Assessment of Threats to Freshwater Ecosystems: Trends, Challenges, and Opportunities

    Science.gov (United States)

    As human populations continue to grow, the demands for freshwater resources and ecosystem services are increasing along with concomitant threats to their quality and sustainability. Algal communities in streams, lakes, and wetlands offer powerful insight into assessing and managi...

  20. Device for assessing radio-photoluminescence glasses

    International Nuclear Information System (INIS)

    Hoegl, A.; Schubert, K.

    1979-01-01

    The UV light irradiating the glass and the luminescence light caused by the UV light are collected in separate measuring paths. In order to correct the affect of changes of intensity of the UV light source on the amount of luminescence, both measuring paths are connected by programmed control, a comparison device and a correcting device. There are integrating stages in both measuring paths, which are followed by analogue digital converters with an assessment device. (DG) [de

  1. Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets

    OpenAIRE

    Kuei-Hu Chang

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system’s elementary event are incomplete—the traditional approach for ca...

  2. An Ecological Assessment of the Pandemic Threat of Zika Virus.

    Science.gov (United States)

    Carlson, Colin J; Dougherty, Eric R; Getz, Wayne

    2016-08-01

    The current outbreak of Zika virus poses a severe threat to human health. While the range of the virus has been cataloged growing slowly over the last 50 years, the recent explosive expansion in the Americas indicates that the full potential distribution of Zika remains uncertain. Moreover, many studies rely on its similarity to dengue fever, a phylogenetically closely related disease of unknown ecological comparability. Here we compile a comprehensive spatially-explicit occurrence dataset from Zika viral surveillance and serological surveys based in its native range, and construct ecological niche models to test basic hypotheses about its spread and potential establishment. The hypothesis that the outbreak of cases in Mexico and North America are anomalous and outside the native ecological niche of the disease, and may be linked to either genetic shifts between strains, or El Nino or similar climatic events, remains plausible at this time. Comparison of the Zika niche against the known distribution of dengue fever suggests that Zika is more constrained by the seasonality of precipitation and diurnal temperature fluctuations, likely confining autochthonous non-sexual transmission to the tropics without significant evolutionary change. Projecting the range of the diseases in conjunction with three major vector species (Aedes africanus, Ae. aegypti, and Ae. albopictus) that transmit the pathogens, under climate change, suggests that Zika has potential for northward expansion; but, based on current knowledge, our models indicate Zika is unlikely to fill the full range its vectors occupy, and public fear of a vector-borne Zika epidemic in the mainland United States is potentially informed by biased or limited scientific knowledge. With recent sexual transmission of the virus globally, we caution that our results only apply to the vector-borne transmission route of the pathogen, and while the threat of a mosquito-carried Zika pandemic may be overstated in the media

  3. Assessing the potential threat landscape of a proposed reintroduction site for carnivores.

    Directory of Open Access Journals (Sweden)

    Samantha K Page

    Full Text Available This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent's first language (isiXhosa had more positive indices, education level (poorer education was synonymous with more positive threat indices, land use (wildlife ranching being the most negative and land tenure (community respondents had more positive indices than private landowners. Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid.

  4. Assessing the potential threat landscape of a proposed reintroduction site for carnivores.

    Science.gov (United States)

    Page, Samantha K; Parker, Daniel M; Peinke, Dean M; Davies-Mostert, Harriet T

    2015-01-01

    This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus) as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent's first language (isiXhosa had more positive indices), education level (poorer education was synonymous with more positive threat indices), land use (wildlife ranching being the most negative) and land tenure (community respondents had more positive indices than private landowners). Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid.

  5. The role of warning behaviors in threat assessment: an exploration and suggested typology.

    Science.gov (United States)

    Reid Meloy, J; Hoffmann, Jens; Guldimann, Angela; James, David

    2012-01-01

    The concept of warning behaviors offers an additional perspective in threat assessment. Warning behaviors are acts which constitute evidence of increasing or accelerating risk. They are acute, dynamic, and particularly toxic changes in patterns of behavior which may aid in structuring a professional's judgment that an individual of concern now poses a threat - whether the actual target has been identified or not. They require an operational response. A typology of eight warning behaviors for assessing the threat of intended violence is proposed: pathway, fixation, identification, novel aggression, energy burst, leakage, directly communicated threat, and last resort warning behaviors. Previous research on risk factors associated with such warning behaviors is reviewed, and examples of each warning behavior from various intended violence cases are presented, including public figure assassination, adolescent and adult mass murder, corporate celebrity stalking, and both domestic and foreign acts of terrorism. Practical applications and future research into warning behaviors are suggested. Copyright © 2011 John Wiley & Sons, Ltd.

  6. Data fusion approach to threat assessment for radar resources management

    Science.gov (United States)

    Komorniczak, Wojciech; Pietrasinski, Jerzy; Solaiman, Basel

    2002-03-01

    The paper deals with the problem of the multifunction radar resources management. The problem consists of target/tasks ranking and tasks scheduling. The paper is focused on the target ranking, with the data fusion approach. The data from the radar (object's velocity, range, altitude, direction etc.), IFF system (Identification Friend or Foe) and ESM system (Electronic Support Measures - information concerning threat's electro - magnetic activities) is used to decide of the importance assignment for each detected target. The main problem consists of the multiplicity of various types of the input information. The information from the radar is of the probabilistic or ambiguous imperfection type and the IFF information is of evidential type. To take the advantage of these information sources the advanced data fusion system is necessary. The system should deal with the following situations: fusion of the evidential and fuzzy information, fusion of the evidential information and a'priori information. The paper describes the system which fuses the fuzzy and the evidential information without previous change to the same type of information. It is also described the proposal of using of the dynamic fuzzy qualifiers. The paper shows the results of the preliminary system's tests.

  7. Assessing the threat of chikungunya virus emergence in Australia.

    Science.gov (United States)

    Viennet, Elvina; Knope, Katrina; Faddy, Helen M; Williams, Craig R; Harley, David

    2013-06-30

    Chikungunya virus (CHIKV) is a major threat to Australia given the distribution of competent vectors, and the large number of travellers returning from endemic regions. We describe current knowledge of CHIKV importations into Australia, and quantify reported viraemic cases, with the aim of facilitating the formulation of public health policy and ensuring maintenance of blood safety. Cases reported to the National Notifiable Disease Surveillance System (NNDSS) from 2002 to 2012 were analysed by place, month of acquisition, and place of residence. Rates of chikungunya importation were estimated based on reported cases and on the numbers of short-term movements. Between 2002 and 2012, there were 168 cases of chikungunya virus (CHIKV) imported into Australia. Victoria and New South Wales had the largest number of notifications. The main sources were Indonesia, India and Malaysia. The number of cases increased from 2008 to reach a peak in 2010 (n=64; 40%). Although Indonesia accounted for the majority of CHIKV notifications in Australia, travel from India had the highest CHIKV importation rate (number of imported cases per 100,000 travellers). The Australian population is increasingly at risk from CHIKV. Arrivals from endemic countries have increased concurrently with vector incursions via imported goods, as well as via local movement from the Torres Strait to North Queensland ports. An outbreak of CHIKV could have a significant impact on health, the safety of the blood supply and on tourism. Case and vector surveillance as well as population health responses are crucial for minimising any potential impact of CHIKV establishment in Australia. This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without prior written permission from the Commonwealth. Requests and inquiries concerning reproduction and rights should be addressed to the Commonwealth Copyright Administration, Attorney General

  8. Wireless Phone Threat Assessment for Aircraft Communication and Navigation Radios

    Science.gov (United States)

    Nguyens, T. X.; Koppen, S. V.; Smith, L. J.; Williams, R. A.; Salud, M. T.

    2005-01-01

    Emissions in aircraft communication and navigation bands are measured for the latest generation of wireless phones. The two wireless technologies considered, GSM/GPRS and CDMA2000, are the latest available to general consumers in the U.S. A base-station simulator is used to control the phones. The measurements are conducted using reverberation chambers, and the results are compared against FCC and aircraft installed equipment emission limits. The results are also compared against baseline emissions from laptop computers and personal digital assistant devices that are currently allowed to operate on aircraft.

  9. 49 CFR 1572.5 - Standards for security threat assessments.

    Science.gov (United States)

    2010-10-01

    ... assessment includes biometric identification and a biometric credential. (2) To apply for a comparability... process and provide biometric information to obtain a TWIC, if the applicant seeks unescorted access to a...

  10. Using historical photography to monitor and assess threats over time

    Science.gov (United States)

    Don. Evans

    2010-01-01

    Analysis of aerial photography is perhaps the best way to assess changes in landcover conditions. In the United States, most national forests have repeat photography on approximately a 10-year cycle. Analysis of this rich photo record can reveal changes in insect damage, fuels buildup, unmanaged off-highway vehicle use, loss of open space, and other land-cover...

  11. DoD Comprehensive Military Unmanned Aerial Vehicle Smart Device Ground Control Station Threat Model

    Science.gov (United States)

    2015-04-01

    Streff, & Raman , 2012). Current hardware and communica- tion threat models are tailored to specific systems or areas of interest. Recently...Security (HST) (pp. 585- 590 ), Waltham, MA, November 13–15. Jeon, W., Kim, J., Lee, Y., & Won, D. (2011, July). A practical analysis of smartphone...Communications of the ACM, 43(6), 73–81. Wang, Y., Streff, K., & Raman , S. (2012). Smartphone security challenges. Computer, 45(12), 52–58. Whitman, M

  12. Protecting computer-based medical devices: defending against viruses and other threats.

    Science.gov (United States)

    2005-07-01

    The increasing integration of computer hardware has exposed medical devices to greater risks than ever before. More and more devices rely on commercial off-the-shelf software and operating systems, which are vulnerable to the increasing proliferation of viruses and other malicious programs that target computers. Therefore, it is necessary for hospitals to take steps such as those outlined in this article to ensure that their computer-based devices are made safe and continue to remain safe in the future. Maintaining the security of medical devices requires planning, careful execution, and a commitment of resources. A team should be created to develop a process for surveying the security status of all computerized devices in the hospital and making sure that patches and other updates are applied as needed. These patches and updates should be approved by the medical system supplier before being implemented. The team should consider using virtual local area networks to isolate susceptible devices on the hospital's network. All security measures should be carefully documented, and the documentation should be kept up-to-date. Above all, care must be taken to ensure that medical device security involves a collaborative, supportive partnership between the hospital's information technology staff and biomedical engineering personnel.

  13. Assessing Women's Responses to Sexual Threat: Validity of a Virtual Role-Play Procedure

    Science.gov (United States)

    Jouriles, Ernest N.; Rowe, Lorelei Simpson; McDonald, Renee; Platt, Cora G.; Gomez, Gabriella S.

    2011-01-01

    This study evaluated the validity of a role-play procedure that uses virtual reality technology to assess women's responses to sexual threat. Forty-eight female undergraduate students were randomly assigned to either a standard, face-to-face role-play (RP) or a virtual role-play (VRP) of a sexually coercive situation. A multimethod assessment…

  14. 2007 accomplishment report for the Eastern and Western forest environmental threat assessment centers

    Science.gov (United States)

    Danny C. Lee; Jerome S. Beatty

    2008-01-01

    As chance would have it, the Eastern Forest and Western Wildland Environmental Threat Assessment Centers were created the same year (2005) that the Forest Service celebrated its centennial anniversary as an agency of the U.S. Department of Agriculture. The historic birth of the Forest Service provides a nice backdrop to view our own more modest beginnings. Both events...

  15. 49 CFR 192.923 - How is direct assessment used and for what threats?

    Science.gov (United States)

    2010-10-01

    ...) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Gas Transmission Pipeline Integrity Management § 192.923 How is direct assessment used and for what threats? (a...

  16. 49 CFR 1522.121 - Security threat assessments for personnel of TSA-approved validation firms.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security threat assessments for personnel of TSA... FOR ALL MODES OF TRANSPORTATION TSA-APPROVED VALIDATION FIRMS AND VALIDATORS TSA-Approved Validation... for personnel of TSA-approved validation firms. Each of the following must successfully complete a...

  17. An Analysis of Campus Violence Threat Assessment Policy Implementation at Michigan Community Colleges

    Science.gov (United States)

    Panico, Russell T., Jr.

    2016-01-01

    This dissertation evaluated campus violence threat assessment policy and procedure implementation at the community college level of higher education. The importance of this topic was to provide a manageable and collaborative initiative for leadership at institutions of higher learning to identify, develop, implement, and evaluate a policy that can…

  18. Conceptual framework for improved wind-related forest threat assessment in the Southeastern United States

    Science.gov (United States)

    Scott L. Goodrick; John A. Stanturf

    2010-01-01

    In the Southeastern United States, forests are subject to a variety of damage-causing wind phenomena that range in scale from very localized (downbursts and tornadoes) to broad spatial scales (hurricanes). Incorporating the threat of wind damage into forest management plans requires tools capable of assessing risk across this range of scales. Our conceptual approach...

  19. Modeling threat assessments of water supply systems using markov latent effects methodology.

    Energy Technology Data Exchange (ETDEWEB)

    Silva, Consuelo Juanita

    2006-12-01

    Recent amendments to the Safe Drinking Water Act emphasize efforts toward safeguarding our nation's water supplies against attack and contamination. Specifically, the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 established requirements for each community water system serving more than 3300 people to conduct an assessment of the vulnerability of its system to a terrorist attack or other intentional acts. Integral to evaluating system vulnerability is the threat assessment, which is the process by which the credibility of a threat is quantified. Unfortunately, full probabilistic assessment is generally not feasible, as there is insufficient experience and/or data to quantify the associated probabilities. For this reason, an alternative approach is proposed based on Markov Latent Effects (MLE) modeling, which provides a framework for quantifying imprecise subjective metrics through possibilistic or fuzzy mathematics. Here, an MLE model for water systems is developed and demonstrated to determine threat assessments for different scenarios identified by the assailant, asset, and means. Scenario assailants include terrorists, insiders, and vandals. Assets include a water treatment plant, water storage tank, node, pipeline, well, and a pump station. Means used in attacks include contamination (onsite chemicals, biological and chemical), explosives and vandalism. Results demonstrated highest threats are vandalism events and least likely events are those performed by a terrorist.

  20. Cyber Threat Assessment of Uplink and Commanding System for Mission Operation

    Science.gov (United States)

    Ko, Adans Y.; Tan, Kymie M. C.; Cilloniz-Bicchi, Ferner; Faris, Grant

    2014-01-01

    Most of today's Mission Operations Systems (MOS) rely on Ground Data System (GDS) segment to mitigate cyber security risks. Unfortunately, IT security design is done separately from the design of GDS' mission operational capabilities. This incoherent practice leaves many security vulnerabilities in the system without any notice. This paper describes a new way to system engineering MOS, to include cyber threat risk assessments throughout the MOS development cycle, without this, it is impossible to design a dependable and reliable MOS to meet today's rapid changing cyber threat environment.

  1. Existential Threat or Dissociative Response? Examining Defensive Avoidance of Point-of-Care Testing Devices Through a Terror Management Theory Framework.

    Science.gov (United States)

    Dunne, Simon; Gallagher, Pamela; Matthews, Anne

    2015-01-01

    Using a terror management theory framework, this study investigated if providing mortality reminders or self-esteem threats would lead participants to exhibit avoidant responses toward a point-of-care testing device for cardiovascular disease risk and if the nature of the device served to diminish the existential threat of cardiovascular disease. One hundred and twelve participants aged 40-55 years completed an experimental questionnaire. Findings indicated that participants were not existentially threatened by established terror management methodologies, potentially because of cross-cultural variability toward such methodologies. Highly positive appraisals of the device also suggest that similar technologies may beneficially affect the uptake of screening behaviors.

  2. Assessing the integrity of local area network materials accountability systems against insider threats

    International Nuclear Information System (INIS)

    Jones, E.; Sicherman, A.

    1996-07-01

    DOE facilities rely increasingly on computerized systems to manage nuclear materials accountability data and to protect against diversion of nuclear materials or other malevolent acts (e.g., hoax due to falsified data) by insider threats. Aspects of modern computerized material accountability (MA) systems including powerful personal computers and applications on networks, mixed security environments, and more users with increased knowledge, skills and abilities help heighten the concern about insider threats to the integrity of the system. In this paper, we describe a methodology for assessing MA applications to help decision makers identify ways of and compare options for preventing or mitigating possible additional risks from the insider threat. We illustrate insights from applying the methodology to local area network materials accountability systems

  3. METHODS FOR ASSESSING SECURITY THREATS CONFIDENTIAL INFORMATION FOR THE INFORMATION AND TELECOMMUNICATIONS SYSTEMS

    Directory of Open Access Journals (Sweden)

    E. V. Belokurova

    2015-01-01

    Full Text Available The article discusses the different approaches to assessing the safety of confidential information-term for information and telecommunication systems of various pre-appreciable destination in the presence of internal and external threats to its integrity and availability. The difficulty of ensuring the security of confidential information from exposure to information and telecommunication systems of external and internal threats at the present time, is of particular relevance. This problem is confirmed by the analysis of available statistical information on the impact of threats on the security circulating in the information and telecommunications system. Leak confidential information, intellectual property, information, know-how is the result of significant material and moral damage caused to the owner of the restricted information. The paper presents the structure of the indicators and criteria shows that the most promising are analytical criteria. However, their use to assess the level of security of confidential information is difficult due to the lack of appropriate mathematical models. The complexity of the problem is that existing traditional mathematical models are not always appropriate for the stated objectives. Therefore, it is necessary to develop mathematical models designed to assess the security of confidential information and its impact on information and telecommunication system threats.

  4. The threat of nuclear terrorism: Nuclear weapons or other nuclear explosive devices

    International Nuclear Information System (INIS)

    Maerli, Morten Bremer

    2001-01-01

    Full text: Conventional weaponry and tactics are likely to remain the primary terrorist means for a definitive majority of sub-national groups. No non-state actors have ever deployed or used a nuclear device. However, recent developments in international terrorism may point in the direction of future terrorist uses of weapons of mass destruction, including nuclear devices. Some terrorist groups with a high international profile have showed disturbing interests in acquiring nuclear weapon capabilities. As the 'terrorist nuclear weapon standards' are likely to be lower than the strict requirements for traditional state nuclear weapons, technical barriers should not be considered sufficient to avoid future nuclear terrorist violence. Preventing any extremist group from achieving their goals of large-scale nuclear killing is likely best done by preventing the access to fissile materials through state compliances to rigorous standards of Material Protection, Control and Accountability (MPC and A). (author)

  5. How Stereotype Threat Affects Healthy Older Adults' Performance on Clinical Assessments of Cognitive Decline: The Key Role of Regulatory Fit.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara; Gatz, Margaret

    2015-11-01

    Stereotype threat can impair older adults' performance on clinical assessments for cognitive decline. We examined why this occurs. Based upon the regulatory focus account of stereotype threat, we predicted that the effects of stereotype threat should depend upon the assessments' reward structure. Stereotype threat should be associated with poor performance when the assessment emphasizes gaining correct answers, but not when it emphasizes avoiding mistakes. Healthy older adults completed a series of mental status examinations. Half of the participants completed these examinations under stereotype threat about their cognitive abilities. Monetary incentives were also manipulated. For half of the participants correct responding led to gains. For the remaining participants incorrect responding/forgetting led to losses. Consistent with the regulatory focus account, stereotype threat was associated with poor performance when the mental status examinations had a gains-based structure, but not when they had a losses-based structure. Older adults respond to stereotype threat by becoming vigilant to avoid the losses that will make them their worst. Researchers and clinicians can capitalize on this motivational change to combat stereotype threat's negative effects. By using a loss-avoidance frame, stereotype threat's negative effects can be attenuated or even eliminated. © The Author 2015. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  6. Assessing loss event frequencies of smart grid cyber threats: Encoding flexibility into FAIR using Bayesian network approach

    NARCIS (Netherlands)

    Le, Anhtuan; Chen, Yue; Chai, Kok Keong; Vasenev, Alexandr; Montoya, L.

    Assessing loss event frequencies (LEF) of smart grid cyber threats is essential for planning cost-effective countermeasures. Factor Analysis of Information Risk (FAIR) is a well-known framework that can be applied to consider threats in a structured manner by using look-up tables related to a

  7. Dual-Use Threat Assessment Framework - An Attempt to Quantify the Risk

    International Nuclear Information System (INIS)

    Stephen, E. R.; Lavigne, J. J.; Colton, B.

    2007-01-01

    Advances in the biosciences over the past decade have been rapid and transformative. While these advances offer significant benefit to society, they also provide very significant challenges in terms of security. Concerns over misuse and/or accidental use/release (dual use) although not new, are now being viewed through the security lens. There is a wide-spread view that public or private sector scientists, supported through investments by pharmaceutical, environmental and agricultural interests working in the fields that comprise biotechnology, posses the ability to assess the implications of their own work and work within a regime of self-control that is for the most part self-governing (codes of practice). On the other end of the spectrum are those that would codify or legislative control. All this is being done in the absence of a mechanism for quantifying the threat. This presentation will discuss the development of an assessment framework that addresses both actual and potential threats. The framework was developed based on available intelligence and other open source information along with interviews with those persons familiar with the concept of dual use and the multiple, sometimes competing agendas of a variety of interest groups. The framework will help to bring some clarity to the discussion and at the same time, help to inform those that are positioned to respond to the threat. (author)

  8. An integrated approach to risk assessment and mitigating the CBRN threat

    International Nuclear Information System (INIS)

    Bokan, S.

    2009-01-01

    CBRN mass casualty events threat mitigation remains today the highest international priority. Although significant progress has been made, the national security requirements for efforts to combat Weapons of Mass Destruction and Weapons of Mass Disruption will be of the highest national priority in the near future. An integration of a number of approaches is essential in the risk assessment and mitigating the CBRN treat. Preparedness measures and procedures, engineering, science and technology, policy, medical, and emergency response are essential to reduce the threat from the proliferation and use of weapons of mass destruction (WMD). Improved coordination between international, public and private security entities is also essential task to hopefully prevent the terrorist attacks. In this lecture, it will be presented very important scientific approach to risk assessment of potential use of nuclear, radiological, biological or chemical weapons in terrorist actions. An integrated approach for mitigating the CBRN threat, crisis management and preparedness measures for prevention and reduction of potential consequences, will be presented.(author)

  9. How Threat Assessment Could Become Self-Fulfilling Prophecy: Case of U.S.-China Relations

    Directory of Open Access Journals (Sweden)

    Muhamad Arif

    2016-12-01

    Full Text Available This article tries to explain how misperception can trigger conflict between countries. The article would employ spiral model of conflict proposed by Robert Jervis as a theoretical framework to scrutinize contemporary US and Chinese contemporary competition. As a result, this paper shows how threat assessment could trigger a spiral of conflict through state’s tendency to overestimate threat level and its failure to perceive that defensive behavior can be interpreted as offensive by the belligerent. Based on this analysis, the probability of conflicts can be reduced as each country tries to comprehend motivations that drive other behavior, perceptions and reactions that might arise as a result of the strategic empathy.

  10. Environmental and health impacts of fine and ultrafine metallic particles: Assessment of threat scores

    Energy Technology Data Exchange (ETDEWEB)

    Goix, Sylvaine [Université de Toulouse, INP-ENSAT, Av. Agrobiopôle, 31326 Castanet-Tolosan (France); UMR 5245 CNRS-INP-UPS, EcoLab (Laboratoire d' écologie fonctionnelle), Avenue de l' Agrobiopôle, BP 32607, 31326 Castanet-Tolosan (France); Lévêque, Thibaut [Université de Toulouse, INP-ENSAT, Av. Agrobiopôle, 31326 Castanet-Tolosan (France); UMR 5245 CNRS-INP-UPS, EcoLab (Laboratoire d' écologie fonctionnelle), Avenue de l' Agrobiopôle, BP 32607, 31326 Castanet-Tolosan (France); ADEME (French Agency for Environment and Energy Management), 20 Avenue du Grésillé, BP 90406, 49004 Angers Cedex 01 (France); Xiong, Tian-Tian [Université de Toulouse, INP-ENSAT, Av. Agrobiopôle, 31326 Castanet-Tolosan (France); UMR 5245 CNRS-INP-UPS, EcoLab (Laboratoire d' écologie fonctionnelle), Avenue de l' Agrobiopôle, BP 32607, 31326 Castanet-Tolosan (France); Schreck, Eva [Géosciences Environnement Toulouse (GET), Observatoire Midi Pyrénées, Université de Toulouse, CNRS, IRD, 14 Avenue E. Belin, F-31400 Toulouse (France); and others

    2014-08-15

    This study proposes global threat scores to prioritize the harmfulness of anthropogenic fine and ultrafine metallic particles (FMP) emitted into the atmosphere at the global scale. (Eco)toxicity of physicochemically characterized FMP oxides for metals currently observed in the atmosphere (CdO, CuO, PbO, PbSO{sub 4}, Sb{sub 2}O{sub 3}, and ZnO) was assessed by performing complementary in vitro tests: ecotoxicity, human bioaccessibility, cytotoxicity, and oxidative potential. Using an innovative methodology based on the combination of (eco)toxicity and physicochemical results, the following hazard classification of the particles is proposed: CdCl{sub 2}∼CdO>CuO>PbO>ZnO>PbSO{sub 4}>Sb{sub 2}O{sub 3}. Both cadmium compounds exhibited the highest threat score due to their high cytotoxicity and bioaccessible dose, whatever their solubility and speciation, suggesting that cadmium toxicity is due to its chemical form rather than its physical form. In contrast, the Sb{sub 2}O{sub 3} threat score was the lowest due to particles with low specific area and solubility, with no effects except a slight oxidative stress. As FMP physicochemical properties reveal differences in specific area, crystallization systems, dissolution process, and speciation, various mechanisms may influence their biological impact. Finally, this newly developed and global approach could be widely used in various contexts of pollution by complex metal particles and may improve risk management. - Highlights: • Seven micro- and nano- monometallic characterized particles were studied as references. • Bioaccessibility, eco and cytotoxicity, and oxidative potential assays were performed. • According to calculated threat scores: CdCl{sub 2}∼CdO>CuO>PbO>ZnO>PbSO{sub 4}>Sb{sub 2}O{sub 3}.

  11. Report of the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack: Critical National Infrastructures

    National Research Council Canada - National Science Library

    Foster, Jr., John S; Gjelde, Earl; Graham, William R; Hermann, Robert J; Kluepfel, Henry M; Lawson, Richard L; Soper, Gordon K; Wood, Lowell L; Woodard, Joan B

    2008-01-01

    ...) attack on our critical national infrastructures. An earlier report, Report of the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP), Volume 1: Executive Report (2004...

  12. Assessing Local and Surrounding Threats to the Protected Area Network in a Biodiversity Hotspot: The Hengduan Mountains of Southwest China.

    Science.gov (United States)

    Ye, Xin; Liu, Guohua; Li, Zongshan; Wang, Hao; Zeng, Yuan

    2015-01-01

    Protected areas (PAs) not only serve as refuges of biodiversity conservation but are also part of large ecosystems and are vulnerable to change caused by human activity from surrounding lands, especially in biodiversity hotspots. Assessing threats to PAs and surrounding areas is therefore a critical step in effective conservation planning. We apply a threat framework as a means of quantitatively assessing local and surrounding threats to different types of PAs with gradient buffers, and to main ecoregions in the Hengduan Mountain Hotspot of southwest China. Our findings show that national protected areas (NPAs) have lower and significantly lower threat values (pprotected areas (PPAs) and other protected areas (OPAs), respectively, which indicates that NPAs are lands with a lower threat level and higher levels of protection and management. PAs have clear edge effects, as the proportion of areas with low threat levels decline dramatically in the 5-kilometer buffers just outside the PAs. However, NPAs suffered greater declines (58.3%) than PPAs (34.8%) and OPAs (33.4%) in the 5-kilometer buffers. Moreover, a significant positive correlation was found between the size of PAs and the proportion of areas with low threat levels that they contained in both PAs and PA buffers (p<0.01). To control or mitigate current threats at the regional scale, PA managers often require quantitative information related to threat intensities and spatial distribution. The threat assessment in the Hengduan Mountain Hotspot will be useful to policy makers and managers in their efforts to establish effective plans and target-oriented management strategies.

  13. Beyond the Dirty Dozen: A Proposed Methodology for Assessing Future Bioweapon Threats.

    Science.gov (United States)

    Cieslak, Theodore J; Kortepeter, Mark G; Wojtyk, Ronald J; Jansen, Hugo-Jan; Reyes, Ricardo A; Smith, James O

    2018-01-01

    Defense policy planners and countermeasure developers are often faced with vexing problems involving the prioritization of resources and efforts. This is especially true in the area of Biodefense, where each new emerging infectious disease outbreak brings with it questions regarding the causative agent's potential for weaponization. Recent experience with West Nile Virus, Severe Acute Respiratory Syndrome, Monkeypox, and H1N1 Influenza highlights this problem. Appropriately, in each of these cases, the possibility of bioterrorism was raised, although each outbreak ultimately proved to have a natural origin. In fact, determining whether an outbreak has an unnatural origin can be quite difficult. Thus, the questions remain: could the causative agents of these and other emerging infectious disease outbreaks pose a future weaponization threat? And how great is that threat? Should precious resources be diverted from other defense efforts in order to prepare for possible hostile employment of novel diseases by belligerents? Answering such critical questions requires some form of systematic threat assessment. Through extensive collaborative work conducted within NATO's Biomedical Advisory Council, we developed a scoring matrix for evaluating the weaponization potential of the causative agents of such diseases and attempted to validate our matrix by examining the reproducibility of data using known threat agents. Our matrix included 12 attributes of a potential weapon and was provided, along with detailed scoring instructions, to 12 groups of biodefense experts in 6 NATO nations. Study participants were asked to score each of these 12 attributes on a scale of 0-3: Infectivity, Infection-to-Disease Ratio (Reliability), Predictability (& Incubation Period), Morbidity & Mortality (Virulence), Ease of Large-Scale Production & Storage, Aerosol Stability, Atmospheric Stability, Ease of Dispersal, Communicability, Prophylactic Countermeasure Availability, Therapeutic

  14. The family assessment device: an update.

    Science.gov (United States)

    Mansfield, Abigail K; Keitner, Gabor I; Dealy, Jennifer

    2015-03-01

    The current study set out to describe family functioning scores of a contemporary community sample, using the Family Assessment Device (FAD), and to compare this to a currently help-seeking sample. The community sample consisted of 151 families who completed the FAD. The help-seeking sample consisted of 46 families who completed the FAD at their first family therapy appointment as part of their standard care at an outpatient family therapy clinic at an urban hospital. Findings suggest that FAD means from the contemporary community sample indicate satisfaction with family functioning, while FAD scores from the help-seeking sample indicate dissatisfaction with family functioning. In addition, the General Functioning scale of the FAD continues to correlate highly with all other FAD scales, except Behavior Control. The cut-off scores for the FAD indicating satisfaction or dissatisfaction by family members with their family functioning continue to be relevant and the FAD continues to be a useful tool to assess family functioning in both clinical and research contexts. © 2014 Family Process Institute.

  15. Registry Assessment of Peripheral Interventional Devices (RAPID): Registry assessment of peripheral interventional devices core data elements.

    Science.gov (United States)

    Jones, W Schuyler; Krucoff, Mitchell W; Morales, Pablo; Wilgus, Rebecca W; Heath, Anne H; Williams, Mary F; Tcheng, James E; Marinac-Dabic, J Danica; Malone, Misti L; Reed, Terrie L; Fukaya, Rie; Lookstein, Robert A; Handa, Nobuhiro; Aronow, Herbert D; Bertges, Daniel J; Jaff, Michael R; Tsai, Thomas T; Smale, Joshua A; Zaugg, Margo J; Thatcher, Robert J; Cronenwett, Jack L

    2018-02-01

    The current state of evaluating patients with peripheral artery disease and more specifically of evaluating medical devices used for peripheral vascular intervention (PVI) remains challenging because of the heterogeneity of the disease process, the multiple physician specialties that perform PVI, the multitude of devices available to treat peripheral artery disease, and the lack of consensus about the best treatment approaches. Because PVI core data elements are not standardized across clinical care, clinical trials, and registries, aggregation of data across different data sources and physician specialties is currently not feasible. Under the auspices of the U.S. Food and Drug Administration's Medical Device Epidemiology Network initiative-and its PASSION (Predictable and Sustainable Implementation of the National Registries) program, in conjunction with other efforts to align clinical data standards-the Registry Assessment of Peripheral Interventional Devices (RAPID) workgroup was convened. RAPID is a collaborative, multidisciplinary effort to develop a consensus lexicon and to promote interoperability across clinical care, clinical trials, and national and international registries of PVI. The current manuscript presents the initial work from RAPID to standardize clinical data elements and definitions, to establish a framework within electronic health records and health information technology procedural reporting systems, and to implement an informatics-based approach to promote the conduct of pragmatic clinical trials and registry efforts in PVI. Ultimately, we hope this work will facilitate and improve device evaluation and surveillance for patients, clinicians, health outcomes researchers, industry, policymakers, and regulators. Copyright © 2017 Society for Vascular Surgery. All rights reserved.

  16. How Stereotype Threat Affects Healthy Older Adults’ Performance on Clinical Assessments of Cognitive Decline: The Key Role of Regulatory Fit

    Science.gov (United States)

    Mather, Mara; Gatz, Margaret

    2015-01-01

    Objectives. Stereotype threat can impair older adults’ performance on clinical assessments for cognitive decline. We examined why this occurs. Based upon the regulatory focus account of stereotype threat, we predicted that the effects of stereotype threat should depend upon the assessments’ reward structure. Stereotype threat should be associated with poor performance when the assessment emphasizes gaining correct answers, but not when it emphasizes avoiding mistakes. Method. Healthy older adults completed a series of mental status examinations. Half of the participants completed these examinations under stereotype threat about their cognitive abilities. Monetary incentives were also manipulated. For half of the participants correct responding led to gains. For the remaining participants incorrect responding/forgetting led to losses. Results. Consistent with the regulatory focus account, stereotype threat was associated with poor performance when the mental status examinations had a gains-based structure, but not when they had a losses-based structure. Discussion. Older adults respond to stereotype threat by becoming vigilant to avoid the losses that will make them their worst. Researchers and clinicians can capitalize on this motivational change to combat stereotype threat’s negative effects. By using a loss-avoidance frame, stereotype threat’s negative effects can be attenuated or even eliminated. PMID:25752896

  17. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  18. Assessing Potential of VIIRS Data for Contribution to a Forest Threat Early Warning System

    Science.gov (United States)

    Spruce, Joseph P.

    2007-01-01

    This viewgraph presentation reviews the contributions by the Rapid Prototyping Capability (RPC) towards using Visible Infrared Imager / Radiometer Suite (VIIRS) data in assessing the damage to forests. The Healthy Forest Restoration Act of 2003 mandates development of national Early Warning System (EWS) for forest threat monitoring and mitigation. NASA Stennis is working with the US Forest Service to develop needed components of this EWS. The use of MODIS data for monitoring forest disturbance at broad regional scales is a componet of this program. This RPC experiment was initiated to assess potential of the MODIS follow-on, VIIRS, for monitoring forest disturbance at broad scales and thereby contributing to the EWS. This presentation reviews the potential use of the VIIRS to examine the damage to forests caused by gyspy moths in the West Virginia and Virginia area.

  19. A freshwater biodiversity hotspot under pressure - assessing threats and identifying conservation needs for ancient Lake Ohrid

    Science.gov (United States)

    Kostoski, G.; Albrecht, C.; Trajanovski, S.; Wilke, T.

    2010-12-01

    Immediate conservation measures for world-wide freshwater resources are of eminent importance. This is particularly true for so-called ancient lakes. While these lakes are famous for being evolutionary theatres, often displaying an extraordinarily high degree of biodiversity and endemism, in many cases these biota are also experiencing extreme anthropogenic impact. Lake Ohrid, a major European biodiversity hotspot situated in a trans-frontier setting on the Balkans, is a prime example for a lake with a magnitude of narrow range endemic taxa that are under increasing anthropogenic pressure. Unfortunately, evidence for a "creeping biodiversity crisis" has accumulated over the last decades, and major socio-political changes have gone along with human-mediated environmental changes. Based on field surveys, monitoring data, published records, and expert interviews, we aimed to (1) assess threats to Lake Ohrids' (endemic) biodiversity, (2) summarize existing conservation activities and strategies, and (3) outline future conservation needs for Lake Ohrid. We compiled threats to both specific taxa (and in cases to particular species) as well as to the lake ecosystems itself. Major conservation concerns identified for Lake Ohrid are: (1) watershed impacts, (2) agriculture and forestry, (3) tourism and population growth, (4) non-indigenous species, (5) habitat alteration or loss, (6) unsustainable exploitation of fisheries, and (7) global climate change. Among the major (well-known) threats with high impact are nutrient input (particularly of phosphorus), habitat conversion and silt load. Other threats are potentially of high impact but less well known. Such threats include pollution with hazardous substances (from sources such as mines, former industries, agriculture) or climate change. We review and discuss institutional responsibilities, environmental monitoring and ecosystem management, existing parks and reserves, biodiversity and species measures, international

  20. A vulnerability assessment of 300 species in Florida: threats from sea level rise, land use, and climate change.

    Directory of Open Access Journals (Sweden)

    Joshua Steven Reece

    Full Text Available Species face many threats, including accelerated climate change, sea level rise, and conversion and degradation of habitat from human land uses. Vulnerability assessments and prioritization protocols have been proposed to assess these threats, often in combination with information such as species rarity; ecological, evolutionary or economic value; and likelihood of success. Nevertheless, few vulnerability assessments or prioritization protocols simultaneously account for multiple threats or conservation values. We applied a novel vulnerability assessment tool, the Standardized Index of Vulnerability and Value, to assess the conservation priority of 300 species of plants and animals in Florida given projections of climate change, human land-use patterns, and sea level rise by the year 2100. We account for multiple sources of uncertainty and prioritize species under five different systems of value, ranging from a primary emphasis on vulnerability to threats to an emphasis on metrics of conservation value such as phylogenetic distinctiveness. Our results reveal remarkable consistency in the prioritization of species across different conservation value systems. Species of high priority include the Miami blue butterfly (Cyclargus thomasi bethunebakeri, Key tree cactus (Pilosocereus robinii, Florida duskywing butterfly (Ephyriades brunnea floridensis, and Key deer (Odocoileus virginianus clavium. We also identify sources of uncertainty and the types of life history information consistently missing across taxonomic groups. This study characterizes the vulnerabilities to major threats of a broad swath of Florida's biodiversity and provides a system for prioritizing conservation efforts that is quantitative, flexible, and free from hidden value judgments.

  1. A New Tool for Assessing Mobile Device Proficiency in Older Adults: The Mobile Device Proficiency Questionnaire.

    Science.gov (United States)

    Roque, Nelson A; Boot, Walter R

    2018-02-01

    Mobile device proficiency is increasingly required to participate in society. Unfortunately, there still exists a digital divide between younger and older adults, especially with respect to mobile devices (i.e., tablet computers and smartphones). Training is an important goal to ensure that older adults can reap the benefits of these devices. However, efficient/effective training depends on the ability to gauge current proficiency levels. We developed a new scale to accurately assess the mobile device proficiency of older adults: the Mobile Device Proficiency Questionnaire (MDPQ). We present and validate the MDPQ and a short 16-question version of the MDPQ (MDPQ-16). The MDPQ, its subscales, and the MDPQ-16 were found to be highly reliable and valid measures of mobile device proficiency in a large sample. We conclude that the MDPQ and MDPQ-16 may serve as useful tools for facilitating mobile device training of older adults and measuring mobile device proficiency for research purposes.

  2. Cyber-Threat Assessment for the Air Traffic Management System: A Network Controls Approach

    Science.gov (United States)

    Roy, Sandip; Sridhar, Banavar

    2016-01-01

    , and indeed security solutions are being implemented in the current system. While these security solutions are important, they only provide a piecemeal solution. Particular computers or communication channels are protected from particular attacks, without a holistic view of the air transportation infrastructure. On the other hand, the above-listed incidents highlight that a holistic approach is needed, for several reasons. First, the air transportation infrastructure is a large scale cyber-physical system with multiple stakeholders and diverse legacy assets. It is impractical to protect every cyber- asset from known and unknown disruptions, and instead a strategic view of security is needed. Second, disruptions to the cyber- system can incur complex propagative impacts across the air transportation network, including its physical and human assets. Also, these implications of cyber- events are exacerbated or modulated by other disruptions and operational specifics, e.g. severe weather, operator fatigue or error, etc. These characteristics motivate a holistic and strategic perspective on protecting the air transportation infrastructure from cyber- events. The analysis of cyber- threats to the air traffic system is also inextricably tied to the integration of new autonomy into the airspace. The replacement of human operators with cyber functions leaves the network open to new cyber threats, which must be modeled and managed. Paradoxically, the mitigation of cyber events in the airspace will also likely require additional autonomy, given the fast time scale and myriad pathways of cyber-attacks which must be managed. The assessment of new vulnerabilities upon integration of new autonomy is also a key motivation for a holistic perspective on cyber threats.

  3. Research on simulation technology for CBRN threat assessment system. Prediction technology for atmospheric dispersion of CBRN materials

    International Nuclear Information System (INIS)

    Miura, Hiroaki; Yano, Masanori; Nakata, Mitsuhiro; Takeda, Masaki

    2013-01-01

    The technical survey is conducted on the CBRN (Chemical, Biological, Radiological and Nuclear) Threat Assessment System Simulation Technology. The dispersion property of CBRN materials is summarized, and the current simulation techniques for CBRN materials dispersion are described. The effects of advection-diffusion, sedimentation by the gravity, buoyancy and wash-out by rainfall on the dispersion property of CBRN materials should be considered in the simulation modeling. The concentration distribution of CBRN materials is predicted through the meteorological analysis, the flow analysis and the dispersion analysis, and the hazard map will be produced from that. A selection of simulation method, model, domain and number of computational grid points is necessary to perform the simulation, considering the balance between calculation cost and prediction accuracy. For construction of CBRN Threat Assessment System, it is important how to integrate the developed simulation element technologies and threat assessment technologies. (author)

  4. Norwegian support in development of regulations of radioactive waste management in central Asia-threat assessment

    International Nuclear Information System (INIS)

    Zhunussova, Tamara; Sneve, Malgorzata; Liland, Astrid; Strand, Per; Kim, Alexander; Mirsaidov, Ulmas; Tolongutov, Baigabyl

    2011-01-01

    In Central Asia (CA) the radioactive waste comes mainly from uranium mining and milling, nuclear weapon testing and nuclear power development and other ionizing sources. This waste was produced, to a greater extent, by the military-industrial complex and the uranium and non-uranium industry, and, to a lesser extent, by the nuclear industry and in the process of use of isotope products. Exploitation and mining of uranium and thorium deposits produce a large amount of solid and liquid radioactive waste, as well volatile contaminants which need a proper management. In Central Asia the wastes are mainly stored at the surface in large piles and represent a long-term potential health and environmental hazard. The process of remediating legacy sites of the past and reducing the threats is now getting under way, with the design and implementation of remediation activities, partly with international support. However, there is a significant lack in the regulatory basis for carrying out such remediation work, including a lack of relevant radiation and environmental safety norms and standards, licensing procedures and requirements for monitoring etc., as well as expertise to transform such a basis into practice. Accordingly, the objective of the proposed project is to assist the relevant regulatory authorities in Kazakhstan, Kirgizstan and Tajikistan to develop national robust and adequate regulations and procedures, taking into account the international guidance and Norwegian experience with regulatory support projects in Russia. Specific expected results in the project period include: a threat assessment report identifying priority areas for regulatory development, based on the status of current regulatory documents and the hazard presented by the different sites and facilities; development of national radioactive waste management strategies in each country; development of an enhanced regulatory framework for supervision of nuclear matters, and an enhanced safety culture

  5. Endemics under threat: an assessment of the conservation status of Cuban bats

    Directory of Open Access Journals (Sweden)

    Carlos Mancina

    2007-07-01

    Full Text Available Abstract Reviewing available information from published literature, museum database, personal communications and from the authors own field data, the conservation status of Cuban bats has been assessed using six qualitative parameters: abundance, distribution, roosting habits, aggregation level, forest dependence, and degree of endemism. The resulting Red List is analogous to that of the IUCN, species having been included in four categories of risk. Four out of the 26 extant bats of Cuba should be considered endangered, four vulnerable to extinction, twelve potentially threatened, and six in a stable situation. Most of the species of bats endemic to Cuba are under some form of threat. The major threats to the survival of Cuban bats are the destruction of forests and the modification of caves, the latter being critical habitats for the mostly cave-dwelling Cuban bat fauna. We argue that its conservation should be the result of a cooperative effort promoting research and habitat management. Riassunto Endemismi minacciati: una valutazione dello stato di conservazione dei chirotteri cubani. Lo stato di conservazione dei chirotteri cubani è stato valutato a partire da sei parametri qualitativi: abbondanza, distribuzione, roost utilizzati, livello di aggregazione, dipendenza da ambienti forestali e grado di endemismo. A questo scopo sono state esaminate le informazioni bibliografiche, i database dei musei e dati non pubblicati, in parte raccolti dagli stessi autori. La Lista Rossa risultante è analoga a quella dell’IUCN, comprendendo quattro categorie di rischio crescente. Delle 26 specie attualmente presenti a Cuba, 4 sono da considerarsi in pericolo di estinzione, 4 "vulnerabili", 12 "potenzialmente minacciate" e 6 "stabili". La maggior parte delle specie endemiche è in qualche misura minacciata. La deforestazione e l’alterazione delle cavità carsiche, che costituiscono un habitat

  6. Assessment of ATC with Shunt FACTS Devices

    OpenAIRE

    Ashwani Kumar; Jitender Kumar

    2013-01-01

    In this paper, an optimal power flow based approach has been applied for multi-transactions deregulated environment for ATC determination with SVC and STATCOM. The main contribution of the paper is (i) OPF based approach for evaluation of ATC with multi-transactions, (ii) ATC enhancement with FACTS devices viz. SVC and STATCOM for intact and line contingency cases, (iii) Impact of ZIP load on ATC determination and comparison of ATC obtained with SVC and STATCOM. The results have been determin...

  7. Are College Students' Assessments of Threat Shaped by the Dangers of Their Childhood Environment?

    Science.gov (United States)

    Sherman, Amanda K; Minich, Steven H; Langen, Tom A; Skufca, Joseph; Wilke, Andreas

    2016-07-01

    Humans internalize environmental cues of mortality risk at an early age, which influences subsequent risk perceptions and behavior. In this respect, an individual's current risk assessment may be viewed as an adaptive response to the dangers present within his or her early local environment. Here we examine the relationship between several variables indicating threat within an individual's early environment (e.g., prevalence of violent and property crimes, registered sex offenders) and their perception of crime risk within both the childhood and current adult environments. We recruited a group of 657 students who hail from diverse geographic backgrounds to provide the zip code location of their childhood residence along with subjective ratings of danger of that and their current location, which enabled us to compare their ratings of risk/danger with the federally reported crime statistics of each setting. Our results indicate that the early prevalence of registered sex offenders indeed influences an individual's risk perception in adulthood, and that these factors have a differential effect on males and females. Our findings provide support for the theory that early environmental factors signaling danger affect how individuals assess risk within their adult environment. © The Author(s) 2015.

  8. Novel Threat-risk Index Using Probabilistic Risk Assessment and Human Reliability Analysis - Final Report

    Energy Technology Data Exchange (ETDEWEB)

    George A. Beitel

    2004-02-01

    In support of a national need to improve the current state-of-the-art in alerting decision makers to the risk of terrorist attack, a quantitative approach employing scientific and engineering concepts to develop a threat-risk index was undertaken at the Idaho National Engineering and Environmental Laboratory (INEEL). As a result of this effort, a set of models has been successfully integrated into a single comprehensive model known as Quantitative Threat-Risk Index Model (QTRIM), with the capability of computing a quantitative threat-risk index on a system level, as well as for the major components of the system. Such a threat-risk index could provide a quantitative variant or basis for either prioritizing security upgrades or updating the current qualitative national color-coded terrorist threat alert.

  9. Threat Assessment Teams: A Model for Coordinating the Institutional Response and Reducing Legal Liability when College Students Threaten Suicide

    Science.gov (United States)

    Penven, James C.; Janosik, Steven M.

    2012-01-01

    Increasing numbers of college students with mental health issues are enrolling in college. If these students threaten suicide they present serious legal issues for college officials. Lack of communication and coordination of a response to these students exacerbates the issue. Threat assessment teams can serve as mechanisms to coordinate the…

  10. Buckling-driven delamination growth in composite laminates: Guidelines for assessing the threat posed by interlaminar matrix delamination

    DEFF Research Database (Denmark)

    Bhushan, Karihaloo; Stang, Henrik

    2008-01-01

    This paper is concerned with development of a simple procedure to assess the threat posed by interlaminar matrix delaminations to the integrity of composite laminates when they are situated in a compressive stress field. Depending upon the size of the delamination, its location below the surface...

  11. Plans for Hand-Held/Portable Oil Assessment Devices

    National Research Council Canada - National Science Library

    Urbansky, Edward

    2005-01-01

    At the request of the U.S. Army Oil Analysis Program, the JOAP TSC conducted a market study, assembled a plan of action, and prepared a worksheet for the evaluation of portable or hand-held oil assessment devices...

  12. Assessing the Computer Network Operations Threat of Foreign Countries(PREPRINT)

    National Research Council Canada - National Science Library

    Denning, Dorothy E

    2007-01-01

    .... Information strategy has to adapt to both of these effects, exploiting and leveraging the enabling technologies while protecting against threats to the very same technologies we come to rely upon...

  13. Many Species, Many Threats: A Composite Risk Assessment of Climate Impacts for Salmonids in the Pacific Northwest

    Science.gov (United States)

    Graham, M. C.; Greene, C.; Beechie, T. J.; Raymond, C.

    2016-02-01

    The life cycles of salmonid species span freshwater, estuarine, and marine environments, exposing these economically, ecologically, and culturally important species to a wide variety of climate change threats. The diverse life histories of salmonids make them differentially vulnerable to climate change based on their use of different habitat types and the variability in climate change threats across these habitat types. Previous studies have focused mainly on assessing the vulnerability of particular life stages for a few species. Hence, we lack a broad perspective on how multiple climate threats are expected to impact the entire salmonid community, which spend much of their lives in marine waters. This lack of knowledge hampers our ability to prioritize various adaptation strategies for salmonid conservation. In order to conduct a more extensive vulnerability study of salmonids, we performed a life cycle-based risk assessment of climate change threats for nine species of salmonids (species within Oncorhynchus, Salvelinus, and Prosopium genera) inhabiting the Skagit River watershed, which is subject to an array of climate impacts. Our risk assessment integrated projections of impacts from various climate threats in freshwater, estuarine, and marine ecosystems with expert-based assessments of species-specific sensitivity and exposure. We found that projections (multiple global climate models under moderate emission scenarios) of both changes in magnitude and frequency of three flow-related freshwater impacts (flooding, low flows, and suspended sediment pulses) were more severe than threats in estuarine and marine habitats for which we could obtain projections. Combining projections with expert-based sensitivity and exposure scores revealed that these three threats exhibited the highest risk across all species. Of the nine species, the four most vulnerable were Chinook and coho salmon, steelhead, and bull trout. Even though these salmonids spend much of their lives

  14. Threat Assessment and Targeted Violence at Institutions of Higher Education: Implications for Policy and Practice Including Unique Considerations for Community Colleges

    Science.gov (United States)

    Bennett, Laura; Bates, Michael

    2015-01-01

    This article provides an overview of the research on targeted violence, including campus violence, and the implications for policy and practice at institutions of higher education. Unique challenges of threat assessment in the community college setting are explored, and an overview of an effective threat assessment policy and team at William…

  15. An integrative approach to threat assessment and management: security and mental health response to a threatening client.

    Science.gov (United States)

    Farkas, Gary M; Tsukayama, John K

    2012-01-01

    Workplace violence threat assessment and management practices represent an interdisciplinary approach to the diversion of potentially dangerous employees and clients. This case study illustrates such an intervention in a complex situation involving a social service agency and its client. Following a curtailment of services and an arrest, the client developed an escalating homicidal anger toward the agency administrator. Once a Tarasoff warning was received, the agency contacted a security company who organized a threat assessment and management plan involving interdisciplinary collaboration. Information developed in the course of the assessment was presented to prosecutors, who facilitated the client's arrest and involuntary psychiatric commitment until he was judged to be no longer dangerous. This case ultimately involved an integration of the services of security, law enforcement, mental health professionals, prosecutors, the courts and the state mental health system in leading to a successful diversion of the client from a path of intended violence.

  16. A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications

    OpenAIRE

    Sikder, Amit Kumar; Petracca, Giuseppe; Aksu, Hidayet; Jaeger, Trent; Uluagac, A. Selcuk

    2018-01-01

    The concept of Internet of Things (IoT) has become more popular in the modern era of technology than ever before. From small household devices to large industrial machines, the vision of IoT has made it possible to connect the devices with the physical world around them. This increasing popularity has also made the IoT devices and applications in the center of attention among attackers. Already, several types of malicious activities exist that attempt to compromise the security and privacy of...

  17. Simulating power integration in Latin America to assess challenges, opportunities, and threats

    International Nuclear Information System (INIS)

    Ochoa, Camila; Dyner, Isaac; Franco, Carlos J.

    2013-01-01

    Integration of electricity markets started to spread under the world-wide trend to economic liberalization. While some regions are managing better than others, lessons, both political and technical, highlight challenges ahead that need to be overcome. Since the early 2000s, Panama, Colombia, Ecuador, and Peru have decided to integrate their electricity markets, eventually creating an enormous Latin American electricity exchange, ranging from Mexico to Chile. This poses opportunities and threats to the region as it involves cooperation, trust, and the will to overcome difficulties that may arise. In this direction, we developed a system dynamics model, linked to an iterative algorithm, to assess the likely effects of integration on both system expansion and security of supply. The model helps us understand the logic of the long-term system behavior under different policies, assuming Market Coupling as the dispatch mechanism. Based on theoretical grounds and after analyzing simulation results under different scenarios, we conclude that the integration of electricity markets may render important opportunities regarding security of supply and efficiency; and consequently energy might be supplied at lower prices, using “cleaner” technologies. However, benefits largely depend on policy, regulation, and technical issues. - Highlights: • We model the likely long-term dynamics of regional integration in Latin America. • The approach includes a dispatch algorithm linked to a system dynamics model. • The model simulates the evolution of installed capacity and prices. • We conclude: electricity integration may provide security of supply and efficiency. • Benefits of integration largely depend on policy, regulation, and technical issues

  18. Assessing the Threat of Amphibian Chytrid Fungus in the Albertine Rift: Past, Present and Future

    Science.gov (United States)

    Seimon, Tracie A.; Ayebare, Samuel; Sekisambu, Robert; Muhindo, Emmanuel; Mitamba, Guillain; Greenbaum, Eli; Menegon, Michele; Pupin, Fabio; McAloose, Denise; Ammazzalorso, Alyssa; Meirte, Danny; Lukwago, Wilbur; Behangana, Mathias; Seimon, Anton; Plumptre, Andrew J.

    2015-01-01

    Batrachochytrium dendrobatidis (Bd), the cause of chytridiomycosis, is a pathogenic fungus that is found worldwide and is a major contributor to amphibian declines and extinctions. We report results of a comprehensive effort to assess the distribution and threat of Bd in one of the Earth’s most important biodiversity hotspots, the Albertine Rift in central Africa. In herpetological surveys conducted between 2010 and 2014, 1018 skin swabs from 17 amphibian genera in 39 sites across the Albertine Rift were tested for Bd by PCR. Overall, 19.5% of amphibians tested positive from all sites combined. Skin tissue samples from 163 amphibians were examined histologically; of these two had superficial epidermal intracorneal fungal colonization and lesions consistent with the disease chytridiomycosis. One amphibian was found dead during the surveys, and all others encountered appeared healthy. We found no evidence for Bd-induced mortality events, a finding consistent with other studies. To gain a historical perspective about Bd in the Albertine Rift, skin swabs from 232 museum-archived amphibians collected as voucher specimens from 1925–1994 were tested for Bd. Of these, one sample was positive; an Itombwe River frog (Phrynobatrachus asper) collected in 1950 in the Itombwe highlands. This finding represents the earliest record of Bd in the Democratic Republic of Congo. We modeled the distribution of Bd in the Albertine Rift using MaxEnt software, and trained our model for improved predictability. Our model predicts that Bd is currently widespread across the Albertine Rift, with moderate habitat suitability extending into the lowlands. Under climatic modeling scenarios our model predicts that optimal habitat suitability of Bd will decrease causing a major range contraction of the fungus by 2080. Our baseline data and modeling predictions are important for comparative studies, especially if significant changes in amphibian health status or climactic conditions are

  19. Medical Devices Assess, Treat Balance Disorders

    Science.gov (United States)

    2009-01-01

    You may have heard the phrase as difficult as walking and chewing gum as a joking way of referring to something that is not difficult at all. Just walking, however, is not all that simple physiologically speaking. Even standing upright is an undertaking requiring the complex cooperation of multiple motor and sensory systems including vision, the inner ear, somatosensation (sensation from the skin), and proprioception (the sense of the body s parts in relation to each other). The compromised performance of any of these elements can lead to a balance disorder, which in some form affects nearly half of Americans at least once in their lifetimes, from the elderly, to those with neurological or vestibular (inner ear) dysfunction, to athletes with musculoskeletal injuries, to astronauts returning from space. Readjusting to Earth s gravity has a significant impact on an astronaut s ability to balance, a result of the brain switching to a different "model" for interpreting sensory input in normal gravity versus weightlessness. While acclimating, astronauts can experience headaches, motion sickness, and problems with perception. To help ease the transition and study the effects of weightlessness on the body, NASA has conducted many investigations into post-flight balance control, realizing this research can help treat patients with balance disorders on Earth as well. In the 1960s, the NASA-sponsored Man Vehicle Laboratory at the Massachusetts Institute of Technology (MIT) studied the effects of prolonged space flight on astronauts. The lab s work intrigued MIT doctoral candidate Lewis Nashner, who began conducting NASA-funded research on human movement and balance under the supervision of Dr. Larry Young in the MIT Department of Aeronautics and Astronautics. In 1982, Nashner s work resulted in a noninvasive clinical technique for assessing the cooperative systems that allow the body to balance, commonly referred to as computerized dynamic posturography (CDP). CDP employs a

  20. Transweb - real time transportation threat assessment analysis tool: look what the future may bring for energy related infrastructure?

    International Nuclear Information System (INIS)

    Dilger, F.; Ballard, J.D.

    2005-01-01

    Full text: Transweb is envisioned as a transportation threat assessment program and this real time GIS based web assessment too (a.k.a., GTA for GIS threat assessment) can be used to plan railroad or highway shipments of hazardous waste (e.g., toxic industrial chemicals - TIC's) and high-level nuclear waste materials (e.g., like those destined for Yucca Mountain - HLW) that may be used in energy production facilities. Transweb will become a vulnerability mapping and analysis tool that can be used by transportation planners, emergency response personnel, security/safety managers, and law enforcement to route such shipments, make contingency plans in the event of altered road or rail conditions, and/or to assist in the response to an accident or human initiated event like terrorism. The initial phase of the project will seek to establish the protocol on highway shipments and follow up phases will focus on rail GTA's. This paper will report on the initial development of this analytical technique, define the problems associated with such analysis, and offer examples of its analytical possibilities for threat assessment relative to energy related facilities like nuclear power generation stations. (author)

  1. Assessment of reactivity devices for CANDU-6 with DUPIC fuel

    International Nuclear Information System (INIS)

    Jeong, Chang Joon; Choi, Hang Bok

    1998-01-01

    Reactivity device characteristics for a CANDU-6 reactor loaded with DUPIC fuel have been assessed. A transport code WIMS-AECL and a three-dimensional diffusion code RFSP were used for the lattice parameter generation and the core calculation, respectively. Three major reactivity devices have been assessed for their inherent functions. For the zone controller system, damping capability for spatial oscillation was investigated. The restart capability of the adjuster system was investigated. The shim operation and power stepback calculation were also performed to confirm the compatibility of the current adjuster rod system. The mechanical control absorber was assessed for the capability to compensate the temperature reactivity feedback following a power reduction. This study has shown that the current reactivity device systems retain their functions when used in a DUPIC fuel CANDU reactor

  2. Developing an Assessment (Tool) for Touch Screen Devices.

    Science.gov (United States)

    Danial-Saad, Alexandra; Chiari, Lorenzo

    2017-01-01

    Touch screen devices have become prevalent in our lives. Assistive technology experts working with people with disabilities face difficulty in understanding and assessing the problems experienced by individuals with disabilities in operating touch screen devices. This paper presents the processes of collecting and creating the required knowledge needed for assessing the user's skills for operating various touch screen devices, in order to develop an application for assessing the user's abilities and limitations. A six step procedure was used to collect and validate the required knowledge for the assessment from a multidisciplinary team. To determine the agreement levels between the experts, content validity was calculated. To test correlation between the experts from the different disciplines, a comparison was made between the discipline groups and their choice of specific skills/measurements. The final number of domains and skills/measurements was 15 domains and 50 skills/measurements. The result of Cronbach's α test for the final assessment questionnaire (50 skills/measurements) was 0.94, which indicates a high degree of reliability. The results of Kruskal-Wallis test showed the lack of any significant difference between agreements of the clinicians and the technicians groups, but significant differences were found between the educators and the clinicians groups. Each of the skills appearing in the final questionnaire was illustrated in a flowchart in preparation for developing the assessment (tool) for using touch screen devices.

  3. Assessing the Threat of Infectious Disease to the Biosecurity of the United States

    Science.gov (United States)

    2016-06-10

    bioweapons to innocent tourists who unknowingly transmit a potentially deadly pathogen to a susceptible person. The threat is significant. In the US...infectious disease agent. The exposure can take many forms, but typical routes include inhalation, ingestion, direct contact or from the bite of a

  4. Insects and their life cycle: Steps to take to assess threats

    Science.gov (United States)

    Alicia M. Bray; Jason B. Oliver

    2013-01-01

    This paper provides a brief overview of the importance of wood-boring insects to the forest nursery industry. Descriptions of the major insect groups are provided with special attention to the life stages that are most problematic within each group. Steps are provided to guide individuals to mitigate potential threats if a new insect is detected causing damage to trees...

  5. A proposed protocol for remote control of automated assessment devices

    International Nuclear Information System (INIS)

    Kissock, P.S.; Pritchard, D.A.

    1996-01-01

    Systems and devices that are controlled remotely are becoming more common in security systems in the US Air Force and other government agencies to provide protection of valuable assets. These systems reduce the number of needed personnel while still providing a high level of protection. However, each remotely controlled device usually has its own communication protocol. This limits the ability to change devices without changing the system that provides the communications control to the device. Sandia is pursuing a standard protocol that can be used to communicate with the different devices currently in use, or may be used in the future, in the US Air Force and other government agencies throughout the security community. Devices to be controlled include intelligent pan/tilt mounts, day/night video cameras, thermal imaging cameras, and remote data processors. Important features of this protocol include the ability to send messages of varying length, identify the sender, and more importantly, control remote data processors. This paper describes the proposed public domain protocol, features, and examples of use. The authors hope to elicit comments from security technology developers regarding format and use of remotely controlled automated assessment devices

  6. High Altitude Electromagnetic Pulse (HEMP) and High Power Microwave (HPM) Devices: Threat Assessments

    National Research Council Canada - National Science Library

    Wilson, Clay

    2006-01-01

    .... This method is called High Power Microwave (HPM). Several nations, including sponsors of terrorism, may currently have a capability to use EMP as a weapon for cyberterrorism to disrupt communications and other parts of the U.S...

  7. High Altitude Electromagnetic Pulse (HEMP) and High Power Microwave (HPM) Devices: Threat Assessments

    National Research Council Canada - National Science Library

    Wilson, Clay

    2008-01-01

    ... for cyber warfare or cyber terrorism to disrupt communications and other parts of the U.S. critical infrastructure. Also, some equipment and weapons used by the U.S. military may be vulnerable to the effects of EMP.

  8. High Altitude Electromagnetic Pulse (HEMP) and High Power Microwave (HPM) Devices: Threat Assessments

    National Research Council Canada - National Science Library

    Wilson, Clay

    2005-01-01

    .... This method is called High Power Microwave (HPM). Several nations, including reported sponsors of terrorism, may currently have a capability to use EMP as a weapon to disrupt communications and other parts of the U.S...

  9. High Altitude Electromagnetic Pulse (HEMP) and High Power Microwave (HPM) Devices: Threat Assessments

    National Research Council Canada - National Science Library

    Wilson, Clay

    2006-01-01

    Electromagnetic Pulse (EMP) is an instantaneous, intense energy field that can disrupt at a distance numerous electrical systems and high technology microcircuits that are especially sensitive to power surges...

  10. High Altitude Electromagnetic Pulse (HEMP) and High Power Microwave (HPM) Devices: Threat Assessments

    National Research Council Canada - National Science Library

    Wilson, Clay

    2008-01-01

    Electromagnetic Pulse (EMP) is an instantaneous, intense energy field that can overload or disrupt at a distance numerous electrical systems and high technology microcircuits, which are especially sensitive to power surges...

  11. A horizon scanning assessment of current and potential future threats to migratory shorebirds

    Science.gov (United States)

    Sutherland, William J.; Alves, José A.; Amano, Tatsuya; Chang, Charlotte H.; Davidson, Nicholas C.; Finlayson, C. Max; Gill, Jennifer A.; Gill, Robert E.; González, Patricia M.; Gunnarsson, Tómas Grétar; Kleijn, David; Spray, Chris J.; Székely, Tamás; Thompson, Des B.A.

    2012-01-01

    We review the conservation issues facing migratory shorebird populations that breed in temperate regions and use wetlands in the non-breeding season. Shorebirds are excellent model organisms for understanding ecological, behavioural and evolutionary processes and are often used as indicators of wetland health. A global team of experienced shorebird researchers identified 45 issues facing these shorebird populations, and divided them into three categories (natural, current anthropogenic and future issues). The natural issues included megatsunamis, volcanoes and regional climate changes, while current anthropogenic threats encompassed agricultural intensification, conversion of tidal flats and coastal wetlands by human infrastructure developments and eutrophication of coastal systems. Possible future threats to shorebirds include microplastics, new means of recreation and infectious diseases. We suggest that this review process be broadened to other taxa to aid the identification and ranking of current and future conservation actions.

  12. Threat Assessment for Multistage Cyber Attacks in Smart Grid Communication Networks

    OpenAIRE

    He, Xiaobing

    2017-01-01

    In smart grids, managing and controlling power operations are supported by information and communication technology (ICT) and supervisory control and data acquisition (SCADA) systems. The increasing adoption of new ICT assets in smart grids is making smart grids vulnerable to cyber threats, as well as raising numerous concerns about the adequacy of current security approaches. As a single act of penetration is often not sufficient for an attacker to achieve his/her goal, multistage cyb...

  13. Assessment of naked mole-rat distribution and threats in Eastern Ethiopia

    Directory of Open Access Journals (Sweden)

    Mengistu Wale

    2016-08-01

    Full Text Available Objective: To identify the distribution, threats and community attitudes towards naked molerat in Eastern Ethiopia. Methods: Data were collected through direct observation and interview and Chi-square at 95% confidence interval was used for significance test. Results: Naked mole-rat was identified in Fafan, City/Shinele, Eastern Hararghe Zone and Dire Dawa Administrative. The main threats of naked mole-rat identified were agricultural expansion, human killing and lack of awareness. From a total of 100 respondents, 92% of them considered naked mole-rat as pest as a result that 46% of them participated in direct killing. Literacy rate significantly affects the willingness to participate in the conservation of naked mole-rat (χ2 = 7.478, df = 1, P < 0.05. From a total of 26% respondents who did not show the willingness to participate in the conservation, 80.8% of them were illiterate. Conclusions: Naked mole-rat is fairly common in many of the study sites. However, rapid shift from nomadic life style to cultivation of crops and lacks of awareness were the main threats of naked mole-rat. Therefore, since there is no conservation action currently, further comprehensive study is required to design conservation plan for this species.

  14. Radiation damage assessment of Nb tunnel junction devices

    International Nuclear Information System (INIS)

    King, S.E.; Magno, R.; Maisch, W.G.

    1991-01-01

    This paper reports on the radiation hardness of a new technology using Josephson junctions that was explored by an irradiation using a fluence of 7.6 x 10 14 protons/cm 2 at an energy of 63 MeV from the U.C. Davis cyclotron. In what the authors believe is the first radiation assessment of Nb/Al 2 O 3 /Nb devices, the permanent damage in these devices was investigated. No permanent changes in the I-V characteristics of the junctions were observed indicating no significant level of material defects have occurred at this level of irradiation

  15. Radiation-Tolerance Assessment of a Redundant Wireless Device

    Science.gov (United States)

    Huang, Q.; Jiang, J.

    2018-01-01

    This paper presents a method to evaluate radiation-tolerance without physical tests for a commercial off-the-shelf (COTS)-based monitoring device for high level radiation fields, such as those found in post-accident conditions in a nuclear power plant (NPP). This paper specifically describes the analysis of radiation environment in a severe accident, radiation damages in electronics, and the redundant solution used to prolong the life of the system, as well as the evaluation method for radiation protection and the analysis method of system reliability. As a case study, a wireless monitoring device with redundant and diversified channels is evaluated by using the developed method. The study results and system assessment data show that, under the given radiation condition, performance of the redundant device is more reliable and more robust than those non-redundant devices. The developed redundant wireless monitoring device is therefore able to apply in those conditions (up to 10 M Rad (Si)) during a severe accident in a NPP.

  16. Assessment of CANDU-6 reactivity devices for DUPIC fuel

    International Nuclear Information System (INIS)

    Jeong, Chang Joon; Choi, Hang Bok

    1998-11-01

    Reactivity device characteristics for a CANDU 6 reactor loaded with DUPIC fuel have been assessed. The lattice parameters were generated by WIMS-AECL code and the core calculations were performed by RFSP code with a 3-dimensional full core model. The reactivity devices studied are the zone controller, adjusters, mechanical control absorber and shutoff rods. For the zone controller system, damping capability for spatial oscillation was investigated. For the adjusters, the restart capability was investigated. For the adjusters, the restart capability was investigated. The shin operation and power stepback calculation were also performed to confirm the compatibility of the current adjuster system. The mechanical control absorber was assessed for the function of compensating temperature reactivity feedback following a power reduction. And shutoff rods were also assessed to investigate the following a power reduction. And shutoff rods were also assessed to investigate the static reactivity worth. This study has shown that the current reactivity device system of CANDU-6 core with the DUPIC fuel. (author). 9 refs., 17 tabs., 7 figs

  17. The Armored Brigade Combat Team (ABCT) in the Future: An Assessment of Capabilities Against the Hybrid Threat in the Future Operational Environment

    Science.gov (United States)

    2013-06-13

    requirements, followed by a tactical case study assessment, and a strengths, weaknesses, opportunities, and threats ( SWOT ) analysis of the BCTs against a...strategic and operational deployment. This information further developed the case study SWOT analysis of the BCTs against a hybrid threat. The SWOT ...a SWOT analysis . The next section addressed is the analysis . The analysis is comprised of the strategic capabilities assessment and the tactical

  18. Assessing the Two-Plasmon Decay Threat Through Simulations and Experiments on the NIKE Laser System

    Science.gov (United States)

    Phillips, Lee; Weaver, J. L.; Oh, J.; Schmitt, A. J.; Obenschain, S.

    2010-11-01

    NIKE is a Krf laser system at the Naval Research Laboratory used to explore hydrodynamic stability, equation of state, and other physics problems arising in IFE research. The comparatively short KrF wavelength is expected to raise the threshold of most parametric instabilities. We report on simulations performed using the FAST3d radiation hydrocode to design TPD experiments that have have allowed us to explore the validity of simple threshold formulas and help establish the accuracy of our simulations. We have also studied proposed high-gain shock ignition designs and devised experiments that can approach the relevant scalelength-temperature regime, allowing us a potential experimental method to study the LPI threat to these designs by direct observation. Through FAST3d studies of shock-ignited and conventional direct-drive designs with KrF (248 nm) and 3rd harmonic (351nm) drivers, we examine the benefits of the shorter wavelength KrF light in reducing the LPI threat.

  19. Vision Assessment and Prescription of Low Vision Devices

    OpenAIRE

    Keeffe, Jill

    2004-01-01

    Assessment of vision and prescription of low vision devices are part of a comprehensive low vision service. Other components of the service include training the person affected by low vision in use of vision and other senses, mobility, activities of daily living, and support for education, employment or leisure activities. Specialist vision rehabilitation agencies have services to provide access to information (libraries) and activity centres for groups of people with impaired vision.

  20. Radiological hazard assessment of extracorporeal shock wave lithotripsy devices

    International Nuclear Information System (INIS)

    Sprague, D.D.; Vermeere, W.R.

    1987-01-01

    With the recent introduction of ESWL to the clinical environment, a new health physics challenge has entered the medical consulting area. The x-ray imaging systems used in the devices are of a conventional design, but in an unusual configuration that is difficult to properly assess. The scope of this paper considers specific evaluation problems, and deals with methods developed during experience with 4 units in California. Pertinent regulations are also covered, along with a synopsis of data obtained and ALARA recommendations

  1. Registry Assessment of Peripheral Interventional Devices (RAPID) - Registry Assessment of Peripheral Interventional Devices Core Data Elements.

    Science.gov (United States)

    Jones, W Schuyler; Krucoff, Mitchell W; Morales, Pablo; Wilgus, Rebecca W; Heath, Anne H; Williams, Mary F; Tcheng, James E; Marinac-Dabic, J Danica; Malone, Misti L; Reed, Terrie L; Fukaya, Rie; Lookstein, Robert; Handa, Nobuhiro; Aronow, Herbert D; Bertges, Daniel J; Jaff, Michael R; Tsai, Thomas T; Smale, Joshua A; Zaugg, Margo J; Thatcher, Robert J; Cronenwett, Jack L; Nc, Durham; Md, Silver Spring; Japan, Tokyo; Ny, New York; Ri, Providence; Vt, Burlington; Mass, Newton; Colo, Denver; Ariz, Tempe; Calif, Santa Clara; Minn, Minneapolis; Nh, Lebanon

    2018-01-25

    The current state of evaluating patients with peripheral artery disease and more specifically of evaluating medical devices used for peripheral vascular intervention (PVI) remains challenging because of the heterogeneity of the disease process, the multiple physician specialties that perform PVI, the multitude of devices available to treat peripheral artery disease, and the lack of consensus about the best treatment approaches. Because PVI core data elements are not standardized across clinical care, clinical trials, and registries, aggregation of data across different data sources and physician specialties is currently not feasible.Methods and Results:Under the auspices of the U.S. Food and Drug Administration's Medical Device Epidemiology Network initiative-and its PASSION (Predictable and Sustainable Implementation of the National Registries) program, in conjunction with other efforts to align clinical data standards-the Registry Assessment of Peripheral Interventional Devices (RAPID) workgroup was convened. RAPID is a collaborative, multidisciplinary effort to develop a consensus lexicon and to promote interoperability across clinical care, clinical trials, and national and international registries of PVI. The current manuscript presents the initial work from RAPID to standardize clinical data elements and definitions, to establish a framework within electronic health records and health information technology procedural reporting systems, and to implement an informatics-based approach to promote the conduct of pragmatic clinical trials and registry efforts in PVI. Ultimately, we hope this work will facilitate and improve device evaluation and surveillance for patients, clinicians, health outcomes researchers, industry, policymakers, and regulators.

  2. Education in the field of dangerous materials emphasizing the assessment of a radiological threat

    International Nuclear Information System (INIS)

    Sabol, J.; Hudzietzova, J.

    2013-01-01

    The paper deals with some selected problems and requirements related to the education in areas concerning dangerous substances where special besides dosimetry and radiation protection quantities and units, special attention has also been paid to the threat which presents the potential misuse of nuclear and radioactive materials. In particular, the issues regarding the prevention against the use of these materials for terrorist attacks and procedures aimed at minimizing the impact of such malevolent act on the population and the environment have been discussed. In addition, it is given an overview of the current Czech legislation in this field as well as some of the most important international recommendations or directives/resolutions which address this field. (authors)

  3. [New medical device hospital assessment: what kind of clinical data?].

    Science.gov (United States)

    Beaussier, H; Junot, H; Lancrenon, S; Faure, P

    2012-01-01

    Since 2003, the AP-HP medical devices committee (CODIMS) assess the therapeutic relevance of innovated medical device (MD) for the French AP-HP hospitals' group. To accomplish this task, the CODIMS asks manufacturers to bring out clinical arguments to justify the use of their MD in hospital. This work analyses retrospectively after 8years, all assessed MD until March 2011 and the scientific quality of the clinical data submitted by manufacturers to the CODIMS to purchase their MD. All MD were classed according to their certification's level (I, IIa, IIb, III, DMIA). The quality of available clinical studies (CS) provided by manufacturers for each case was assessed and classed according to five clinical relevance levels based on the evidence-based medecine standards (1-2: high methodology; 3-5: low methodology). One hundred and three MD files (80 % of class IIb and III MD) were analysed by the CODIMS (630CS). Our results highlight the lack of relevance of files that are provided to assess innovated MD: 29 files without any CS; concerning class IIb (32DMS, 221CS) and III (50, 342CS) MD, only 6 % of CS presented a correct clinical relevance level. And the situation did not get better during this assessment period. The CODIMS deplore the poor clinical relevance of files provided to assess MD (wrong comparator, inappropriate ends-points, insufficient follow-up to assess long-term security, small population studied). Future legislative developments for MD assessment are expected to improve this situation. Copyright © 2011 Elsevier Masson SAS. All rights reserved.

  4. Initial threat assessment. Radiological risks associated with SevRAO facilities falling within the regulatory supervision responsibilities of FMBA[Russian Federation

    Energy Technology Data Exchange (ETDEWEB)

    Ilin, Leonid; Kochetkov, Oleg; Simakov, Anatoly; Shandala, Natalya; Savkin, Mikhail; Sneve, Malgorzata K.; Boerretzen, Peer; Jaworska, Alicja; Smith, Graham; Barraclough, Ian; Kruse, Phil

    2005-07-01

    The purpose of this initial threat assessment is to obtain a view, from the regulatory perspective of FMBA, of the most important issues which require supervision and regulatory development, regarding work which has to be carried out at the Andreeva Bay and Grcmikha. The main radiological threats have been identified and actions to reduce the threats have been proposed. Situations where regulations and procedures for workers on-site need to be developed have been identified. This will be a basis for further development of Russian regulation and procedures. (Author)

  5. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  6. Urban growth and landscape connectivity threats assessment at Saguaro National Park, Arizona, USA

    Science.gov (United States)

    Perkl, Ryan; Norman, Laura M.; Mitchell, David; Feller, Mark R.; Smith, Garrett; Wilson, Natalie R.

    2018-01-01

    Urban and exurban expansion results in habitat and biodiversity loss globally. We hypothesize that a coupled-model approach could connect urban planning for future cities with landscape ecology to consider wildland habitat connectivity. Our work combines urban growth simulations with models of wildlife corridors to examine how species will be impacted by development to test this hypothesis. We leverage a land use change model (SLEUTH) with structural and functional landscape-connectivity modeling techniques to ascertain the spatial extent and locations of connectivity related threats to a national park in southern Arizona, USA, and describe how protected areas might be impacted by urban expansion. Results of projected growth significantly altered structural connectivity (80%) when compared to current (baseline) corridor conditions. Moreover, projected growth impacted functional connectivity differently amongst species, indicating resilience of some species and near-complete displacement of others. We propose that implementing a geospatial-design-based model will allow for a better understanding of the impacts management decisions have on wildlife populations. The application provides the potential to understand both human and environmental impacts of land-system dynamics, critical for long-term sustainability.

  7. A freshwater biodiversity hotspot under pressure – assessing threats and identifying conservation needs for ancient Lake Ohrid

    Directory of Open Access Journals (Sweden)

    G. Kostoski

    2010-12-01

    Full Text Available Immediate conservation measures for world-wide freshwater resources are of eminent importance. This is particularly true for so-called ancient lakes. While these lakes are famous for being evolutionary theatres, often displaying an extraordinarily high degree of biodiversity and endemism, in many cases these biota are also experiencing extreme anthropogenic impact.

    Lake Ohrid, a major European biodiversity hotspot situated in a trans-frontier setting on the Balkans, is a prime example for a lake with a magnitude of narrow range endemic taxa that are under increasing anthropogenic pressure. Unfortunately, evidence for a "creeping biodiversity crisis" has accumulated over the last decades, and major socio-political changes have gone along with human-mediated environmental changes.

    Based on field surveys, monitoring data, published records, and expert interviews, we aimed to (1 assess threats to Lake Ohrids' (endemic biodiversity, (2 summarize existing conservation activities and strategies, and (3 outline future conservation needs for Lake Ohrid. We compiled threats to both specific taxa (and in cases to particular species as well as to the lake ecosystems itself. Major conservation concerns identified for Lake Ohrid are: (1 watershed impacts, (2 agriculture and forestry, (3 tourism and population growth, (4 non-indigenous species, (5 habitat alteration or loss, (6 unsustainable exploitation of fisheries, and (7 global climate change.

    Among the major (well-known threats with high impact are nutrient input (particularly of phosphorus, habitat conversion and silt load. Other threats are potentially of high impact but less well known. Such threats include pollution with hazardous substances (from sources such as mines, former industries, agriculture or climate change. We review and discuss institutional responsibilities, environmental monitoring and ecosystem management, existing parks and reserves, biodiversity and species

  8. Assessment of the threat from diverted radioactive material and 'orphan sources' - An international comparison

    International Nuclear Information System (INIS)

    Steinhausler, F.

    2001-01-01

    Full text: Multiple international activities have been undertaken to contain the trafficking of weapons-usable material in order to reduce the risk from the proliferation of such material. In addition, over the past decade the issue of unintended handling and transport of radioactive material has become increasingly important. Concurrent with the growing number of radioactive sources in industry, medicine, agriculture and research, the probability for losing control over such sources increases as well ('orphan sources'). The potential impact on society and the environment from these two categories of threat has been documented extensively in the literature. In this study representatives from 11 countries in the Americas, Europe and Asia-Pacific formed a network to exchange information concerning nuclear and other radioactive material on the following topic areas: Legislation and regulatory practices for the production, processing, handling, use, holding, storage, transport, import, and export; History of site-specific non-compliance and enforcement actions, as well as punitive actions; National approach for handling the issue of orphan sources; The role of national security forces; Managerial and technical procedures to ensure material inventory control and accountancy; Aspects of physical protection on-site and during transport; Technical/scientific expertise and equipment available at the national level to detect, identify and quantify such material in the field; Level of practical implementation of technical equipment to detect such material at border crossings, airports, railway stations, and mail distribution centres; Cases of seizure of nuclear and contaminated materials, illegal sales and fraud; Training programmes available for preventing, detecting and responding to the loss of control. The results of the analysis show that, despite several international consensus documents and supporting legislation, in several cases major additional efforts are needed

  9. Use of modified threat reduction assessments to estimate success of conservation measures within and adjacent to Kruger National Park, South Africa.

    Science.gov (United States)

    Anthony, Brandon P

    2008-12-01

    The importance of biodiversity as natural capital for economic development and sustaining human welfare is well documented. Nevertheless, resource degradation rates and persistent deterioration of human welfare in developing countries is increasingly worrisome. Developing effective monitoring and evaluation schemes and measuring biodiversity loss continue to pose unique challenges, particularly when there is a paucity of historical data. Threat reduction assessment (TRA) has been proposed as a method to measure conservation success and as a proxy measurement of conservation impact, monitoring threats to resources rather than changes to biological parameters themselves. This tool is considered a quick, practical alternative to more cost- and time-intensive approaches, but has inherent weaknesses. I conducted TRAs to evaluate the effectiveness of Kruger National Park (KNP) and Limpopo Province, South Africa, in mitigating threats to biodiversity from 1994 to 2004 in 4 geographical areas. I calculated TRA index values in these TRAs by using the original scoring developed by Margoluis and Salafsky (2001)and a modified scoring system that assigned negative mitigation values to incorporate new or worsening threats. Threats were standardized to allow comparisons across the sites. Modified TRA index values were significantly lower than values derived from the original scoring exercise. Five of the 11 standardized threats were present in all 4 assessment areas, 2 were restricted to KNP, 2 to Limpopo Province, and 2 only to Malamulele municipality. These results indicate, first, the need to integrate negative mitigation values into TRA scoring. By including negative values, investigators will be afforded a more accurate picture of biodiversity threats and of temporal and spatial trends across sites. Where the original TRA scoring was used to measure conservation success, reevaluation of these cases with the modified scoring is recommended. Second, practitioners must

  10. Application of strengths, weaknesses, opportunities and threats analysis in the development of a health technology assessment program.

    Science.gov (United States)

    Gibis, B; Artiles, J; Corabian, P; Meiesaar, K; Koppel, A; Jacobs, P; Serrano, P; Menon, D

    2001-10-01

    There has been recent interest in developing a health technology assessment (HTA) function in Estonia. A group of individuals knowledgeable about HTA in Canada, Germany, Romania and Spain, along with representatives of the University of Tartu, Estonia, was convened by the Institute of Health Economics in Edmonton, Canada, to consider options for such a function. In a one-day workshop strengths, weaknesses, opportunities and threats (SWOT) analyses of HTA were conducted, first at a 'global' level, and then of the Estonian situation. The 'global' SWOT analysis yielded a large number of items that pertain to institutionalized HTA in a generic sense, i.e. not based on any individual HTA agency. The 'Estonian' SWOT yielded a subset of items, which pertain to development of HTA in that country. Ten actionable steps were then developed on the basis of this subset, which could be used to initiate the creation of an HTA body in Estonia.

  11. Ports and pests: Assessing the threat of aquatic invasive species introduced by maritime shipping activity in Cuba.

    Science.gov (United States)

    O'Brien, Charleen E; Johnston, Matthew W; Kerstetter, David W

    2017-12-15

    Aquatic invasive species (AIS) are biological pollutants that cause detrimental ecological, economic, and human-health effects in their introduced communities. With increasing globalization through maritime trade, ports are vulnerable to AIS exposure via commercial vessels. The Cuban Port of Mariel is poised to become a competitive transshipment hub in the Caribbean and the intent of this study was to evaluate present and potential impacts AIS pose with the likely future increase in shipping activity. We utilized previous assessment frameworks and publicly accessible information to rank AIS by level of threat. Fifteen AIS were identified in Cuba and one, the Asian green mussel Perna viridis (Linnaeus, 1758), had repeated harmful economic impacts. Five species associated with trade partners of Port Mariel were considered potentially detrimental to Cuba if introduced through shipping routes. The results presented herein identify species of concern and emphasize the importance of prioritizing AIS prevention and management within Cuba. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Improving risk assessment of color additives in medical device polymers.

    Science.gov (United States)

    Chandrasekar, Vaishnavi; Janes, Dustin W; Forrey, Christopher; Saylor, David M; Bajaj, Akhil; Duncan, Timothy V; Zheng, Jiwen; Riaz Ahmed, Kausar B; Casey, Brendan J

    2018-01-01

    Many polymeric medical device materials contain color additives which could lead to adverse health effects. The potential health risk of color additives may be assessed by comparing the amount of color additive released over time to levels deemed to be safe based on available toxicity data. We propose a conservative model for exposure that requires only the diffusion coefficient of the additive in the polymer matrix, D, to be specified. The model is applied here using a model polymer (poly(ether-block-amide), PEBAX 2533) and color additive (quinizarin blue) system. Sorption experiments performed in an aqueous dispersion of quinizarin blue (QB) into neat PEBAX yielded a diffusivity D = 4.8 × 10 -10 cm 2  s -1 , and solubility S = 0.32 wt %. On the basis of these measurements, we validated the model by comparing predictions to the leaching profile of QB from a PEBAX matrix into physiologically representative media. Toxicity data are not available to estimate a safe level of exposure to QB, as a result, we used a Threshold of Toxicological Concern (TTC) value for QB of 90 µg/adult/day. Because only 30% of the QB is released in the first day of leaching for our film thickness and calculated D, we demonstrate that a device may contain significantly more color additive than the TTC value without giving rise to a toxicological concern. The findings suggest that an initial screening-level risk assessment of color additives and other potentially toxic compounds found in device polymers can be improved. © 2017 Wiley Periodicals, Inc. J Biomed Mater Res Part B: Appl Biomater, 106B: 310-319, 2018. © 2017 Wiley Periodicals, Inc.

  13. On the fundamentals of nuclear reactor safety assessment. Inherent threats and their implications

    Energy Technology Data Exchange (ETDEWEB)

    Hyvaerinen, J. [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland). Nuclear Safety Dept.

    1996-12-01

    The thesis addresses some fundamental questions related to implementation and assessment of nuclear safety. The safety principles and assessment methods are described, followed by descriptions of selected novel technical challenges to nuclear safety. The novel challenges encompass a wide variety of technical issues, thus providing insights on the limitations of conventional safety assessment methods. Study of the limitations suggests means to improve nuclear reactor design criteria and safety assessment practices. The novel safety challenges discussed are (1) inherent boron dilution in PWRs, (2) metallic insulation performance with respect to total loss of emergency cooling systems in a loss-of-coolant accident, and (3) horizontal steam generator heat transfer performance at natural circulation conditions. (50 refs.).

  14. On the fundamentals of nuclear reactor safety assessment. Inherent threats and their implications

    International Nuclear Information System (INIS)

    Hyvaerinen, J.

    1996-12-01

    The thesis addresses some fundamental questions related to implementation and assessment of nuclear safety. The safety principles and assessment methods are described, followed by descriptions of selected novel technical challenges to nuclear safety. The novel challenges encompass a wide variety of technical issues, thus providing insights on the limitations of conventional safety assessment methods. Study of the limitations suggests means to improve nuclear reactor design criteria and safety assessment practices. The novel safety challenges discussed are (1) inherent boron dilution in PWRs, (2) metallic insulation performance with respect to total loss of emergency cooling systems in a loss-of-coolant accident, and (3) horizontal steam generator heat transfer performance at natural circulation conditions. (50 refs.)

  15. Performance of GPS-devices for environmental exposure assessment.

    Science.gov (United States)

    Beekhuizen, Johan; Kromhout, Hans; Huss, Anke; Vermeulen, Roel

    2013-01-01

    Integration of individual time-location patterns with spatially resolved exposure maps enables a more accurate estimation of personal exposures to environmental pollutants than using estimates at fixed locations. Current global positioning system (GPS) devices can be used to track an individual's location. However, information on GPS-performance in environmental exposure assessment is largely missing. We therefore performed two studies. First, a commute-study, where the commute of 12 individuals was tracked twice, testing GPS-performance for five transport modes and two wearing modes. Second, an urban-tracking study, where one individual was tracked repeatedly through different areas, focused on the effect of building obstruction on GPS-performance. The median error from the true path for walking was 3.7 m, biking 2.9 m, train 4.8 m, bus 4.9 m, and car 3.3 m. Errors were larger in a high-rise commercial area (median error=7.1 m) compared with a low-rise residential area (median error=2.2 m). Thus, GPS-performance largely depends on the transport mode and urban built-up. Although ~85% of all errors were 50 m. Modern GPS-devices are useful tools for environmental exposure assessment, but large GPS-errors might affect estimates of exposures with high spatial variability.

  16. Effective vulnerability assessments for physical security devices, systems, and programs

    International Nuclear Information System (INIS)

    Johnston, R.G.; Garcia, A.R.E.

    2002-01-01

    Full text: The efficacy of devices, systems, and programs used for physical security depend critically on having periodic and effective vulnerability assessments. Effective vulnerability assessments, in turn, require certain conditions and attributes. These include: a proper understanding of their purpose; not confusing vulnerability assessments with other kinds of metrics, analyses, tests, and security exercises; the view that vulnerabilities are inevitable, and that finding them is good news (since they can then be mitigated), not bad news; rejection of findings of no vulnerabilities; avoidance of mere 'compliance mode' rubber stamping; the use of the proper outside, independent, imaginative personnel; psychologically predisposed to finding and demonstrating problems; the absence of conflicts of interest; no unrealistic constraints on the possible attack tools, procedures, personnel, or strategies; efforts to not just find and demonstrate vulnerabilities, but also to suggest possible countermeasures; proper context; input and buy-in from ALL facility security personnel, especially low-level personnel; emphasis on the simplest, most relevant attacks first; no underestimation of potential adversaries; consideration of fault analysis attacks; awareness of Rohrbach's Maxim and Shannon's Maxim. In addition to these factors, we will cover some of the complex issues and problems associated with the design of vulnerability assessments. There will also be suggestions on how to conduct effective vulnerability assessments on a severely limited budget. We will conclude with a discussion of both conventional and unconventional ways of reporting results. (author)

  17. Hypsarrhythmia assessment exhibits poor interrater reliability: a threat to clinical trial validity.

    Science.gov (United States)

    Hussain, Shaun A; Kwong, Grace; Millichap, John J; Mytinger, John R; Ryan, Nicole; Matsumoto, Joyce H; Wu, Joyce Y; Lerner, Jason T; Sankar, Raman

    2015-01-01

    Hypsarrhythmia is the classic interictal electroencephalographic pattern associated with infantile spasms, and characterized by high voltage, disorganization, and multifocal independent epileptiform discharges. Given this seemingly simple definition, one might expect excellent interrater reliability (IRR) in the identification of this pattern. Alternatively, it may be argued that assessments of voltage and disorganization are fairly subjective, and thus quite challenging in borderline cases. We sought to test the IRR of hypsarrhythmia assessment in a systematic fashion. Six blinded pediatric electroencephalographers from four centers reviewed 22 electroencephalography (EEG) samples from patients with infantile spasms. Each sample was 5 min in duration and included only wakefulness. Raters determined if each EEG was abnormal and if hypsarrhythmia was present/absent, and characterized relevant features: voltage, organization, epileptiform discharges, slowing, interictal attenuations, symmetry, and synchrony. In addition, raters indicated their level of confidence for each assessment. Multirater kappa statistics (κ) were calculated for the assessment of hypsarrhythmia and each feature. Although IRR was favorable in determining whether a study was normal or abnormal (κ=0.89), reliability was unfavorable for assessment of hypsarrhythmia (κ=0.40), modified hypsarrhythmia (κ=0.47), high voltage (κ=0.37), disorganization (κ=0.22), multifocal epileptiform discharges (κ=0.68), interictal voltage attenuations (κ=0.21), slowing (κ=0.20), asymmetry (κ=0.26), and asynchrony (κ=0.08). Despite generally unsatisfactory interrater agreement, raters consistently reported high confidence in assessments. This study contradicts the view that hypsarrhythmia assessment is straightforward. Even small variability in the identification of hypsarrhythmia has potentially deleterious consequences for clinical care, as its presence or absence impacts decisions to pursue high-risk and

  18. Proceedings of the Mongolian Biodiversity Databank Workshop: Assessing the Conservation Status of Mongolian Mammals and Fishes: II – Mam- mals: Assessment Results and Threats.

    Directory of Open Access Journals (Sweden)

    Emma L. Clark

    2005-12-01

    Full Text Available The Mongolian Biodiversity Databank Workshop was held at the National University of Mongolia and Hustai National Park from 1 st October to 4 th November, 2005. As part of the workshop, participants assessed the conservation status of all Mongolian mammal species using the IUCN Categories and Cri - teria. Of the 128 species assessed, 2% were Critically Endangered (CR, 11% Endangered (EN and 4% Vulnerable (VU. A further 5% were categorised as Near Threatened (NT and 36% categorised as Data Deficient (DD. Ungulates were the most highly impacted: 79% were threatened with extinction. Twelve percent of carnivore species and 12% of rodent species were threatened. No non-rodent small mammal species were listed in a threatened category. Rodents and non-rodent small mammals were less well known, with 44% and 43% respectively found to be Data Deficient. This may have affected the threat assessment of these species. Greatest species richness of Mongolian mammals was found in the northern and western part of the country. The greatest number of threatened species also inhabit the north of the country, as well as the south-west. The main threat affecting most mammals in Mongolia was hunting, with lack of enforcement of legislation also considered a problem.

  19. Environmental assessment of wood burning in independent heating devices

    International Nuclear Information System (INIS)

    Rogaume, C.; Rogaume, Y.; Zoulalian, A.; Trouve, G.

    2009-01-01

    An environmental assessment has been achieved on two domestic wood-heating devices, a closed fireplace and an open fireplace which represent 80% of the sale market of wood small-scale combustion units and around 65% of the use of wood-energy in France. Not only deals this study with the atmospheric polluting emissions produced in the exhaust stack, but also with the indoor air quality. Therefore, different pollutants were measured at the emission stage and as indoor air concentrations: carbon monoxide (CO), carbon dioxide (CO 2 ), volatile organic compounds (VOC), methane (CH 4 ), nitrogen oxides (NO X ), particulate matter with different sizes (PM 10 to PM 0.1 ), polycyclic aromatic hydrocarbons (PAH) and dioxines and furans. The results concerning indoor air were compared to measurements that showed the influence of residential heating devices. without exhaust duct like an oil stove or a gas stove (space heater) on indoor air quality. Some combustion emission experiments achieved in normal conditions showed that the combustion in open fireplace pollutes more than the combustion in closed fire-place: around 10 times more of PM 2.5 (mass concentration), more than 4 times of total VOC, 1.5 times more of dioxines and furans. On the other hand, the opposite trend was shown for PAH emissions (between 2 and 3 times less depending on the regulations considered). The comparison of the impact of different heating appliances on indoor air quality shows that the rate of CO is the same for all the devices except for the open fireplace which is higher. The CO 2 rate is 10 times higher for the oil stove and 8 times higher for the gas stove than for the fireplaces, which is due to the lack of exhaust duct. The concentration of PM 2.5 is 16 times higher for the open fireplace, 1.6 times higher for the oil stove and 4.4 times higher for the gas stove than the closed fireplace. The percentage of the number distribution of nano-particles, that represents an enhanced health risk

  20. Clinical assessment of the accuracy of blood glucose measurement devices.

    Science.gov (United States)

    Pfützner, Andreas; Mitri, Michael; Musholt, Petra B; Sachsenheimer, Daniela; Borchert, Marcus; Yap, Andrew; Forst, Thomas

    2012-04-01

    Blood glucose meters for patient self-measurement need to comply with the accuracy standards of the ISO 15197 guideline. We investigated the accuracy of the two new blood glucose meters BG*Star and iBG*Star (Sanofi-Aventis) in comparison to four other competitive devices (Accu-Chek Aviva, Roche Diagnostics; FreeStyle Freedom Lite, Abbott Medisense; Contour, Bayer; OneTouch Ultra 2, Lifescan) at different blood glucose ranges in a clinical setting with healthy subjects and patients with type 1 and type 2 diabetes. BGStar and iBGStar are employ dynamic electrochemistry, which is supposed to result in highly accurate results. The study was performed on 106 participants (53 female, 53 male, age (mean ± SD): 46 ± 16 years, type 1: 32 patients, type 2: 34 patients, and 40 healthy subjects). Two devices from each type and strips from two different production lots were used for glucose assessment (∼200 readings/meter). Spontaneous glucose assessments and glucose or insulin interventions under medical supervision were applied to perform measurements in the different glucose ranges in accordance with the ISO 15197 requirements. Sample values 400 mg/dL were prepared by laboratory manipulations. The YSI glucose analyzer (glucose oxidase method) served as the standard reference method which may be considered to be a limitation in light of glucose hexokinase-based meters. For all devices, there was a very close correlation between the glucose results compared to the YSI reference method results. The correlation coefficients were r = 0.995 for BGStar and r = 0.992 for iBGStar (Aviva: 0.995, Freedom Lite: 0.990, Contour: 0.993, Ultra 2: 0.990). Error-grid analysis according to Parkes and Clarke revealed both 100% of the readings to be within the clinically acceptable areas (Clarke: A + B with BG*Star (100 + 0), Aviva (97 + 3), and Contour (97 + 3); and 99.5% with iBG*Star (97.5 + 2), Freedom Lite (98 + 1.5), and Ultra 2 (97.5 + 2

  1. Conservation in metropolitan regions: assessing trends and threats of urban development and climate change

    Science.gov (United States)

    Thorne, J. H.; Santos, M. J.; Bjorkman, J.

    2011-12-01

    Two global challenges to successful conservation are urban expansion and climate change. Rapid urban growth threatens biodiversity and associated ecosystem services, while climate change may make currently protected areas unsuitable for species that exist within them. We examined three measures of landscape change for 8800 km2 of the San Francisco Bay metropolitan region over 80 years past and future: urban growth, protected area establishment, and natural vegetation type extents. The Bay Area is a good test bed for conservation assessment of the impacts of temporal and spatial of urban growth and land cover change. The region is geographically rather small, with over 40% of its lands already dedicated to protected park and open space lands, they are well-documented, and, the area has had extensive population growth in the past and is projected to continue to grow. The ten-county region within which our study area is a subset has grown from 1.78 million people in 1930, to 6.97 million in 2000 and is estimated to grow to 10.94 million by 2050. With such an influx of people into a small geographic area, it is imperative to both examine the past urban expansion and estimate how the future population will be accommodated into the landscape. We quantify these trends to assess conservation 'success' through time. We used historical and current landcover maps to assess trend, and a GIS-based urban modeling (UPlan) to assess future urban growth impacts in the region, under three policy scenarios- business as usual, smart growth, and urban redevelopment. Impacts are measured by the amount of open space targeted by conservation planners in the region that will be urbanized under each urban growth policy. Impacts are also measured by estimates of the energy consumption projected for each of the scenarios on household and business unit level. The 'business as usual' and 'smart growth' scenarios differed little in their impacts to targeted conservation lands, because so little

  2. Population assessment and degree of threat of chalybea Macrocarpa (Melastomataceae) endemic species from Colombia

    International Nuclear Information System (INIS)

    Gil Leguizamon, Pablo Andres; Morales Puentes, Maria Eugenia; Diaz Perez, Carlos Nelson

    2014-01-01

    Population assessment results from chalybea macrocarpaare shown, the specie is considerate ENDANGERED (EN) by its restricted area, threatened is generated by crops and extensive cattle farming. the study was conducted in the Boyaca Department (Colombia), Municipality of Arcabuco, in three established localities using herbarium and literature information; field work made possible identified distribution, density and phenology like sub criteria, allowing identify the presence extension and occupancy area. We took structural data (height, coverage and DBH) to determinate the population age's classes. Which the gathered information and the associated vegetation, the specie is re-categorized which the b IUCN criteria. It is distributed to the northwest and southern in Arcabuco, in an area of 59.9 km"2, 4 km"2 of occupancy and a population density of 50 individual/km"2. Flowering and fruiting is continuous through the year, however, most of the flowering is from March to August and fruiting from September to February. Age structure allows identified ten species between seedlings, juveniles and adults. Population is represented by few seedling individuals (10.6 %) and juveniles (20.9 %) versus adults (68.5 %). finally, C. macrocarpais upgraded to Critical Risk (CR B1ab (iii)).

  3. Assessing threats from coral and crustose coralline algae disease on the reefs of New Caledonia

    Science.gov (United States)

    Aeby, Greta S.; Tribollet, Aline; Lasne, Gregory; Work, Thierry M.

    2015-01-01

    The present study reports the results of the first quantitative survey of lesions on coral and crustose coralline algae (CCA) on reefs in the lagoon of New Caledonia. Surveys on inshore and offshore reefs were conducted at 13 sites in 2010, with 12 sites resurveyed in 2013. Thirty coral diseases affecting 15 coral genera were found, with low overall disease prevalence (<1%). This study extends the known distribution of growth anomalies to the coral genera Platygyraand Hydnophora, endolithic hypermycosis to Platygyra, Leptoria and Goniastrea and extends the geographic range of three CCA diseases. We found the first trematode infection in Porites outside of Hawaii. Disease prevalence differed among coral genera, with Porites having more lesions, and Acropora and Montipora fewer lesions, than expected on the basis of field abundance. Inshore reefs had a lower coral-colony density, species diversity and reduced CCA cover than did the offshore reefs. Disease prevalence was significantly higher on inshore reefs in 2013 than in 2010, but did not change on offshore reefs. The potential ecological impact of individual coral diseases was assessed using an integrative-scoring and relative-ranking scheme based on average frequency of occurrence, prevalence and estimated degree of virulence. The top-five ranked diseases were all tissue-loss diseases.

  4. Assessment of variables controlling nitrate dynamics in groundwater: is it a threat to surface aquatic ecosystems?

    Science.gov (United States)

    Rasiah, V; Armour, J D; Cogle, A L

    2005-01-01

    The impact of fertilised cropping on nitrate-N dynamics in groundwater (GW) was assessed in a catchment from piezometers installed: (i) to different depths, (ii) in different soil types, (iii) on different positions on landscape, and (iv) compared with the Australian and New Zealand Environmental and Conservation Council guideline values provided for different aquatic ecosystems. The GW and NO(3)-N concentration dynamics were monitored in 39 piezometer wells, installed to 5-90 m depth, under fertilized sugarcane (Saccharum officinarum-S) in the Johnstone River Catchment, Australia, from 1999 January through September 2002. The median nitrate-N concentration ranged from 14 to 1511 microg L(-1), and the 80th percentile from 0 to 1341 microg L(-1). In 34 out of the 39 piezometer wells the 80th percentile or 80% of the nitrate-N values were higher than 30 microg L(-1), which is the maximum trigger value provided in the ANZECC table for sustainable health of different aquatic ecosystems. Nitrate-N concentration decreased with increasing well depth, increasing depth of water in wells, and with decreasing relief on landscape. Nitrate-N was higher in alluvial soil profiles than on those formed in-situ. Nitrate-N increased with increasing rainfall at the beginning of the rainy season, fluctuated during the peak rainy period, and then decreased when the rain ceased. The rapid decrease in GW after the rains ceased suggested potential existed for nitrate-N to be discharged as lateral-flow into streams. This may contribute towards the deterioration in the health of down-stream aquatic ecosystems.

  5. Novel data visualizations of X-ray data for aviation security applications using the Open Threat Assessment Platform (OTAP)

    Science.gov (United States)

    Gittinger, Jaxon M.; Jimenez, Edward S.; Holswade, Erica A.; Nunna, Rahul S.

    2017-02-01

    This work will demonstrate the implementation of a traditional and non-traditional visualization of x-ray images for aviation security applications that will be feasible with open system architecture initiatives such as the Open Threat Assessment Platform (OTAP). Anomalies of interest to aviation security are fluid, where characteristic signals of anomalies of interest can evolve rapidly. OTAP is a limited scope open architecture baggage screening prototype that intends to allow 3rd-party vendors to develop and easily implement, integrate, and deploy detection algorithms and specialized hardware on a field deployable screening technology [13]. In this study, stereoscopic images were created using an unmodified, field-deployed system and rendered on the Oculus Rift, a commercial virtual reality video gaming headset. The example described in this work is not dependent on the Oculus Rift, and is possible using any comparable hardware configuration capable of rendering stereoscopic images. The depth information provided from viewing the images will aid in the detection of characteristic signals from anomalies of interest. If successful, OTAP has the potential to allow for aviation security to become more fluid in its adaptation to the evolution of anomalies of interest. This work demonstrates one example that is easily implemented using the OTAP platform, that could lead to the future generation of ATR algorithms and data visualization approaches.

  6. Analysis of strengths, weaknesses, opportunities, and threats in the development of a health technology assessment program in Turkey.

    Science.gov (United States)

    Kahveci, Rabia; Meads, Catherine

    2008-01-01

    The Turkish healthcare system is currently undergoing reform, and efficient use of resources has become a key factor in determining the allocation of resources. The objective of this study was to analyze strengths, weaknesses, opportunities, and threats (SWOT) in the development of a health technology assessment (HTA) program in Turkey. A SWOT analysis was performed using a literature review and interviews with key people in the Turkish Ministry of Health and Ministry of Labor and Social Security. Regarding recent reforms in health care, investments for information network and databank are the strengths, but the traditional "expert-based" decision making, poor availability of data, and poor quality of data could be seen as some of the weaknesses. Another major weakness is lack of general awareness of HTA. Increasing demand for transparency in decision making, demand for evidence, and demand for credibility by decision makers are some of the opportunities, and current healthcare reforms, i.e., restructuring of healthcare and general health insurance, could also be seen as major opportunities. These opportunities unfortunately could be threatened by lack of funding, and resources are challenged by large, recent national investments. There is a good opportunity for Turkey to use the skills in HTA currently being developed through activities in Europe and the Americas to assist in the development of a much more cost-effective and transparent healthcare system in Turkey.

  7. The Human Threat to River Ecosystems at the Watershed Scale: An Ecological Security Assessment of the Songhua River Basin, Northeast China

    Directory of Open Access Journals (Sweden)

    Yuan Shen

    2017-03-01

    Full Text Available Human disturbances impact river basins by reducing the quality of, and services provided by, aquatic ecosystems. Conducting quantitative assessments of ecological security at the watershed scale is important for enhancing the water quality of river basins and promoting environmental management. In this study, China’s Songhua River Basin was divided into 204 assessment units by combining watershed and administrative boundaries. Ten human threat factors were identified based on their significant influence on the river ecosystem. A modified ecological threat index was used to synthetically evaluate the ecological security, where frequency was weighted by flow length from the grids to the main rivers, while severity was weighted by the potential hazard of the factors on variables of river ecosystem integrity. The results showed that individual factors related to urbanization, agricultural development and facility construction presented different spatial distribution characteristics. At the center of the plain area, the provincial capital cities posed the highest level of threat, as did the municipal districts of prefecture-level cities. The spatial relationships between hot spot locations of the ecological threat index and water quality, as well as the distribution areas of critically endangered species, were analyzed. The sensitivity analysis illustrated that alteration of agricultural development largely changed the ecological security level of the basin. By offering a reference for assessing ecological security, this study can enhance water environmental planning and management.

  8. Adapting to the Changing Climate: An Assessment of Local Health Department Preparations for Climate Change-Related Health Threats, 2008-2012.

    Science.gov (United States)

    Roser-Renouf, Connie; Maibach, Edward W; Li, Jennifer

    2016-01-01

    Climate change poses a major public health threat. A survey of U.S. local health department directors in 2008 found widespread recognition of the threat, but limited adaptive capacity, due to perceived lack of expertise and other resources. We assessed changes between 2008 and 2012 in local public health departments' preparedness for the public health threats of climate change, in light of increasing national polarization on the issue, and widespread funding cutbacks for public health. A geographically representative online survey of directors of local public health departments was conducted in 2011-2012 (N = 174; response rate = 50%), and compared to the 2008 telephone survey results (N = 133; response rate = 61%). Significant polarization had occurred: more respondents in 2012 were certain that the threat of local climate change impacts does/does not exist, and fewer were unsure. Roughly 10% said it is not a threat, compared to 1% in 2008. Adaptation capacity decreased in several areas: perceived departmental expertise in climate change risk assessment; departmental prioritization of adaptation; and the number of adaptation-related programs and services departments provided. In 2008, directors' perceptions of local impacts predicted the number of adaptation-related programs and services their departments offered, but in 2012, funding predicted programming and directors' impact perceptions did not. This suggests that budgets were constraining directors' ability to respond to local climate change-related health threats. Results also suggest that departmental expertise may mitigate funding constraints. Strategies for overcoming these obstacles to local public health departments' preparations for climate change are discussed.

  9. Spatially explicit multi-threat assessment of food tree species in Burkina Faso: A fine-scale approach.

    Directory of Open Access Journals (Sweden)

    Hannes Gaisberger

    Full Text Available Over the last decades agroforestry parklands in Burkina Faso have come under increasing demographic as well as climatic pressures, which are threatening indigenous tree species that contribute substantially to income generation and nutrition in rural households. Analyzing the threats as well as the species vulnerability to them is fundamental for priority setting in conservation planning. Guided by literature and local experts we selected 16 important food tree species (Acacia macrostachya, Acacia senegal, Adansonia digitata, Annona senegalensis, Balanites aegyptiaca, Bombax costatum, Boscia senegalensis, Detarium microcarpum, Lannea microcarpa, Parkia biglobosa, Sclerocarya birrea, Strychnos spinosa, Tamarindus indica, Vitellaria paradoxa, Ximenia americana, Ziziphus mauritiana and six key threats to them (overexploitation, overgrazing, fire, cotton production, mining and climate change. We developed a species-specific and spatially explicit approach combining freely accessible datasets, species distribution models (SDMs, climate models and expert survey results to predict, at fine scale, where these threats are likely to have the greatest impact. We find that all species face serious threats throughout much of their distribution in Burkina Faso and that climate change is predicted to be the most prevalent threat in the long term, whereas overexploitation and cotton production are the most important short-term threats. Tree populations growing in areas designated as 'highly threatened' due to climate change should be used as seed sources for ex situ conservation and planting in areas where future climate is predicting suitable habitats. Assisted regeneration is suggested for populations in areas where suitable habitat under future climate conditions coincides with high threat levels due to short-term threats. In the case of Vitellaria paradoxa, we suggest collecting seed along the northern margins of its distribution and considering assisted

  10. Critical Assessment of Implantable Drug Delivery Devices in Glaucoma Management

    Directory of Open Access Journals (Sweden)

    Dharani Manickavasagam

    2013-01-01

    Full Text Available Glaucoma is a group of heterogeneous disorders involving progressive optic neuropathy that can culminate into visual impairment and irreversible blindness. Effective therapeutic interventions must address underlying vulnerability of retinal ganglion cells (RGCs to degeneration in conjunction with correcting other associated risk factors (such as elevated intraocular pressure. However, realization of therapeutic outcomes is heavily dependent on suitable delivery system that can overcome myriads of anatomical and physiological barriers to intraocular drug delivery. Development of clinically viable sustained release systems in glaucoma is a widely recognized unmet need. In this regard, implantable delivery systems may relieve the burden of chronic drug administration while potentially ensuring high intraocular drug bioavailability. Presently there are no FDA-approved implantable drug delivery devices for glaucoma even though there are several ongoing clinical studies. The paper critically assessed the prospects of polymeric implantable delivery systems in glaucoma while identifying factors that can dictate (a patient tolerability and acceptance, (b drug stability and drug release profiles, (c therapeutic efficacy, and (d toxicity and biocompatibility. The information gathered could be useful in future research and development efforts on implantable delivery systems in glaucoma.

  11. Aging assessment of surge protective devices in nuclear power plants

    International Nuclear Information System (INIS)

    Davis, J.F.; Subudhi, M.; Carroll, D.P.

    1996-01-01

    An assessment was performed to determine the effects of aging on the performance and availability of surge protective devices (SPDs), used in electrical power and control systems in nuclear power plants. Although SPDs have not been classified as safety-related, they are risk-important because they can minimize the initiating event frequencies associated with loss of offsite power and reactor trips. Conversely, their failure due to age might cause some of those initiating events, e.g., through short circuit failure modes, or by allowing deterioration of the safety-related component(s) they are protecting from overvoltages, perhaps preventing a reactor trip, from an open circuit failure mode. From the data evaluated during 1980--1994, it was found that failures of surge arresters and suppressers by short circuits were neither a significant risk nor safety concern, and there were no failures of surge suppressers preventing a reactor trip. Simulations, using the ElectroMagnetic Transients Program (EMTP) were performed to determine the adequacy of high voltage surge arresters

  12. THREAT ENSEMBLE VULNERABILITY ASSESSMENT ...

    Science.gov (United States)

    software and manual TEVA-SPOT is used by water utilities to optimize the number and location of contamination detection sensors so that economic and/or public health consequences are minimized. TEVA-SPOT is interactive, allowing a user to specify the minimization objective (e.g., the number of people exposed, the time to detection, or the extent of pipe length contaminated). It also allows a user to specify constraints. For example, a TEVA-SPOT user can employ expert knowledge during the design process by identifying either existing or unfeasible sensor locations. Installation and maintenance costs for sensor placement can also be factored into the analysis. Python and Java are required to run TEVA-SPOT

  13. An approach for assessing potential sediment-bound contaminant threats near the intake of a drinking water treatment plant.

    Science.gov (United States)

    Chen, Fei; Anderson, William B; Huck, Peter M

    2013-01-01

    To assist in assessing a potential contaminated sediment threat near a drinking water intake in a large lake, a technique known as the fingerprint analysis of leachate contaminants (FALCON), was investigated and enhanced to help draw more statistically significant definitive conclusions. This represents the first application of this approach, originally developed by the USEPA to characterize and track leachate penetration in groundwater and contaminant migration from waste and landfill sites, in a large lake from the point-of-view of source water protection. FALCON provided valuable information regarding contaminated sediment characterization, source attribution, and transport within a surface water context without the need for knowledge of local hydrodynamic conditions, potentially reducing reliance on complicated hydrodynamic analysis. A t-test to evaluate the significance of correlations was shown to further enhance the FALCON procedure. In this study, the sensitivity of FALCON was found to be improved by using concentration data from both conserved organics and heavy metals in combination. Furthermore, data analysis indicated that it may be possible to indirectly assess the success of remediation efforts (and the corresponding need to plan for a treatment upgrade in the event of escalating contaminant concentrations) by examining the temporal change in correlation between the source and intake sediment fingerprints over time. This method has potential for widespread application in situations where conserved contaminants such as heavy metals and higher molecular weight polycyclic aromatic hydrocarbons (PAHs), are being or have previously been deposited in sediment somewhere in, or within range of, an intake protection zone. Copyright © 2012 Elsevier Ltd. All rights reserved.

  14. A Quantitative Risk Assessment Model Involving Frequency and Threat Degree under Line-of-Business Services for Infrastructure of Emerging Sensor Networks

    Science.gov (United States)

    Jing, Xu; Hu, Hanwen; Yang, Huijun; Au, Man Ho; Li, Shuqin; Xiong, Naixue; Imran, Muhammad; Vasilakos, Athanasios V.

    2017-01-01

    The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider’s server contains a lot of valuable resources. LoBSs’ users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs’ risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs’ risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing. PMID:28335569

  15. A Quantitative Risk Assessment Model Involving Frequency and Threat Degree under Line-of-Business Services for Infrastructure of Emerging Sensor Networks.

    Science.gov (United States)

    Jing, Xu; Hu, Hanwen; Yang, Huijun; Au, Man Ho; Li, Shuqin; Xiong, Naixue; Imran, Muhammad; Vasilakos, Athanasios V

    2017-03-21

    The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider's server contains a lot of valuable resources. LoBSs' users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs' risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs' risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing.

  16. Assessing the impact of the U.S. Endangered Species Act recovery planning guidelines on managing threats for listed species.

    Science.gov (United States)

    Troyer, Caitlin M; Gerber, Leah R

    2015-10-01

    The Endangered Species Act (ESA) of the United States was enacted in 1973 to prevent the extinction of species. Recovery plans, required by 1988 amendments to the ESA, play an important role in organizing these efforts to protect and recover species. To improve the use of science in the recovery planning process, the Society for Conservation Biology (SCB) commissioned an independent review of endangered species recovery planning in 1999. From these findings, the SCB made key recommendations for how management agencies could improve the recovery planning process, after which the U.S. Fish and Wildlife Service and the National Marine Fisheries Service redrafted their recovery planning guidelines. One important recommendation called for recovery plans to make threats a primary focus, including organizing and prioritizing recovery tasks for threat abatement. We sought to determine the extent to which results from the SCB study were incorporated into these new guidelines and whether the SCB recommendations regarding threats manifested in recovery plans written under the new guidelines. Recovery planning guidelines generally incorporated the SCB recommendations, including those for managing threats. However, although recent recovery plans have improved in their treatment of threats, many fail to adequately incorporate threat monitoring. This failure suggests that developing clear guidelines for monitoring should be an important priority in improving ESA recovery planning. © 2015 Society for Conservation Biology.

  17. Proceedings of the Mongolian Biodiversity Databank Workshop: Assessing the Conservation Status of Mongolian Mammals and Fishes: III – Fishes: Assessment Results and Threats

    Directory of Open Access Journals (Sweden)

    Joanne F. Ocock

    2005-12-01

    Full Text Available The Mongolian Biodiversity Databank Workshop was held at the National University of Mongolia and Hustai National Park from 1 st October to 4 th November, 2005. As part of the workshop, a working group of fish experts assessed the conservation status of all Mongolian fishes using the IUCN Catego - ries and Criteria. Of the 64 fish species found in Mongolia, 48 were assessed, with 16 considered Not Applicable (NA by the working group. Only one species, the Siberian sturgeon ( Acipenser baerii was assessed as Critically Endangered (CR in Mongolia, however six species were assigned Endangered (EN status. Four were found to be Vulnerable (VU and three were assessed to be Near Threatened (NT. Forty-eight percent of Mongolian fishes were Data Deficient (DD and 25% were Least Concern (LC. The north-east of Mongolia was most species rich, particularly the Onon River basin and Buir Lake. There was no trend for where the most threatened species occurred as they were found throughout the north of Mongolia. Hunting/fishing was the greatest threat to Mongolian fishes, followed by resource extraction and pollution.

  18. Hymenoptera of Afghanistan and the central command area of operations: assessing the threat to deployed U.S. service members with insect venom hypersensitivity.

    Science.gov (United States)

    Turbyville, Joseph C; Dunford, James C; Nelson, Michael R

    2013-01-01

    Insect venom hypersensitivity can pose a threat to personnel deployed to a combat zone but the exposure risk in Afghanistan is currently unknown. This study was designed to assess the threat of Hymenoptera stings and associated allergic reactions in Afghanistan. Hymenoptera species were collected during a deployment to southern Afghanistan from June 2010 through January 2011. The literature was also reviewed to determine species of medically important Hymenoptera recorded in the region. The U.S. Army theater electronic medical data system was mined for ICD-9 codes associated with insect stings to determine the number of theater medical clinic encounters addressing insect sting reactions. Three species of flying hymenoptera were commonly encountered during the study period: Vespa orientalis L., Polistes wattii Cameron, and Vespula germanica (F.). A literature review also confirms the presence of honeybees (Apidae), numerous velvet ant (Mutillidae) species, and various ant (Formicidae) species all capable of stinging. No evidence was identified to suggest that fire ants (Solenopsis ssp.) are a threat in the region. Based on electronic medical records from the U.S. Central Command area of operations over a 2-year period, roughly 1 in 500 clinic visits involved a patient with a diagnosis of insect bite or sting. Cross-reactive members of all five flying Hymenoptera species commonly assessed for in Hymenoptera allergy evaluations are present in Afghanistan. The review of in-theater medical records confirms that insect stings pose an environmental threat to deployed service members.

  19. The threats

    International Nuclear Information System (INIS)

    Brunel, S.; Touchard, P.; Ferrandery, J.L.

    2005-01-01

    Second chapter of the book on the geopolitics of the sustainable development, this chapter deals with the threats of the climatic change on the earth and the humans. the authors analyze the consequences of the climatic change on the developing countries of the South and the necessity of a sustainable development implementation in the North. They inform on the resources depletion, the water problem, the nuclear activities and the public health and the french government policy facing the sustainable management of the territory. (A.L.B.)

  20. Assessing Detecting and Deterring the Threat of Maritime Nuclear and Radiological Smuggling in the Western Indian Ocean Region

    Energy Technology Data Exchange (ETDEWEB)

    Khan, M. Umer [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Cooperative Monitoring Center

    2017-03-01

    This paper proposes that current maritime smuggling routes in the western Indian Ocean region are similar to those in the past and that the motivations of terrorist groups and the presence of radioactive sources in the Indian Ocean littoral and other states present a significant security threat. The majority of regional terrorist groups have a hybrid structure, piggybacking on criminal activity to fund their terror activities. Additionally, states have used maritime routes in the Indian Ocean region to transport nuclear materials and missiles. Thus, the maritime dimension of such threats remains, and may be increasing. This paper focuses on issues, motivations, pathways, and methods to detect and interdict nuclear and radiological trafficking. It analyzes the potential use of maritime technology applications for radiation detection and presents recommendations for states and multinational nonproliferation advocacy organizations to address the threat in the Indian Ocean region.

  1. Dynamics of device innovation: implications for assessing value.

    Science.gov (United States)

    Gelijns, Annetine C; Russo, Mark J; Hong, Kimberly N; Brown, Lawrence D; Ascheim, Deborah D; Moskowitz, Alan J

    2013-10-01

    In recent years, there has been growing interest in evaluating the health and economic impact of medical devices. Payers increasingly rely on cost-effectiveness analyses in making their coverage decisions, and are adopting value-based purchasing initiatives. These analytic approaches, however, have been shaped heavily by their use in the pharmaceutical realm, and are ill-adapted to the medical device context. This study focuses on the development and evaluation of left ventricular assist devices (LVADs) to highlight the unique challenges involved in the design and conduct of device trials compared with pharmaceuticals. Devices are moving targets characterized by a much higher degree of post-introduction innovation and "learning by using" than pharmaceuticals. The cost effectiveness ratio of left ventricular assist devices for destination therapy, for example, decreased from around $600,000 per life year saved based on results from the pivotal trial to around $100,000 within a relatively short time period. These dynamics pose fundamental challenges to the evaluation enterprise as well as the policy-making world, which this paper addresses.

  2. Threat assessment report. Regulatory aspects of the remediation and rehabilitation of nuclear legacy in Kazakhstan, Kyrgyzstan and Tajikistan

    International Nuclear Information System (INIS)

    Zhunussova, T.; Sneve, M.; Romanenko, O.; Solomatina, A.; Mirsaidov, I.

    2011-06-01

    different categories of radioactive waste. Safety criteria and clearance levels are also not established. The NRPA, with the support of the Norwegian Ministry of Foreign Affairs, has developed bilateral projects that aim to assist the regulatory bodies in the Central Asian countries to identify and draft relevant regulatory requirements to ensure the protection of the personnel, population and environment during the planning and execution of remedial actions for past practices and RW management in the Central Asian countries. Based on threat assessments that have been completed in each Central Asian country during the year 2010, this document focuses on the existing regulatory problems at the legacy sites and projects will address the regulatory documents which should be developed first. It is clear that in order to remove the threat connected with radioactive wastes, both that which has already been accumulated as a result of previous activity and that which is currently being generated in significant amounts and will be produced in the future, it is necessary to at least develop and implement: A National Policy and Strategy for Radioactive Waste Management, including strategies for disposal of each category of the RW, allocation of responsibilities and financial assurance for these activities; Safety requirements on the design, siting, construction, operation, closure and establishment of the institutional control needed for disposal facilities in accordance with the approved national policy and strategy on radioactive waste management; and New classifications of radioactive waste according to the recently published international recommendations, including identification of corresponding categories; In addition, it is clear that in order to remove the threats connected with extensive territories contaminated by radionuclides, the rehabilitation of these areas is required and, accordingly, it is necessary to develop regulations on: Quantitative criteria defining reference

  3. Application of Devices and Systems Designed for Power Quality Monitoring and Assessment

    Directory of Open Access Journals (Sweden)

    Wiesław Gil

    2014-03-01

    Full Text Available The paper presents the problems associated with increasing demands on the equipment and systems for power quality assessment (PQ, installed at power substations. Difficulties are signaled due to current lack of standards defining the test methodology of measuring devices. The necessary device properties and the structure of a large system operated in real time and designed to assess the PQ are discussed. The usefulness of multi-channel analyzers featuring the identification and registration of transients is pointed out. The desirability of synchrophasor assessment implementation and device integration by standard PN-EN 61850 with other SAS devices is also justified.

  4. The Development of Detailed Threats Model Applicable for Information Risk Assessment of Enterprise Information System Virtualization Claster

    Directory of Open Access Journals (Sweden)

    Irina Vladimirovna Mashkina

    2015-06-01

    Full Text Available This research on the development of the model object protection - virtual segment industrial enterprises and the development of threat models, with particular attention paid to assisted virtualization hypervisor type I - full virtualization using the system software, working directly with the hardware.

  5. Translation and validation of the assistive technology device predisposition assessment in Greek in order to assess satisfaction with use of the selected assistive device.

    Science.gov (United States)

    Koumpouros, Yiannis; Papageorgiou, Effie; Karavasili, Alexandra; Alexopoulou, Despoina

    2017-07-01

    To examine the Assistive Technology Device Predisposition Assessment scale and provide evidence of validity and reliability of the Greek version. We translated and adapted the original instrument in Greek according to the most well-known guidelines recommendations. Field test studies were conducted in a rehabilitation hospital to validate the appropriateness of the final results. Ratings of the different items were statistically analyzed. We recruited 115 subjects who were administered the Form E of the original questionnaire. The experimental analysis conducted revealed a three subscales structure: (i) Adaptability, (ii) Fit to Use, and (iii) Socializing. According to the results of our study the three subscales measure different constructs. Reliability measures (ICC = 0.981, Pearson's correlation = 0.963, Cronbach's α = 0.701) yielded high values. Test-retest outcome showed great stability. This is the first study, at least to the knowledge of the authors, which focuses merely on measuring the satisfaction of the users from the used assistive device, while exploring the Assistive Technology Device Predisposition Assessment - Device Form in such depth. According to the results, it is a stable, valid and reliable instrument and applicable to the Greek population. Thus, it can be used to measure the satisfaction of patients with assistive devices. Implications for Rehabilitation The paper explores the cultural adaptability and applicability of ATD PA - Device Form. ATD PA - Device Form can be used to assess user satisfaction by the selected assistive device. ATD PA - Device Form is a valid and reliable instrument in measuring users' satisfaction in Greekreality.

  6. Assessment of the Threats to the Biodiversity and Habitats in "Stara Reka" Reserve (Bulgaria and Its Adjacent Subalpine and Alpine Areas

    Directory of Open Access Journals (Sweden)

    Svetlana V. Yocheva

    2013-06-01

    Full Text Available The assessment of the threats in the “Stara Reka” reserve and its adjacent subalpine and alpine areas is important since it makes it possible the appropriate conservation measures to be taken in order to prevent or reduce the negative effects on the biodiversity and habitats. The assessment was based on systematic studies and visits in the “Stara Reka” Reserve, located within National Park “Central Balkan” (Bulgaria, during spring, summer and autumn seasons of 2010-2011. A number of threats were recorded, where those by anthropogenic origin were predominating. Tourists have negatively influenced the wild plants such as Allium ursinum, Inula helenium and Primula frondosa by picking them up. Damages were registered on the information system and signs. Waste disposal, fires, poaching and illegal fishing were also some of the recorded threats. Many natural succession changes quite dynamically vary the habitats in the reserve, but the most dangerous for the biodiversity and degradation of habitats remain fires, erosion and introduction of alien species.

  7. Human element of corporate espionage risk management : literature review on assessment and control of outsider and insider threats

    OpenAIRE

    Sandberg, Jarkko

    2015-01-01

    The primary purpose of this study is to determine how suitable human risk management con- trols are against corporate espionage. Information risks are ascending problem with corpora- tions all over the world. Cyber attacks are commonplace, and the attackers are often trying to compromise valuable data assets. These malicious targeted attacks are bypassing traditional information security controls; therefore, organizations are endangered by these threats. Since the traditional information secu...

  8. Assessment of a portable device for the quantitative measurement of ankle joint stiffness in spastic individuals

    DEFF Research Database (Denmark)

    Lorentzen, Jakob; Grey, Michael J; Geertsen, Svend Sparre

    2012-01-01

    was measured with the portable device and a stationary torque motor. Inter- and intra-rater reliability was assessed with the intra-class correlation coefficient (ICC). RESULTS: Stiffness measures with the portable and stationary devices were significantly correlated for controls and MS participants (p...

  9. Gauging U.S. Emergency Medical Services workers' willingness to respond to pandemic influenza using a threat- and efficacy-based assessment framework.

    Directory of Open Access Journals (Sweden)

    Daniel J Barnett

    2010-03-01

    Full Text Available Emergency Medical Services workers' willingness to report to duty in an influenza pandemic is essential to healthcare system surge amidst a global threat. Application of Witte's Extended Parallel Process Model (EPPM has shown utility for revealing influences of perceived threat and efficacy on non-EMS public health providers' willingness to respond in an influenza pandemic. We thus propose using an EPPM-informed assessment of EMS workers' perspectives toward fulfilling their influenza pandemic response roles.We administered an EPPM-informed snapshot survey about attitudes and beliefs toward pandemic influenza response, to a nationally representative, stratified random sample of 1,537 U.S. EMS workers from May-June 2009 (overall response rate: 49%. Of the 586 respondents who met inclusion criteria (currently active EMS providers in primarily EMS response roles, 12% indicated they would not voluntarily report to duty in a pandemic influenza emergency if asked, 7% if required. A majority (52% indicated their unwillingness to report to work if risk of disease transmission to family existed. Confidence in personal safety at work (OR = 3.3 and a high threat/high efficacy ("concerned and confident" EPPM profile (OR = 4.7 distinguished those who were more likely to voluntarily report to duty. Although 96% of EMS workers indicated that they would probably or definitely report to work if they were guaranteed a pandemic influenza vaccine, only 59% had received an influenza immunization in the preceding 12 months.EMS workers' response willingness gaps pose a substantial challenge to prehospital surge capacity in an influenza pandemic. "Concerned and confident" EMS workers are more than four times as likely to fulfill pandemic influenza response expectations. Confidence in workplace safety is a positively influential modifier of their response willingness. These findings can inform insights into interventions for enhancing EMS workers' willingness to respond

  10. Towed Optical Assessment Device (TOAD) Data to Support Benthic Habitat Mapping since 2001

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Optical validation data were collected using a Tethered Optical Assessment Device (TOAD), an underwater sled equipped with an underwater digital video camera and...

  11. Pneumatic strength assessment device: design and isometric measurement.

    Science.gov (United States)

    Paulus, David C; Reiser, Raoul F; Troxell, Wade O

    2004-01-01

    In order to load a muscle optimally during resistance exercise, it should be heavily taxed throughout the entire range of motion for that exercise. However, traditional constant resistance squats only tax the lower-extremity muscles to their limits at the "sticking region" or a critical joint configuration of the exercise cycle. Therefore, a linear motion (Smith) exercise machine was modified with pneumatics and appropriate computer control so that it could be capable of adjusting force to control velocity within a repetition of the squat exercise or other exercise performed with the device. Prior to application of this device in a dynamic squat setting, the maximum voluntary isometric force (MVIF) produced over a spectrum of knee angles is needed. This would reveal the sticking region and overall variation in strength capacity. Five incremental knee angles (90, 110, 130, 150, and 170 degrees, where 180 degrees defined full extension) were examined. After obtaining university-approved informed consent, 12 men and 12 women participated in the study. The knee angle was set, and the pneumatic cylinder was pressurized such that the subject could move the barbell slightly but no more than two-centimeters. The peak pressure exerted over a five-second maximum effort interval was recorded at each knee angle in random order and then repeated. The average of both efforts was then utilized for further analysis. The sticking region occurred consistently at a 90 degrees knee angle, however, the maximum force produced varied between 110 degrees and 170 degrees with the greatest frequency at 150 degrees for both men and women. The percent difference between the maximum and minimum MVIF was 46% for men and 57% for women.

  12. Development of a Device for Objective Assessment of Tinnitus in Humans

    Science.gov (United States)

    2017-10-01

    AWARD NUMBER: W81XWH-14-2-0180 TITLE: Development of a Device for Objective Assessment of Tinnitus in Humans PRINCIPAL INVESTIGATOR: Jeremy G...SUBTITLE Development of a Device for Objective Assessment of Tinnitus in Humans 5a. CONTRACT NUMBER 5b. GRANT NUMBER W81XWH-14-2-0180 5c. PROGRAM...briefly (one paragraph) describes the subject, purpose and scope of the research. Tinnitus is the perception of sound in the ears or head when no

  13. Use of media and public-domain Internet sources for detection and assessment of plant health threats.

    Science.gov (United States)

    Thomas, Carla S; Nelson, Noele P; Jahn, Gary C; Niu, Tianchan; Hartley, David M

    2011-09-05

    Event-based biosurveillance is a recognized approach to early warning and situational awareness of emerging health threats. In this study, we build upon previous human and animal health work to develop a new approach to plant pest and pathogen surveillance. We show that monitoring public domain electronic media for indications and warning of epidemics and associated social disruption can provide information about the emergence and progression of plant pest infestation or disease outbreak. The approach is illustrated using a case study, which describes a plant pest and pathogen epidemic in China and Vietnam from February 2006 to December 2007, and the role of ducks in contributing to zoonotic virus spread in birds and humans. This approach could be used as a complementary method to traditional plant pest and pathogen surveillance to aid global and national plant protection officials and political leaders in early detection and timely response to significant biological threats to plant health, economic vitality, and social stability. This study documents the inter-relatedness of health in human, animal, and plant populations and emphasizes the importance of plant health surveillance.

  14. Outcome and Efficacy of Interventions by a Public Figure Threat Assessment and Management Unit: A Mirrored Study of Concerning Behaviors and Police Contacts Before and After Intervention.

    Science.gov (United States)

    James, David V; Farnham, Frank R

    2016-09-01

    Specialized units for the assessment and management of concerning behaviors towards public figures have been set up in various jurisdictions. Their efficacy has been demonstrated descriptively and in terms of reduction in concern rates. This study of 100 consecutive cases from the Fixated Threat Assessment Centre (FTAC) in the UK uses a novel measure of outcome in the form of reduction in behaviors of concern and in police call-outs/stops, using data culled from police and health service records. It adopts a mirrored design, comparing individuals over 12-month and 2-year periods before and after FTAC intervention. It demonstrates significant reductions in both numbers of individuals involved in, and number of actual incidents of, concerning communication and problematic approach, as well as police call-outs/stops. Most results are consistent across subgroups with regard to gender, previous convictions, concern level, compulsory hospitalization and grievance-driven behavior. Such threat assessment units reduce risky behavior and save police time and, possibly, costs. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  15. Assessment of computerized tomography devices in Minas Gerais state, Brazil

    International Nuclear Information System (INIS)

    Oliveira, Paulo Marcio C.; Horta, Mara Alice Avelar Saraiva; Santana, Priscila do Carmo; Magalhaes, Marcos Juliano

    2011-01-01

    Computed Tomography (CT) is the diagnostic imaging method most commonly performed today. It is a device that is undergoing a technological evolution and their quality control is sorely needed. The image quality evaluation process allow a better diagnosis and control of the patient dose received during image acquisition. The CT doses are higher than other X-ray examination techniques, like a conventional X-ray. Performance evaluation of computed tomography in Minas Gerais is not significant. Therefore, this work aims to analyze 20 CT equipment in Minas Gerais, with parameters according to the national regulatory agency (ANVISA - Agencia Nacional de Vigilancia Sanitaria) in twelve quality control tests. Sixty five percent (65%) of CT equipment evaluated showed excellent results and were not disapproved in any of the tests performed and 30% had failed in only one of the twelve tests performed. The worst result was found in the CT scanners in the test that evaluates the low contrast resolution, where 20% of CT showed non-compliance, followed by the test that evaluates the x-rays collimation beam, where 15% had failed. The tests allowed us to observe that the twenty computerized tomography equipment achieved a great pass rate. Considering that the evaluated CTs performed the quality control tests for the first time, it is concluded that the equipment used in clinics and hospitals are of good quality image and low radiation doses. (author)

  16. In planta passive sampling devices for assessing subsurface chlorinated solvents.

    Science.gov (United States)

    Shetty, Mikhil K; Limmer, Matt A; Waltermire, Kendra; Morrison, Glenn C; Burken, Joel G

    2014-06-01

    Contaminant concentrations in trees have been used to delineate groundwater contaminant plumes (i.e., phytoscreening); however, variability in tree composition hinders accurate measurement of contaminant concentrations in planta, particularly for long-term monitoring. This study investigated in planta passive sampling devices (PSDs), termed solid phase samplers (SPSs) to be used as a surrogate tree core. Characteristics studied for five materials included material-air partitioning coefficients (Kma) for chlorinated solvents, sampler equilibration time and field suitability. The materials investigated were polydimethylsiloxane (PDMS), low-density polyethylene (LDPE), linear low-density polyethylene (LLDPE), polyoxymethylene (POM) and plasticized polyvinyl chloride (PVC). Both PDMS and LLDPE samplers demonstrated high partitioning coefficients and diffusivities and were further tested in greenhouse experiments and field trials. While most of the materials could be used for passive sampling, the PDMS SPSs performed best as an in planta sampler. Such a sampler was able to accurately measure trichloroethylene (TCE) and tetrachloroethylene (PCE) concentrations while simultaneously incorporating simple operation and minimal impact to the surrounding property and environment. Copyright © 2013 Elsevier Ltd. All rights reserved.

  17. Smart Secure Homes: A Survey of Smart Home Technologies that Sense, Assess, and Respond to Security Threats.

    Science.gov (United States)

    Dahmen, Jessamyn; Cook, Diane J; Wang, Xiaobo; Honglei, Wang

    2017-08-01

    Smart home design has undergone a metamorphosis in recent years. The field has evolved from designing theoretical smart home frameworks and performing scripted tasks in laboratories. Instead, we now find robust smart home technologies that are commonly used by large segments of the population in a variety of settings. Recent smart home applications are focused on activity recognition, health monitoring, and automation. In this paper, we take a look at another important role for smart homes: security. We first explore the numerous ways smart homes can and do provide protection for their residents. Next, we provide a comparative analysis of the alternative tools and research that has been developed for this purpose. We investigate not only existing commercial products that have been introduced but also discuss the numerous research that has been focused on detecting and identifying potential threats. Finally, we close with open challenges and ideas for future research that will keep individuals secure and healthy while in their own homes.

  18. A randomized trial of standardized nursing patient assessment using wireless devices.

    Science.gov (United States)

    Dykes, Patricia C; Carroll, Diane L; Benoit, Angela; Coakley, Amanda; Chang, Frank; Empoliti, Joanne; Gallagher, Joan; Lasala, Cynthia; O'Malley, Rosemary; Rath, Greg; Silva, Judy; Li, Qi

    2007-10-11

    A complete and accurate patient assessment database is essential for effective communication, problem identification, planning and evaluation of patient status. When employed consistently for point-of-care documentation, information systems are associated with completeness and quality of documentation. The purpose of this paper is to report on the findings of a randomized, cross-over study conducted to evaluate the adequacy of a standard patient assessment module to support problem identification, care planning and tracking of nursing sensitive patient outcomes. The feasibility of wireless devices to support patient assessment data collection at the point-of-care was evaluated using wireless PDAs and tablet PCs. Seventy-nine (79) nurses from two patient care units at Massachusetts General Hospital (Boston, MA) were recruited into the study and randomized to complete patient assessment using wireless or paper devices. At the end of six weeks, nurses who where randomized to the paper assessment module were assigned to a device and those who used a device were assigned to paper for an additional six weeks. Impact was evaluated with regard to data capture, workflow implications and nurse satisfaction. Findings suggest that a standard patient assessment set promotes patient sensitive and quality data capture, which is augmented by the use of wireless devices.

  19. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-05-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  20. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-01-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  1. Tissue quality assessment using a novel direct elasticity assessment device (the E-finger: a cadaveric study of prostatectomy dissection.

    Directory of Open Access Journals (Sweden)

    Daniel W Good

    Full Text Available Minimally invasive radical prostatectomy (RP (robotic and laparoscopic, have brought improvements in the outcomes of RP due to improved views and increased degrees of freedom of surgical devices. Robotic and laparoscopic surgeries do not incorporate haptic feedback, which may result in complications secondary to inadequate tissue dissection (causing positive surgical margins, rhabdosphincter damage, etc. We developed a micro-engineered device (6 mm2 sized [E-finger] capable of quantitative elasticity assessment, with amplitude ratio, mean ratio and phase lag representing this. The aim was to assess the utility of the device in differentiating peri-prostatic tissue types in order to guide prostate dissection.Two embalmed and 2 fresh frozen cadavers were used in the study. Baseline elasticity values were assessed in bladder, prostate and rhabdosphincter of pre-dissected embalmed cadavers using the micro-engineered device. A measurement grid was created to span from the bladder, across the prostate and onto the rhabdosphincter of fresh frozen cadavers to enable a systematic quantitative elasticity assessment of the entire area by 2 independent assessors. Tissue was sectioned along each row of elasticity measurement points, and stained with haematoxylin and eosin (H&E. Image analysis was performed with Image Pro Premier to determine the histology at each measurement point.Statistically significant differences in elasticity were identified between bladder, prostate and sphincter in both embalmed and fresh frozen cadavers (p = < 0.001. Intra-class correlation (ICC reliability tests showed good reliability (average ICC = 0.851. Sensitivity and specificity for tissue identification was 77% and 70% respectively to a resolution of 6 mm2.This cadaveric study has evaluated the ability of our elasticity assessment device to differentiate bladder, prostate and rhabdosphincter to a resolution of 6 mm2. The results provide useful data for which to continue to

  2. Tissue quality assessment using a novel direct elasticity assessment device (the E-finger): a cadaveric study of prostatectomy dissection.

    Science.gov (United States)

    Good, Daniel W; Khan, Ashfaq; Hammer, Steven; Scanlan, Paul; Shu, Wenmiao; Phipps, Simon; Parson, Simon H; Stewart, Grant D; Reuben, Robert; McNeill, S Alan

    2014-01-01

    Minimally invasive radical prostatectomy (RP) (robotic and laparoscopic), have brought improvements in the outcomes of RP due to improved views and increased degrees of freedom of surgical devices. Robotic and laparoscopic surgeries do not incorporate haptic feedback, which may result in complications secondary to inadequate tissue dissection (causing positive surgical margins, rhabdosphincter damage, etc). We developed a micro-engineered device (6 mm2 sized) [E-finger]) capable of quantitative elasticity assessment, with amplitude ratio, mean ratio and phase lag representing this. The aim was to assess the utility of the device in differentiating peri-prostatic tissue types in order to guide prostate dissection. Two embalmed and 2 fresh frozen cadavers were used in the study. Baseline elasticity values were assessed in bladder, prostate and rhabdosphincter of pre-dissected embalmed cadavers using the micro-engineered device. A measurement grid was created to span from the bladder, across the prostate and onto the rhabdosphincter of fresh frozen cadavers to enable a systematic quantitative elasticity assessment of the entire area by 2 independent assessors. Tissue was sectioned along each row of elasticity measurement points, and stained with haematoxylin and eosin (H&E). Image analysis was performed with Image Pro Premier to determine the histology at each measurement point. Statistically significant differences in elasticity were identified between bladder, prostate and sphincter in both embalmed and fresh frozen cadavers (p = elasticity assessment device to differentiate bladder, prostate and rhabdosphincter to a resolution of 6 mm2. The results provide useful data for which to continue to examine the use of elasticity assessment devices for tissue quality assessment with the aim of giving haptic feedback to surgeons performing complex surgery.

  3. New Monitoring Technology to Objectively Assess Adherence to Prescribed Footwear and Assistive Devices During Ambulatory Activity

    NARCIS (Netherlands)

    Bus, Sicco A.; Waaijman, Roelof; Nollet, Frans

    2012-01-01

    Bus SA, Waaijman R, Nollet F. New monitoring technology to objectively assess adherence to prescribed footwear and assistive devices during ambulatory activity. Arch Phys Med Rehabil 2012;93:2075-9. Objective: To assess the validity and feasibility of a new temperature-based adherence monitor to

  4. Assessment of Selected Parameters of the Automatic Scarification Device as an Example of a Device for Sustainable Forest Management

    Directory of Open Access Journals (Sweden)

    Ryszard Tadeusiewicz

    2017-12-01

    Full Text Available Due to technological progress in forestry, seedlings with covered root systems—especially those grown in container nurseries—have become increasingly important in forest nursery production. One the trees that is most commonly grown this way is the common oak (Quercus robur L.. For an acorn to be sown in a container, it is necessary to remove its upper part during mechanical scarification, and evaluate its sowing suitability. At present, this is mainly done manually and by visual assessment. The low effectiveness of this method of acorn preparation has encouraged a search for unconventional solutions. One of them is the use of an automated device that consists of a computer vision-based module. For economic reasons related to the cost of growing seedlings in container nurseries, it is beneficial to minimize the contribution of unhealthy seeds. The maximum accuracy, which is understood as the number of correct seed diagnoses relative to the total number of seeds being assessed, was adopted as a criterion for choosing a separation threshold. According to the method proposed, the intensity and red components of the images of scarified acorns facilitated the best results in terms of the materials examined during the experiment. On average, a 10% inaccuracy of separation was observed. A secondary outcome of the presented research is an evaluation of the ergonomic parameters of the user interface that is attached to the unit controlling the device when it is running in its autonomous operation mode.

  5. [Risk assessment and risk control for occupational exposure to chemical toxicants from an isophorone nitrile device].

    Science.gov (United States)

    Wang, Dejun; Fu, Xiaokuan; Kong, Fanling; Sui, Shaofeng; Jiang, Yuanyuan; Du, Yinglin; Zhou, Jingyang

    2014-06-01

    Risk assessment and risk control for occupational exposure to chemical toxicants were performed on an isophorone nitrile device with an annual production of 5,000 tons, based on improved Singaporean semi-quantitative risk assessment method, with consideration of actual situation in China and in the present project. With the use of engineering analysis and identification of occupational hazards in the improved Singaporean semi-quantitative risk assessment method, hazard rating (HR) and risk assessment were performed on chemical toxicants from an isophorone nitrile device with an annual production of 5,000 tons. The chemical toxicants in the isophorone nitrile device were mainly isophorone, hydrocyanic acid, methanol, phosphoric acid, sodium hydroxide, and sodium cyanide; the HR values were mild hazard (2), extreme hazard (5), mild hazard (2), mild hazard (2), moderate hazard (3), and extreme hazard (5), respectively, and the corresponding exposure rating (ER) values were 2.09, 2.72, 2.76, 1.68, 2.0, and 1.59, respectively. The risk of chemical toxicants in this project was assessed according to the formula Risk = [HR×ER](1/2). Hydrocyanic acid was determined as high risk, sodium hydroxide and sodium cyanide as medium risk, and isophorone, methanol, and phosphoric acid as low risk. Priority in handling of risks was determined by risk rating. The table of risk control measure was established for pre-assessment of occupational hazards. With risk assessment in this study, we concluded that the isophorone nitrile device with 5,000 ton annual production was a high-occupational hazard device. This device is a project of extreme occupational hazard. The improved Singaporean semi-quantitative risk assessment method is a scientific and applicable method, and is especially suitable for pre-evaluation of on-site project with no analogy.

  6. Ultrasound assessment of the Essure contraceptive devices: is three-dimensional ultrasound really needed?

    Science.gov (United States)

    Paladini, Dario; Di Spiezio Sardo, Attilio; Coppola, Carmela; Zizolfi, Brunella; Pastore, Gaetano; Nappi, Carmine

    2015-01-01

    To evaluate the feasibility of 3-dimensional ultrasound (3DUS) for sonographic localization of Essure microinserts, comparing it with 2-dimensional ultrasound (2DUS) insofar as time to visualize the inserts and accuracy in determining their localization. Prospective study (Canadian Task Force classification II-2). University clinic. Twenty-seven consecutive women undergoing hysteroscopic Essure device placement. Essure microinserts were inserted in the outpatient hysteroscopy clinic following the manufacturer's recommendations, leaving from 3 to 8 loops of the inserts in the uterine cavity. In all patients, 2DUS and 3DUS were performed 3 months after the procedure. 2DUS was performed first; the device(s) were located, and their position was recorded. Then 3DUS scans were acquired, trying when possible to have both devices at least at a 45-degree angle with the insonation beam for optimal rendering on 3DUS. The OmniView method with volume contrast imaging was used to show the relationships of the microinserts within the uterine cavity when possible. To define the position of the Essure device in relation to the uterus and the salpinges, we used the classification developed by Legendre and colleagues. After sonographic evaluation all women underwent hysterosalpingography to assess the success of sterilization. Hysteroscopic insertion was successful in all patients, with 2 Essure devices placed in 25 patients and 1 device in 2 patients (due to previous salpingectomy performed because of ectopic pregnancy), for a total of 52 devices. One spontaneous late (within 3 months) expulsion of the device occurred; the device had migrated almost completely into the uterine cavity. At 3-month follow-up, all 51 correctly placed devices were easily observed at 2DUS (mean [SD] duration of the procedure, 2.25 [0.8] minutes). At 3DUS in 51 cases, the device was in perfect position (1+2+3) in 21 (41.2%), in position 2+3 in 14 (27.4%), and in position +3 in 16 (31.4%). Both microinserts

  7. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  8. Validating the Accuracy of Reaction Time Assessment on Computer-Based Tablet Devices.

    Science.gov (United States)

    Schatz, Philip; Ybarra, Vincent; Leitner, Donald

    2015-08-01

    Computer-based assessment has evolved to tablet-based devices. Despite the availability of tablets and "apps," there is limited research validating their use. We documented timing delays between stimulus presentation and (simulated) touch response on iOS devices (3rd- and 4th-generation Apple iPads) and Android devices (Kindle Fire, Google Nexus, Samsung Galaxy) at response intervals of 100, 250, 500, and 1,000 milliseconds (ms). Results showed significantly greater timing error on Google Nexus and Samsung tablets (81-97 ms), than Kindle Fire and Apple iPads (27-33 ms). Within Apple devices, iOS 7 obtained significantly lower timing error than iOS 6. Simple reaction time (RT) trials (250 ms) on tablet devices represent 12% to 40% error (30-100 ms), depending on the device, which decreases considerably for choice RT trials (3-5% error at 1,000 ms). Results raise implications for using the same device for serial clinical assessment of RT using tablets, as well as the need for calibration of software and hardware. © The Author(s) 2015.

  9. Left Atrial Appendage Closure Device With Delivery System: A Health Technology Assessment

    Science.gov (United States)

    Nevis, Immaculate; Falk, Lindsey; Wells, David; Higgins, Caroline

    2017-01-01

    Background Atrial fibrillation is a common cardiac arrhythmia, and 15% to 20% of those who have experienced stroke have atrial fibrillation. Treatment options to prevent stroke in people with atrial fibrillation include pharmacological agents such as novel oral anticoagulants or nonpharmacological devices such as the left atrial appendage closure device with delivery system (LAAC device). The objectives of this health technology assessment were to assess the clinical effectiveness and cost-effectiveness of the LAAC device versus novel oral anticoagulants in patients without contraindications to oral anticoagulants and versus antiplatelet agents in patients with contraindications to oral anticoagulants. Methods We performed a systematic review and network meta-analysis. We also conducted an economic literature review, economic evaluation, and budget impact analysis to assess the cost-effectiveness and budget impact of the LAAC device compared with novel oral anticoagulants and oral antiplatelet agents (e.g., aspirin). We also spoke with patients to better understand their preferences, perspectives, and values. Results Seven randomized controlled studies met the inclusion criteria for indirect comparison. Five studies assessed the effectiveness of novel oral anticoagulants versus warfarin, and two studies compared the LAAC device with warfarin. No studies were identified that compared the LAAC device with aspirin in patients in whom oral anticoagulants were contraindicated. Using the random effects model, we found that the LAAC device was comparable to novel oral anticoagulants in reducing stroke (odds ratio [OR] 0.85; credible interval [Cr.I] 0.63–1.05). Similarly, the reduction in the risk of all-cause mortality was comparable between the LAAC device and novel oral anticoagulants (OR 0.71; Cr.I 0.49–1.22). The LAAC device was found to be superior to novel oral anticoagulants in preventing hemorrhagic stroke (OR 0.45; Cr.I 0.29–0.79), whereas novel oral

  10. Ransomware - Threats Vulnerabilities And Recommendations

    Directory of Open Access Journals (Sweden)

    Nadeem Shah

    2017-06-01

    Full Text Available Attack methodologies transform with the transforming dynamics of technology. Consequently it becomes imperative that individuals and organization implement the highest levels of security within their devices and infrastructure for optimal protection against these rapidly evolving attacks. Ransomware is one such attack that never fails to surprise in terms of its ability to identify vulnerabilities and loopholes in technology. This paper discusses the categories of ransomware its common attack vectors and provides a threat landscape with the aim to highlight the true potential and destructive nature of such malware based attacks. In this paper we also present the most current ransomware attack that is still a potential threat and also provide recommendations and strategies for prevention and protection against these attacks. A novel solution is also discussed that could be further worked upon in the future by other researchers and vendors of security devices.

  11. User's manual of a computer code for seismic hazard evaluation for assessing the threat to a facility by fault model. SHEAT-FM

    International Nuclear Information System (INIS)

    Sugino, Hideharu; Onizawa, Kunio; Suzuki, Masahide

    2005-09-01

    To establish the reliability evaluation method for aged structural component, we developed a probabilistic seismic hazard evaluation code SHEAT-FM (Seismic Hazard Evaluation for Assessing the Threat to a facility site - Fault Model) using a seismic motion prediction method based on fault model. In order to improve the seismic hazard evaluation, this code takes the latest knowledge in the field of earthquake engineering into account. For example, the code involves a group delay time of observed records and an update process model of active fault. This report describes the user's guide of SHEAT-FM, including the outline of the seismic hazard evaluation, specification of input data, sample problem for a model site, system information and execution method. (author)

  12. The validity of visual acuity assessment using mobile technology devices in the primary care setting.

    Science.gov (United States)

    O'Neill, Samuel; McAndrew, Darryl J

    2016-04-01

    The assessment of visual acuity is indicated in a number of clinical circumstances. It is commonly conducted through the use of a Snellen wall chart. Mobile technology developments and adoption rates by clinicians may potentially provide more convenient methods of assessing visual acuity. Limited data exist on the validity of these devices and applications. The objective of this study was to evaluate the assessment of distance visual acuity using mobile technology devices against the commonly used 3-metre Snellen chart in a primary care setting. A prospective quantitative comparative study was conducted at a regional medical practice. The visual acuity of 60 participants was assessed on a Snellen wall chart and two mobile technology devices (iPhone, iPad). Visual acuity intervals were converted to logarithm of minimum angle of resolution (logMAR) scores and subjected to intraclass correlation coefficient (ICC) assessment. The results show a high level of general agreement between testing modality (ICC 0.917 with a 95% confidence interval of 0.887-0.940). The high level of agreement of visual acuity results between the Snellen wall chart and both mobile technology devices suggests that clinicians can use this technology with confidence in the primary care setting.

  13. A Systematic Review on Existing Measures for the Subjective Assessment of Rehabilitation and Assistive Robot Devices

    Directory of Open Access Journals (Sweden)

    Yiannis Koumpouros

    2016-01-01

    Full Text Available The objective of the current study is to identify and classify outcome measures currently used for the assessment of rehabilitation or assistive robot devices. We conducted a systematic review of the literature using PubMed, MEDLINE, CIRRIE, and Scopus databases for studies that assessed rehabilitation or assistive robot devices from 1980 through January 2016. In all, 31 articles met all inclusion criteria. Tailor-made questionnaires were the most commonly used tool at 66.7%, while the great majority (93.9% of the studies used nonvalidated instruments. The study reveals the absence of a standard scale which makes it difficult to compare the results from different researchers. There is a great need, therefore, for a valid and reliable instrument to be available for use by the intended end users for the subjective assessment of robot devices. The study concludes by identifying two scales that have been validated in general assistive technology devices and could support the scope of subjective assessment in rehabilitation or assistive robots (however, with limited coverage and a new one called PYTHEIA, recently published. The latter intends to close the gap and help researchers and developers to evaluate, assess, and produce products that satisfy the real needs of the end users.

  14. Stereotype Threat, Inquiring about Test Takers' Race and Gender, and Performance on Low-Stakes Tests in a Large-Scale Assessment. Research Report. ETS RR-15-02

    Science.gov (United States)

    Stricker, Lawrence J.; Rock, Donald A.; Bridgeman, Brent

    2015-01-01

    This study explores stereotype threat on low-stakes tests used in a large-scale assessment, math and reading tests in the Education Longitudinal Study of 2002 (ELS). Issues identified in laboratory research (though not observed in studies of high-stakes tests) were assessed: whether inquiring about their race and gender is related to the…

  15. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  16. Assessment of Current Practice for Tank Testing of Small Marine Energy Devices

    DEFF Research Database (Denmark)

    Kofoed, Jens Peter; Frigaard, Peter

    Discussion Report. Equitable Testing and Evaluation of Marine Energy Extraction Devices in terms of Performance, Cost and Environmental Impact. The report is a contribution by Aalborg University (AAU) to the deliverable on Assessment of current practice for tank testing of small marine energy...

  17. Risk assessment of medical devices: evaluation of microbiological and toxicological safety

    International Nuclear Information System (INIS)

    Dorpema, J.W.

    1995-01-01

    Safety assessment of medical devices includes sterilization and biological evaluation or biocompatability testing. Sterilization by ETO gas is criticised for their carcinogenic potency or even banned. Mutual acceptance of biological evaluation test results is promoted by a laboratory accreditation and qualification program. (Author)

  18. Bone status in rheumatoid arthritis assessed at peripheral sites by three different quantitative ultrasound devices

    DEFF Research Database (Denmark)

    Madsen, O R; Suetta, C; Egsmose, C

    2004-01-01

    sites in 27 women with RA (mean disease duration 15 years) and in 36 healthy women matched for age, height and weight. Speed of sound (SOS, m/s), broadband ultrasound attenuation (BUA, dB/MHz) and stiffness of the calcaneus were assessed by a Lunar Achilles device. Amplitude-dependent SOS (Ad-SOS, m...

  19. Linking the Regulatory and Reimbursement Processes for Medical Devices : The Need for Integrated Assessments

    NARCIS (Netherlands)

    Ciani, Oriana; Wilcher, Britni; van Giessen, Anoukh; Taylor, Rod S.

    2017-01-01

    Much criticism has been directed at the licencing requirements for medical devices (MDs) as they often result in a lack of robust evidence to inform health technology assessment (HTA) decisions. To better understand the current international decisional framework on MD technologies, we undertook

  20. Focused review on transthoracic echocardiographic assessment of patients with continuous axial left ventricular assist devices.

    Science.gov (United States)

    Topilsky, Yan; Maltais, Simon; Oh, Jae K; Atchison, Fawn W; Perrault, Louis P; Carrier, Michel; Park, Soon J

    2011-02-08

    Left ventricular assist devices (LVADs) are systems for mechanical support for patients with end-stage heart failure. Preoperative, postoperative and comprehensive followup with transthoracic echocardiography has a major role in LVAD patient management. In this paper, we will present briefly the hemodynamics of axial-flow LVAD, the rationale, and available data for a complete and organized echocardiographic assessment in these patients including preoperative assessment, postoperative and long-term evaluation.

  1. 49 CFR 1515.5 - Appeal of Initial Determination of Threat Assessment based on criminal conviction, immigration...

    Science.gov (United States)

    2010-10-01

    ... Assessment based on criminal conviction, immigration status, or mental capacity. 1515.5 Section 1515.5... criminal conviction, immigration status, or mental capacity. (a) Scope. This section applies to applicants... the immigration status requirements as described in 49 CFR 1572.105. (3) TSA has determined that an...

  2. Threat status assessment of Ceropegia anjanerica Malpure et al. (Magnoliopsida: Gentianales: Apocynaceae from Anjaneri Hills, Nashik District, Maharashtra, India

    Directory of Open Access Journals (Sweden)

    Jui Pethe

    2015-03-01

    Full Text Available Ceropegia anjanerica is endemic to the Anjaneri Hills area of Nashik District.  It is assessed as Critically Endangered as per the IUCN red list criteria using primary and secondary information on trends in EOO, AOO and sub-populations.  Factors affecting this species and its habitat, and community conservation efforts are described and recommendations are made for its protection.  

  3. Threat status assessment of Ceropegia anjanerica Malpure et al. (Magnoliopsida: Gentianales: Apocynaceae) from Anjaneri Hills, Nashik District, Maharashtra, India

    OpenAIRE

    Jui Pethe; Amit Tillu; Aparna Watve

    2015-01-01

    Ceropegia anjanerica is endemic to the Anjaneri Hills area of Nashik District.  It is assessed as Critically Endangered as per the IUCN red list criteria using primary and secondary information on trends in EOO, AOO and sub-populations.  Factors affecting this species and its habitat, and community conservation efforts are described and recommendations are made for its protection.  

  4. Verification, Validation and Credibility Assessment of a Computational Model of the Advanced Resistive Exercise Device (ARED)

    Science.gov (United States)

    Werner, C. R.; Humphreys, B. T.; Mulugeta, L.

    2014-01-01

    The Advanced Resistive Exercise Device (ARED) is the resistive exercise device used by astronauts on the International Space Station (ISS) to mitigate bone loss and muscle atrophy due to extended exposure to microgravity (micro g). The Digital Astronaut Project (DAP) has developed a multi-body dynamics model of biomechanics models for use in spaceflight exercise physiology research and operations. In an effort to advance model maturity and credibility of the ARED model, the DAP performed verification, validation and credibility (VV and C) assessment of the analyses of the model in accordance to NASA-STD-7009 'Standards for Models and Simulations'.

  5. Application of remote sensing data and GIS for landslide risk assessment as an environmental threat to Izmir city (west Turkey).

    Science.gov (United States)

    Akgun, Aykut; Kıncal, Cem; Pradhan, Biswajeet

    2012-09-01

    In this study, landslide risk assessment for Izmir city (west Turkey) was carried out, and the environmental effects of landslides on further urban development were evaluated using geographical information systems and remote sensing techniques. For this purpose, two different data groups, namely conditioning and triggering data, were produced. With the help of conditioning data such as lithology, slope gradient, slope aspect, distance from roads, distance from faults and distance from drainage lines, a landslide susceptibility model was constructed by using logistic regression modelling approach. The accuracy assessment of the susceptibility map was carried out by the area under curvature (AUC) approach, and a 0.810 AUC value was obtained. This value shows that the map obtained is successful. Due to the fact that the study area is located in an active seismic region, earthquake data were considered as primary triggering factor contributing to landslide occurrence. In addition to this, precipitation data were also taken into account as a secondary triggering factor. Considering the susceptibility data and triggering factors, a landslide hazard index was obtained. Furthermore, using the Aster data, a land-cover map was produced with an overall kappa value of 0.94. From this map, settlement areas were extracted, and these extracted data were assessed as elements at risk in the study area. Next, a vulnerability index was created by using these data. Finally, the hazard index and the vulnerability index were combined, and a landslide risk map for Izmir city was obtained. Based on this final risk map, it was observed that especially south and north parts of the Izmir Bay, where urbanization is dense, are threatened to future landsliding. This result can be used for preliminary land use planning by local governmental authorities.

  6. CEPF Western Ghats Special Series: Avian collision threat assessment at Bhambarwadi Wind Farm Plateau in northern Western Ghats, India

    Directory of Open Access Journals (Sweden)

    S. Pande

    2013-01-01

    Full Text Available To address the shortage of power in India, wind energy is increasingly harnessed as an alternate and renewable energy source. There is a rapid increase in the number of wind farms at suitable sites all over the country. Some of the key sites with optimal wind velocities are the plateaus on the Western Ghats - a global hotspot of biological diversity. The rocky plateaus on the Western Ghats are terrestrial habitat islands facing extreme micro-environmental conditions; however, scanty information is available on the ecology of these plateaus. We undertook a two-year study to assess the impact of wind farms on birds. We also documented the avian diversity at Bhambarwadi Plateau, northern Western Ghats, India. To the best of our knowledge this is the first such study in India. We recorded 89 avian species on the plateau, 27 of which flew in the risk area swept by the rotor blades, and hence are potentially at risk of collision. The collision index (the number of bird collisions with wind turbines over a period of one year assuming that the birds do not take any avoidance measure for these species were estimated. We also identified species at risk from collision with transformers and wind-masts, and at risk from electrocution. Reduction in avian activity in the study area was evident with progress of wind farm erection. Despite the small footprint of an individual wind turbine, the associated infrastructure development causes wider habitat modification and destruction resulting in a displacement effect. Therefore, wind farm erections in strategic locations such as biodiversity hotspots should be subject to prior site based strategic environmental assessments (SEA as well as environmental impact assessment (EIA studies.

  7. Development of a Model for Quantitative Assessment of Risks and Identification of Threats in Anti-Crisis Management of a Machine-Building Enterprise

    Directory of Open Access Journals (Sweden)

    Kozyk Vasyl V.

    2017-03-01

    Full Text Available The aim of the article is to develop a model for quantitative assessment of risks in anti-crisis management of a machine-building enterprise. The quantitative assessment will allow to identify among the risks the threats that can be considered as catastrophic risks. To assess the integral risk of anti-crisis management of the enterprise, there used a process approach distinguishing the process of anti-crisis management activity and the process of implementation of the anti-crisis program. Within the framework of the process the types of activity are singled out, for each of them risks are identified with revealing their reasons. There built a fuzzy hierarchical model comprising the following elements: terminal nodes — indicators (factors of risks; non-terminal nodes — separate risks that are characteristic for the processes and risks of each process as a whole; root of the tree — the integral risk of anti-crisis management. The expediency of building a hierarchical fuzzy model, within which conclusions are formed for intermediate variables, is substantiated. Based on the own research and taking into account the opinion of experts, the parameters of the trapezoidal membership functions for assessing indicators and risks are determined. Fuzzy bases of knowledge about the correlation are formed using the Mamdani algorithm. The adequacy of the model is estimated on the basis of the learning sample. The built fuzzy model makes it possible to obtain risk assessment based on the set values of the indicators, thus providing an analysis of the sensitivity of risks to various factors. It is easily adjusted to other conditions and types of economic activity of the enterprise.

  8. Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks

    CERN Document Server

    Tilaro, F

    2011-01-01

    CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

  9. Designing and conducting tabletop exercises to assess public health preparedness for manmade and naturally occurring biological threats

    Directory of Open Access Journals (Sweden)

    Dausey David J

    2007-05-01

    Full Text Available Abstract Background Since 2001, state and local health departments in the United States (US have accelerated efforts to prepare for high-impact public health emergencies. One component of these activities has been the development and conduct of exercise programs to assess capabilities, train staff and build relationships. This paper summarizes lessons learned from tabletop exercises about public health emergency preparedness and about the process of developing, conducting, and evaluating them. Methods We developed, conducted, and evaluated 31 tabletop exercises in partnership with state and local health departments throughout the US from 2003 to 2006. Participant self evaluations, after action reports, and tabletop exercise evaluation forms were used to identify aspects of the exercises themselves, as well as public health emergency responses that participants found more or less challenging, and to highlight lessons learned about tabletop exercise design. Results Designing the exercises involved substantial collaboration with representatives from participating health departments to assure that the scenarios were credible, focused attention on local preparedness needs and priorities, and were logistically feasible to implement. During execution of the exercises, nearly all health departments struggled with a common set of challenges relating to disease surveillance, epidemiologic investigations, communications, command and control, and health care surge capacity. In contrast, performance strengths were more varied across participating sites, reflecting specific attributes of individual health departments or communities, experience with actual public health emergencies, or the emphasis of prior preparedness efforts. Conclusion The design, conduct, and evaluation of the tabletop exercises described in this report benefited from collaborative planning that involved stakeholders from participating health departments and exercise developers and

  10. The use of a new automatic device for patients' assessment at Triage in Emergency Department

    Directory of Open Access Journals (Sweden)

    Salvatore Di Somma

    2013-06-01

    Full Text Available Objectives: To assess time saving in an Emergency Department arising out of the introduction of automatic devices (Carescape™ V100 to measure vital signs compared to the manual devices. Methods: We performed a prospective, observational study of eligible patients referring to Sant’Andrea Hospital Emergency Department during the entire month of October 2009, randomly assigned into two groups. In the first group of 476 patients vital signs measurements were detected with manual devices, while in the second group of 477 patients with automatic device Carescape™ V100. Results: Data indicated that the comparison of the total time between the two groups gave a significant difference (1993 vs 1518 min, p < 0.001. No differences were found with respect to age, sex and priority codes. Significant differences were also found when comparing the subgroups of the same acuity categories: white codes 4.33 vs 2.27 (min, p < 0.05; green codes 4.28 vs 3.37 (min, p < 0.001; yellow codes 3.92 vs 2.72 (min, p < 0.001. Conclusions: Our data demonstrated a statistical significance between the two groups with a difference of 475 minutes spent in Triage procedures including vital signs measurements. In conclusion time saved by vital signs automatic device could allow ED physicians to make a qualified approach with an earlier diagnosis and a more rapid and effective therapy, possibly improving patients’ outcomes. ABSTRACT of data concerning vital signs quality assessment, because we did not compare the two methods in the same patient and we did not correlate Triage priority evaluation with patients’ outcomes. In the future further studies should be specifically aimed to address this issue. In conclusion time saved by vital signs automatic device could allow ED physicians to make a qualified approach to patient with an earlier diagnosis and a more rapid and effective therapy, possibly improving patients’ outcomes.

  11. Sperm quality assessment via separation and sedimentation in a microfluidic device.

    Science.gov (United States)

    Chen, Chang-Yu; Chiang, Tsun-Chao; Lin, Cheng-Ming; Lin, Shu-Sheng; Jong, De-Shien; Tsai, Vincent F-S; Hsieh, Ju-Ton; Wo, Andrew M

    2013-09-07

    A major reason for infertility is due to male factors, including the quality of spermatozoa, which is a primary factor and often difficult to assess, particularly the total sperm concentration and its motile percentage. This work presents a simple microfluidic device to assess sperm quality by quantifying both total and motile sperm counts. The key design feature of the microfluidic device is two channels separated by a permeative phase-guide structure, where one channel is filled with raw semen and the other with pure buffer. The semen sample was allowed to reach equilibrium in both chambers, whereas non-motile sperms remained in the original channel, and roughly half of the motile sperms would swim across the phase-guide barrier into the buffer channel. Sperms in each channel agglomerated into pellets after centrifugation, with the corresponding area representing total and motile sperm concentrations. Total sperm concentration up to 10(8) sperms per ml and motile percentage in the range of 10-70% were tested, encompassing the cutoff value of 40% stated by World Health Organization standards. Results from patient samples show compact and robust pellets after centrifugation. Comparison of total sperm concentration between the microfluidic device and the Makler chamber reveal they agree within 5% and show strong correlation, with a coefficient of determination of R(2) = 0.97. Motile sperm count between the microfluidic device and the Makler chamber agrees within 5%, with a coefficient of determination of R(2) = 0.84. Comparison of results from the Makler Chamber, sperm quality analyzer, and the microfluidic device revealed that results from the microfluidic device agree well with the Makler chamber. The sperm microfluidic chip analyzes both total and motile sperm concentrations in one spin, is accurate and easy to use, and should enable sperm quality analysis with ease.

  12. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  13. A Probabilistic Assessment of Threats to Surface Water Resources in Watersheds of the Lower Colorado River Basin

    Science.gov (United States)

    Murphy, K. W.; Ellis, A. W.

    2012-12-01

    The Salt and Verde River watersheds in the Lower Colorado River Basin are a very important surface water resource in the Southwest United States. Their runoff is captured by a downstream reservoir system serving approximately 40% of the water demand and providing hydroelectric power to the Phoenix, Arizona area. Concerns have been expressed over the risks associated with their highly variable climate dependencies under the realization that the short, historical stream flow record was but one of many possible temporal and volumetric outcome sequences. A characterization of the possible range of flow deficits arising from natural variability beyond those evident in the instrumental record can facilitate sustainability planning as well as adaptation to future climate change scenarios. Methods were developed for this study to generate very long seasonal time series of net reservoir inflows by Monte Carlo simulations of the Salt and Verde watersheds which can be analyzed for detailed probabilistic insights. Other efforts to generate stochastic flow representations for impact assessments have been limited by normality distribution assumptions, inability to represent the covariance of flow contributions from multiple watersheds, complexities of different seasonal origins of precipitation and runoff dependencies, and constraints from spectral properties of the observational record. These difficulties were overcome in this study through stationarity assessments and development of joint probability distributions with highly skewed discrete density functions characteristic of the different watershed-season behaviors derived from a 123 year record. As well, methods of introducing season-to-season correlations owing to antecedent precipitation runoff efficiency enhancements have been incorporated. Representative 10,000 year time series have been stochastically generated which reflect a full range of temporal variability in flow volume distributions. Extreme value statistical

  14. Development and evaluation of a novel smart device-based application for burn assessment and management.

    Science.gov (United States)

    Godwin, Zachary; Tan, James; Bockhold, Jennifer; Ma, Jason; Tran, Nam K

    2015-06-01

    We have developed a novel software application that provides a simple and interactive Lund-Browder diagram for automatic calculation of total body surface area (TBSA) burned, fluid formula recommendations, and serial wound photography on a smart device platform. The software was developed for the iPad (Apple, Cupertino, CA) smart device platforms. Ten burns ranging from 5 to 95% TBSA were computer generated on a patient care simulator using Adobe Photoshop CS6 (Adobe, San Jose, CA). Burn clinicians calculated the TBSA first using a paper-based Lund-Browder diagram. Following a one-week "washout period", the same clinicians calculated TBSA using the smart device application. Simulated burns were presented in a random fashion and clinicians were timed. Percent TBSA burned calculated by Peregrine vs. the paper-based Lund-Browder were similar (29.53 [25.57] vs. 28.99 [25.01], p=0.22, n=7). On average, Peregrine allowed users to calculate burn size significantly faster than the paper form (58.18 [31.46] vs. 90.22 [60.60]s, p<0.001, n=7). The smart device application also provided 5 megapixel photography capabilities, and acute burn resuscitation fluid calculator. We developed an innovative smart device application that enables accurate and rapid burn size assessment to be cost-effective and widely accessible. Copyright © 2014 Elsevier Ltd and ISBI. All rights reserved.

  15. Randomized controlled trial in rural Ethiopia to assess a portable water treatment device.

    Science.gov (United States)

    Boisson, Sophie; Schmidt, Wolf-Peter; Berhanu, Tsegahiwot; Gezahegn, Henock; Clasen, Thomas

    2009-08-01

    We conducted a randomized controlled trial to assess the Lifestraw Personal pipe-style water treatment device among a rural population in Ethiopia. A total of 313 households (including 1516 persons) were randomly assigned either to an intervention group in which each householder received a Lifestraw Personal or a control. Households were visited fortnightly over a five-month intervention period and asked to report any episode of diarrhea during the previous week. A random sample of 160 devices was tested each month to assess the presence of thermotolerant coliforms (TTC) and residual iodine in treated water and to measure flow rate under simulated use. Members of the intervention group had 25% fewer weeks with diarrhea than those of the control group (longitudinal prevalence ratio = 0.75; 95% CI 0.60; 0.95). All 718 filtered water samples were free of TTC, were free of detectable iodine disinfectant, and showed a constant flow rate over time. After the five-month intervention period, 34% of participants reported use of device in the preceding week and 13% reported consistent use. While the device was associated with a 25% reduction in longitudinal prevalence of diarrhea, low levels of use suggest that much of this effect is likely to be attributable to reporting bias that is common in open trials with nonobjective outcomes.

  16. [Hospital-based health technology assessment in France: how to proceed to evaluate innovative medical devices?].

    Science.gov (United States)

    Martelli, N; van den Brink, H; Denies, F; Dervaux, B; Germe, A F; Prognon, P; Pineau, J

    2014-01-01

    Innovative medical devices offer solutions to medical problems and greatly improve patients' outcomes. Like National Health Technology Assessment (HTA) agencies, hospitals face numerous requests for innovative and costly medical devices. To help local decision-makers, different approaches of hospital-based HTA (HB-HTA) have been adopted worldwide. The objective of the present paper is to explore HB-HTA models for adopting innovative medical devices in France and elsewhere. Four different models have been conceptualized: "ambassador" model, "mini-HTA" model, "HTA unit" model and "internal committee". Apparently, "HTA unit" and "internal committee" (or a mixture of both models) are the prevailing HB-HTA models in France. Nevertheless, some weaknesses of these models have been pointed out in previous works. Only few examples involving hospital pharmacists have been found abroad, except in France and in Italy. Finally, the harmonization of the assessment of innovative medical devices in France needs a better understanding of HB-HTA practices. Copyright © 2013 Elsevier Masson SAS. All rights reserved.

  17. Differences between Mothers' and Fathers' Ratings of Family Functioning with the Family Assessment Device: The Validity of Combined Parent Scores

    Science.gov (United States)

    Cooke, Dawson; Marais, Ida; Cavanagh, Robert; Kendall, Garth; Priddis, Lynn

    2015-01-01

    The psychometric properties of the General Functioning subscale of the McMaster Family Assessment Device were examined using the Rasch Model (N = 237 couples). Mothers' and fathers' ratings of the General Functioning subscale of the McMaster Family Assessment Device are recommended, provided these are analyzed separately. More than a quarter of…

  18. Validity of Devices That Assess Body Temperature During Outdoor Exercise in the Heat

    Science.gov (United States)

    Casa, Douglas J; Becker, Shannon M; Ganio, Matthew S; Brown, Christopher M; Yeargin, Susan W; Roti, Melissa W; Siegler, Jason; Blowers, Julie A; Glaviano, Neal R; Huggins, Robert A; Armstrong, Lawrence E; Maresh, Carl M

    2007-01-01

    Context: Rectal temperature is recommended by the National Athletic Trainers' Association as the criterion standard for recognizing exertional heat stroke, but other body sites commonly are used to measure temperature. Few authors have assessed the validity of the thermometers that measure body temperature at these sites in athletic settings. Objective: To assess the validity of commonly used temperature devices at various body sites during outdoor exercise in the heat. Design: Observational field study. Setting: Outdoor athletic facilities. Patients or Other Participants: Fifteen men and 10 women (age = 26.5 ± 5.3 years, height = 174.3 ± 11.1 cm, mass = 72.73 ± 15.95 kg, body fat = 16.2 ± 5.5%). Intervention(s): We simultaneously tested inexpensive and expensive devices orally and in the axillary region, along with measures of aural, gastrointestinal, forehead, temporal, and rectal temperatures. Temporal temperature was measured according to the instruction manual and a modified method observed in medical tents at local road races. We also measured forehead temperatures directly on the athletic field (other measures occurred in a covered pavilion) where solar radiation was greater. Rectal temperature was the criterion standard used to assess the validity of all other devices. Subjects' temperatures were measured before exercise, every 60 minutes during 180 minutes of exercise, and every 20 minutes for 60 minutes of postexercise recovery. Temperature devices were considered invalid if the mean bias (average difference between rectal temperature and device temperature) was greater than ±0.27°C (±0.5°F). Main Outcome Measure(s): Temperature from each device at each site and time point. Results: Mean bias for the following temperatures was greater than the allowed limit of ±0.27°C (±0.5°F): temperature obtained via expensive oral device (−1.20°C [−2.17°F]), inexpensive oral device (−1.67°C [−3.00°F]), expensive axillary device (−2.58°C [−4

  19. Characterizing hospital workers' willingness to report to duty in an influenza pandemic through threat- and efficacy-based assessment

    Directory of Open Access Journals (Sweden)

    Catlett Christina L

    2010-07-01

    Full Text Available Abstract Background Hospital-based providers' willingness to report to work during an influenza pandemic is a critical yet under-studied phenomenon. Witte's Extended Parallel Process Model (EPPM has been shown to be useful for understanding adaptive behavior of public health workers to an unknown risk, and thus offers a framework for examining scenario-specific willingness to respond among hospital staff. Methods We administered an anonymous online EPPM-based survey about attitudes/beliefs toward emergency response, to all 18,612 employees of the Johns Hopkins Hospital from January to March 2009. Surveys were completed by 3426 employees (18.4%, approximately one third of whom were health professionals. Results Demographic and professional distribution of respondents was similar to all hospital staff. Overall, more than one-in-four (28% hospital workers indicated they were not willing to respond to an influenza pandemic scenario if asked but not required to do so. Only an additional 10% were willing if required. One-third (32% of participants reported they would be unwilling to respond in the event of a more severe pandemic influenza scenario. These response rates were consistent across different departments, and were one-third lower among nurses as compared with physicians. Respondents who were hesitant to agree to work additional hours when required were 17 times less likely to respond during a pandemic if asked. Sixty percent of the workers perceived their peers as likely to report to work in such an emergency, and were ten times more likely than others to do so themselves. Hospital employees with a perception of high efficacy had 5.8 times higher declared rates of willingness to respond to an influenza pandemic. Conclusions Significant gaps exist in hospital workers' willingness to respond, and the EPPM is a useful framework to assess these gaps. Several attitudinal indicators can help to identify hospital employees unlikely to respond. The

  20. Interim report on the assessment of engineering issues for compact high-field ignition devices

    International Nuclear Information System (INIS)

    Flanagan, C.A.

    1986-04-01

    The engineering issues addressed at the workshop included the overall configuration, layout, and assembly; limiter and first-wall energy removal; magnet system structure design; fabricability; repairability; and costs. In performing the assessment, the primary features and characteristics of each concept under study were reviewed as representative of this class of ignition device. The emphasis was to understand the key engineering areas of concern for this class of device and deliberately not attempt to define an optimum design or to choose a best approach. The assessment concluded that compact ignition tokamaks, as represented by the three concepts under study, are feasible. A number of critical engineering issues were identified, and all appear to have tractable solutions. The engineering issues appear quite challenging, and to obtain increased confidence in the apparent design solutions requires completion of the next level of design detail, complemented by appropriate development programs and testing

  1. [Assessment of work environment vs. feeling of threat and aggravation of stress in job of a high risk - An attempt of organizational intervention].

    Science.gov (United States)

    Stasiła-Sieradzka, Marta; Chudzicka-Czupała, Agata; Grabowski, Damian; Dobrowolska, Małgorzata

    2018-01-01

    The main purpose of this article was to examine, whether and to what extend an assessment of work environment and feeling of threat are associated with stress at work performed in health- and life-threatening conditions. Previous studies of the determinants of occupational stress have been carried out in relation to representatives of different occupational groups that are not, however, representatives of one organization. The research was also meant to provide practical guidance for a particular employer. The study was carried out in the factory of explosives. It involved 95 randomly selected employees of the production departments. Subjective evaluation of work was performed by the examined persons in the Areas of Worklife Survey. It allows to assess the functioning of the employee in the workplace and to recognize the discrepancies between the requirements of the organization and the needs, aspirations and abilities of the examined person. Feeling of insecurity at work was defined by using the Feeling of Danger at Work Survey. The level of stress was assessed using the Perceived Stress Scale (PSS-10). The workload and feeling of danger are relevant to the stress felt by the employees. The workload is also the mediator of the relations between the sense of danger and the stress felt by the examined employees. At the level of manufacturing process management in an organization, there is a need to reduce the negative impact of physical and mental strain associated with haste and uncertainty. Med Pr 2018;69(1):45-58. This work is available in Open Access model and licensed under a CC BY-NC 3.0 PL license.

  2. School Shooting : Threat Detection and Classification in Textual Leakage

    OpenAIRE

    Khan, Ajmal

    2013-01-01

    The continual occurrence of school shooting incidents underscores the need of taking preventive measures. Inductive measures of threat assessment have proved to be a bad strategy to solve the problem and new research is focusing on deductive approaches. Deductive threat assessment approaches are gaining ground and efforts are underway to mine text for automatic detection of threats in written text. Automatic detection and classification of threats in the digital world can help the decision ma...

  3. The CBRNE Threat Needs New Dedicated Analysers

    International Nuclear Information System (INIS)

    Stienstra, S.

    2007-01-01

    Introduction: After the 9-11 attack by terrorists several governments realized their vulnerability towards creative asymmetric attacks. Due to increasing complexity of our society we create more vulnerability towards terror attacks. More chemical substances than we realize can be misused to destabilize our modern society. Recently aircraft passengers were confronted with new regulations, which limit the amount of fluid, which a passenger can bring on board with hand luggage. How far should we go limiting the allowance to bring liquids and substances on board? It indicates that we need new analytic instruments for screening the safety of luggage in all types of transport. Study Design: An inventory was made of the present demand for safe transport and its vulnerability to terror attacks. Also the safety and safety awareness in public buildings, offices and industrial complexes was assessed. Knowing the demand for a certain safety level, an inventory was made to identify analytical equipment, which can be used to check passengers and luggage on possible threats. The same can be used for protecting public areas, offices and industrial complexes. Results And Discussion: It is amazing how some governments, financially driven, underestimate the consequences of CBRNE incidences and disasters. Both threats due to release of dangerous substances just by accident and deliberate abuse of chemicals and/or biologicals by terror organizations is underestimated. Financial rationales are often the cause that the preparedness is less that technically could be possible. Still some commercial companies realize the importance of safety and preparedness towards terror attacks and take their precautions. Several detection systems are now under development and a new market of safety devices comes into existence. Conclusion: Key question is how far we would like to go with defending us with technical devices against potential terror attacks. Also the design of buildings, transport

  4. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  5. Ose evaluation of delay systems in a high threat environment

    International Nuclear Information System (INIS)

    Rich, B.L.; Cook, B.G.

    1988-01-01

    The Office of Security Evaluations (OSE) has in place an Evaluation Program to assist the Department of Energy (DOE) Headquarters and operations office managers by assessing specific elements of protection programs and informing the managers of common strengths and weaknesses of these elements. This information is provided so that sufficient and cost effective protection programs are maintained or enhanced. The subject of this paper is the evaluation of delay systems in the high-threat environment defined for sensitive DOE security interests such as special nuclear materials, nuclear weapons, and related classified devices and information

  6. A practical method for the maintainability assessment in industrial devices using indicators and specific attributes

    International Nuclear Information System (INIS)

    Moreu De Leon, Pedro; González-Prida Díaz, Vicente; Barberá Martínez, Luis; Crespo Márquez, Adolfo

    2012-01-01

    The objective of this paper is to describe a procedure to obtain maintainability indicators for industrial devices. This analysis can be helpful, among other cases, to compare systems, to achieve a better design regarding maintainability requirements, to improve this maintainability under specific industrial environment and to foresee maintainability problems due to eventual changes in a device operation conditions. This maintainability assessment can be carried out at any stage of the industrial asset life cycle. With this purpose, this work first introduces the notion of maintainability and the implementation of assessment indicators, including some important requirements to perform that. Then, a brief literature review is presented, including the definition of the main concepts, which are later used in the paper. After studying the maintenance levels and the maintainability attributes, both terms are linked, leading all this analysis to the assessment of the maintainability indicators. It follows a discussion about the information obtained through the maintainability assessment process and its computation into several maintainability indicators. The paper includes a case study, which implements the defined assessment into a practical scenario. Finally, the work concludes summarizing the more significant aspects and suggesting future researches.

  7. Illicit trafficking of nuclear and other radioactive material: The 'net' security threat

    International Nuclear Information System (INIS)

    Zaitseva, L.; Steinhausler, F.

    2006-01-01

    Illicit trafficking in nuclear and other radioactive material, which could be used for building a nuclear weapon or a radiological dispersal device, has been a subject of concern for more than a decade. A major obstacle to assessing the actual security threat due to nuclear trafficking is the inclusion in the analysis of incidents that do not represent a security threat, in the sense of being a possible pre-stage to a clandestine nuclear weapons programme or a terrorist operation involving a crude nuclear device or a radiological dispersal device. International transport of contaminated scrap metal, or discovery of lost or abandoned radioactive sources are examples of such incidents, which have little or no security relevance. This paper analyses the global data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (DSO) using special filters to discriminate between incidents that are of security relevance and those that are not. (author)

  8. Challenges in the Assessment of Medical Devices: The MedtecHTA Project.

    Science.gov (United States)

    Tarricone, Rosanna; Torbica, Aleksandra; Drummond, Michael

    2017-02-01

    Assessing medical devices (MDs) raises challenges which require us to reflect on whether current methods are adequate. Major features of devices are: (i) device-operator interaction can generate learning curve effects; (ii) incremental nature of innovation needs to be addressed by careful identification of the alternatives for comparative and incremental cost-effectiveness analysis; and (iii) broader organizational impact in terms of training and infrastructure, coupled with dynamic pricing, requires a more flexible approach to costing. The objective of the MedtecHTA project was to investigate improvements in HTA methods to allow for more comprehensive evaluation of MDs. It consisted of several work packages concerning (i) the available evidence on the currently adopted approaches for regulation and HTA of medical devices; (ii) the geographical variation in access to MDs; (iii) the development of methodological frameworks for conducting comparative effectiveness research and economic evaluation of MDs; and (iv) the organizational impact of MDs. This introductory paper summarizes the main results of the project and draws out the main overarching themes. This supplement represents a comprehensive report of all the main findings of the MedtecHTA project, and it is intended to be the main source for researchers and policy makers wanting information on the project. © 2017 The Authors. Health Economics published by John Wiley & Sons, Ltd. © 2017 The Authors. Health Economics Published by John Wiley & Sons, Ltd.

  9. Residual Isocyanates in Medical Devices and Products: A Qualitative and Quantitative Assessment

    Directory of Open Access Journals (Sweden)

    Gillian Franklin

    2016-01-01

    Full Text Available We conducted a pilot qualitative and quantitative assessment of residual isocyanates and their potential initial exposures in neonates, as little is known about their contact effect. After a neonatal intensive care unit (NICU stockroom inventory, polyurethane (PU and PU foam (PUF devices and products were qualitatively evaluated for residual isocyanates using Surface SWYPE ™ . Those containing isocyanates were quantitatively tested for methylene diphenyl diisocyanate (MDI species, using UPLC-UV-MS/MS method. Ten of 37 products and devices tested, indicated both free and bound residual surface isocyanates; PU/PUF pieces contained aromatic isocyanates; one product contained aliphatic isocyanates. Overall, quantified mean MDI concentrations were low (4,4‘-MDI = 0.52 to 140.1 pg/mg and (2,4‘-MDI = 0.01 to 4.48 pg/mg. The 4,4‘-MDI species had the highest measured concentration (280 pg/mg. Commonly used medical devices/products contain low, but measurable concentrations of residual isocyanates. Quantifying other isocyanate species and neonatal skin exposure to isocyanates from these devices and products requires further investigation.

  10. The GRADE approach for assessing new technologies as applied to apheresis devices in ulcerative colitis

    Directory of Open Access Journals (Sweden)

    Cabriada-Nuño Jose

    2010-06-01

    Full Text Available Abstract Background In the last few years, a new non-pharmacological treatment, termed apheresis, has been developed to lessen the burden of ulcerative colitis (UC. Several methods can be used to establish treatment recommendations, but over the last decade an informal collaboration group of guideline developers, methodologists, and clinicians has developed a more sensible and transparent approach known as the Grading of Recommendations, Assessment, Development and Evaluation (GRADE. GRADE has mainly been used in clinical practice guidelines and systematic reviews. The aim of the present study is to describe the use of this approach in the development of recommendations for a new health technology, and to analyse the strengths, weaknesses, opportunities, and threats found when doing so. Methods A systematic review of the use of apheresis for UC treatment was performed in June 2004 and updated in May 2008. Two related clinical questions were selected, the outcomes of interest defined, and the quality of the evidence assessed. Finally, the overall quality of each question was taken into account to formulate recommendations following the GRADE approach. To evaluate this experience, a SWOT (strengths, weaknesses, opportunities and threats analysis was performed to enable a comparison with our previous experience with the SIGN (Scottish Intercollegiate Guidelines Network method. Results Application of the GRADE approach allowed recommendations to be formulated and the method to be clarified and made more explicit and transparent. Two weak recommendations were proposed to answer to the formulated questions. Some challenges, such as the limited number of studies found for the new technology and the difficulties encountered when searching for the results for the selected outcomes, none of which are specific to GRADE, were identified. GRADE was considered to be a more time-consuming method, although it has the advantage of taking into account patient

  11. Assessing subacute mild traumatic brain injury with a portable virtual reality balance device.

    Science.gov (United States)

    Wright, W Geoffrey; McDevitt, Jane; Tierney, Ryan; Haran, F Jay; Appiah-Kubi, Kwadwo Osei; Dumont, Alex

    2017-07-01

    Balance impairment is a common sensorimotor symptom in mild traumatic brain injury (mTBI). We designed an affordable, portable virtual reality (VR)-based balance screening device (Virtual Environment TBI Screen [VETS]), which will be validated relative to the Neurocom Sensory Organization Test (SOT) to determine if it can replace commonly used postural assessments. This preliminary study examines healthy adults (n = 56) and adults with mTBI (n = 11). Participants performed six upright postural tasks on the VETS and the SOT. Analysis of variance was used to determine between-group differences. Pearson's correlations were used to establish construct validity. Known-groups approach was used to establish classification accuracy. The mTBI cohort performed significantly worse than the healthy cohort on the new device (p = 0.001). The new device has 91.0% accuracy and an ROC curve with a significant area-under-the-curve (AUC = 0.865, p virtual reality can be economically integrated into the clinical setting for easy testing of postural control in neurologically impaired populations. Tailoring postural assessments to include tasks that rely on visual and vestibular integration will increase the accuracy of detecting balance impairment following mild traumatic brain injury.

  12. Dietary assessment and self-monitoring with nutrition applications for mobile devices.

    Science.gov (United States)

    Lieffers, Jessica R L; Hanning, Rhona M

    2012-01-01

    Nutrition applications for mobile devices (e.g., personal digital assistants, smartphones) are becoming increasingly accessible and can assist with the difficult task of intake recording for dietary assessment and self-monitoring. This review is a compilation and discussion of research on this tool for dietary intake documentation in healthy populations and those trying to lose weight. The purpose is to compare this tool with conventional methods (e.g., 24-hour recall interviews, paper-based food records). Research databases were searched from January 2000 to April 2011, with the following criteria: healthy or weight loss populations, use of a mobile device nutrition application, and inclusion of at least one of three measures, which were the ability to capture dietary intake in comparison with conventional methods, dietary self-monitoring adherence, and changes in anthropometrics and/or dietary intake. Eighteen studies are discussed. Two application categories were identified: those with which users select food and portion size from databases and those with which users photograph their food. Overall, positive feedback was reported with applications. Both application types had moderate to good correlations for assessing energy and nutrient intakes in comparison with conventional methods. For self-monitoring, applications versus conventional techniques (often paper records) frequently resulted in better self-monitoring adherence, and changes in dietary intake and/or anthropometrics. Nutrition applications for mobile devices have an exciting potential for use in dietetic practice.

  13. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  14. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  15. Using the virtual reality device Oculus Rift for neuropsychological assessment of visual processing capabilities.

    Science.gov (United States)

    Foerster, Rebecca M; Poth, Christian H; Behler, Christian; Botsch, Mario; Schneider, Werner X

    2016-11-21

    Neuropsychological assessment of human visual processing capabilities strongly depends on visual testing conditions including room lighting, stimuli, and viewing-distance. This limits standardization, threatens reliability, and prevents the assessment of core visual functions such as visual processing speed. Increasingly available virtual reality devices allow to address these problems. One such device is the portable, light-weight, and easy-to-use Oculus Rift. It is head-mounted and covers the entire visual field, thereby shielding and standardizing the visual stimulation. A fundamental prerequisite to use Oculus Rift for neuropsychological assessment is sufficient test-retest reliability. Here, we compare the test-retest reliabilities of Bundesen's visual processing components (visual processing speed, threshold of conscious perception, capacity of visual working memory) as measured with Oculus Rift and a standard CRT computer screen. Our results show that Oculus Rift allows to measure the processing components as reliably as the standard CRT. This means that Oculus Rift is applicable for standardized and reliable assessment and diagnosis of elementary cognitive functions in laboratory and clinical settings. Oculus Rift thus provides the opportunity to compare visual processing components between individuals and institutions and to establish statistical norm distributions.

  16. HEALTH TECHNOLOGY ASSESSMENT OF MEDICAL DEVICES IN EUROPE: PROCESSES, PRACTICES, AND METHODS.

    Science.gov (United States)

    Fuchs, Sabine; Olberg, Britta; Panteli, Dimitra; Busse, Reinhard

    2016-01-01

    To review and compare current Health Technology Assessment (HTA) activities for medical devices (MDs) across European HTA institutions. A comprehensive approach was adopted to identify institutions involved in HTA in European countries. We systematically searched institutional Web sites and other online sources by using a structured tool to extract information on the role and link to decision making, structure, scope, process, methodological approach, and available HTA reports for each included institution. Information was obtained from eighty-four institutions, forty-seven of which were analyzed. Fifty-four methodological documents from twenty-three agencies in eighteen countries were identified. Only five agencies had separate documents for the assessment of MDs. A few agencies made separate provisions for the assessment of MDs in their general methods. The amount of publicly available HTA reports on MDs varied by device category and agency remit. Despite growing consensus on their importance and international initiatives, such as the EUnetHTA Core Model®, specific tools for the assessment of MDs are rarely developed and implemented at the national level. Separate additional signposts incorporated in existing general methods guides may be sufficient for the evaluation of MDs.

  17. Keep taking the tablets? Assessing the use of tablet devices in learning and teaching activities in the Further Education sector

    OpenAIRE

    Khristin Fabian; Donald MacLean

    2014-01-01

    This article summarises the methodology and outcomes of an interventionist/action research project to assess the benefits, and potential pitfalls, of the use of mobile devices in learning and teaching activities in a Further Education environment. A bank of 15 tablet devices were purchased and prepared for classroom use. Staff members were approached to scope potential activities and uses for the tablet devices. Three departments took part in the research activity: the Language School, Social...

  18. Filling in biodiversity threat gaps

    DEFF Research Database (Denmark)

    Joppa, L. N.; O'Connor, Brian; Visconti, Piero

    2016-01-01

    increase to 10,000 times the background rate should species threatened with extinction succumb to pressures they face (4). Reversing these trends is a focus of the Convention on Biological Diversity's 2020 Strategic Plan for Biodiversity and its 20 Aichi Targets and is explicitly incorporated...... into the United Nations' 2030 Agenda for Sustainable Development and its 17 Sustainable Development Goals (SDGs). We identify major gaps in data available for assessing global biodiversity threats and suggest mechanisms for closing them....

  19. Plutonium - how great is the terrorist threat

    International Nuclear Information System (INIS)

    Cohen, B.L.

    1977-01-01

    The terrorists' problems in stealing the plutonium and fabricating the device are measured against the likely effects of its explosion. Alternatives are discussed and it is concluded that there are many easier ways of killing a large number of people. It is considered impossible to guard absolutely against all possible terrorist threats of mass murder. (U.K.)

  20. Current state of micro-robots/devices as substitutes for screening colonoscopy: assessment based on technology readiness levels.

    Science.gov (United States)

    Tapia-Siles, Silvia C; Coleman, Stuart; Cuschieri, Alfred

    2016-02-01

    Previous reports have described several candidates, which have the potential to replace colonoscopy, but to date, there is still no device capable of fully replacing flexible colonoscopy in the management of colonic disorders and for mass adult population screening for asymptomatic colorectal cancer. NASA developed the TRL methodology to describe and define the stages of development before use and marketing of any device. The definitions of the TRLS used in the present review are those formulated by "The US Department of Defense Technology Readiness Assessment Guidance" but adapted to micro-robots for colonoscopy. All the devices included are reported in scientific literature. They were identified by a systematic search in Web of Science, PubMed and IEEE Xplore amongst other sources. Devices that clearly lack the potential for full replacement of flexible colonoscopy were excluded. The technological salient features of all the devices included for assessment are described briefly, with particular focus on device propulsion. The devices are classified according to the TRL criteria based on the reported information. An analysis is next undertaken of the characteristics and salient features of the devices included in the review: wireless/tethered devices, data storage-transmission and navigation, additional functionality, residual technology challenges and clinical and socio-economical needs. Few devices currently possess the required functionality and performance to replace the conventional colonoscopy. The requirements, including functionalities which favour the development of a micro-robot platform to replace colonoscopy, are highlighted.

  1. Functional and real-time requirements of a multisensor data fusion (MSDF) situation and threat assessment (STA) resource management (RM) system

    Science.gov (United States)

    Duquet, Jean Remi; Bergeron, Pierre; Blodgett, Dale E.; Couture, Jean; Macieszczak, Maciej; Mayrand, Michel; Chalmers, Bruce A.; Paradis, Stephane

    1998-03-01

    The Research and Development group at Lockheed Martin Canada, in collaboration with the Defence Research Establishment Valcartier, has undertaken a research project in order to capture and analyze the real-time and functional requirements of a next generation Command and Control System (CCS) for the Canadian Patrol Frigates, integrating Multi- Sensor Data Fusion (MSDF), Situation and Threat Assessment (STA) and Resource Management (RM). One important aspect of the project is to define how the use of Artificial Intelligence may optimize the performance of an integrated, real-time MSDF/STA/RM system. A closed-loop simulation environment is being developed to facilitate the evaluation of MSDF/STA/RM concepts, algorithms and architectures. This environment comprises (1) a scenario generator, (2) complex sensor, hardkill and softkill weapon models, (3) a real-time monitoring tool, (4) a distributed Knowledge-Base System (KBS) shell. The latter is being completely redesigned and implemented in-house since no commercial KBS shell could adequately satisfy all the project requirements. The closed- loop capability of the simulation environment, together with its `simulated real-time' capability, allows the interaction between the MSDF/STA/RM system and the environment targets during the execution of a scenario. This capability is essential to measure the performance of many STA and RM functionalities. Some benchmark scenarios have been selected to demonstrate quantitatively the capabilities of the selected MSDF/STA/RM algorithms. The paper describes the simulation environment and discusses the MSDF/STA/RM functionalities currently implemented and their performance as an automatic CCS.

  2. Validity and reliability of simple measurement device to assess the velocity of the barbell during squats.

    Science.gov (United States)

    Lorenzetti, Silvio; Lamparter, Thomas; Lüthy, Fabian

    2017-12-06

    The velocity of a barbell can provide important insights on the performance of athletes during strength training. The aim of this work was to assess the validity and reliably of four simple measurement devices that were compared to 3D motion capture measurements during squatting. Nine participants were assessed when performing 2 × 5 traditional squats with a weight of 70% of the 1 repetition maximum and ballistic squats with a weight of 25 kg. Simultaneously, data was recorded from three linear position transducers (T-FORCE, Tendo Power and GymAware), an accelerometer based system (Myotest) and a 3D motion capture system (Vicon) as the Gold Standard. Correlations between the simple measurement devices and 3D motion capture of the mean and the maximal velocity of the barbell, as well as the time to maximal velocity, were calculated. The correlations during traditional squats were significant and very high (r = 0.932, 0.990, p squats and was less accurate. All the linear position transducers were able to assess squat performance, particularly during traditional squats and especially in terms of mean velocity and time to maximal velocity.

  3. Assessment of a Newly Developed, Active Pneumatic-Driven, Sensorimotor Test and Training Device

    Directory of Open Access Journals (Sweden)

    Wolfram Haslinger

    2014-12-01

    Full Text Available The sensorimotor system (SMS plays an important role in sports and in every day movement. Several tools for assessment and training have been designed. Many of them are directed to specific populations, and have major shortcomings due to the training effect or safety. The aim of the present study was to design and assess a dynamic sensorimotor test and training device that can be adjusted for all levels of performance. The novel pneumatic-driven mechatronic device can guide the trainee, allow independent movements or disrupt the individual with unpredicted perturbations while standing on a platform. The test-reliability was evaluated using intraclass correlation coefficient (ICC. Subjects were required to balance their center of pressure (COP in a target circle (TITC. The time in TITC and the COP error (COPe were recorded for analysis. The results of 22 males and 14 females (23.7 ± 2.6 years showed good to excellent test–retest reliability. The newly designed Active Balance System (ABS was then compared with the Biodex Balance System SD® (BBS. The results of 15 females, 14 males (23.4 ± 1.6 years showed modest correlation in static and acceptable correlation in dynamic conditions, suggesting that ABS could be a reliable and comparable tool for dynamic balance assessments.

  4. Keep Taking the Tablets? Assessing the Use of Tablet Devices in Learning and Teaching Activities in the Further Education Sector

    Science.gov (United States)

    Fabian, Khristin; MacLean, Donald

    2014-01-01

    This article summarises the methodology and outcomes of an interventionist/action research project to assess the benefits, and potential pitfalls, of the use of mobile devices in learning and teaching activities in a Further Education environment. A bank of 15 tablet devices were purchased and prepared for classroom use. Staff members were…

  5. Using Mobile Devices and the Adobe Connect Web Conferencing Tool in the Assessment of EFL Student Teacher Performance

    Science.gov (United States)

    Bolona Lopez, Maria del Carmen; Ortiz, Margarita Elizabeth; Allen, Christopher

    2015-01-01

    This paper describes a project to use mobile devices and video conferencing technology in the assessment of student English as a Foreign Language (EFL) teacher performance on teaching practice in Ecuador. With the increasing availability of mobile devices with video recording facilities, it has become easier for trainers to capture teacher…

  6. Interim guidance risk assessment of the device assembly facility at the Nevada test site

    International Nuclear Information System (INIS)

    Altenbach, T.J.

    1996-05-01

    The risks of plutonium dispersal and/or high explosive detonation from nuclear explosive operations at the Device Assembly Facility were examined in accordance with DOE Order 5610.11 and the Interim Guidance. The assessment consisted of a qualitative task and hazards analysis, and a quantitative risk screening. Results are displayed on risk matrices for the major types of operations. Most accident scenarios were considered to have Low risk; a few scenarios have Moderate risk; and none have High risk. The highest risk scenarios (Moderate category) consist of a high explosive detonation during assembly operations in a cell, with bare conventional high explosive surrounding the pit

  7. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    Science.gov (United States)

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  8. Suitability and repeatability of a photostress recovery test device, the macular test device, macular degeneration TEST DEVICE, detector (MDD-2), for diabetes and diabetic retinopathy assessment

    LENUS (Irish Health Repository)

    Loughman, James

    2013-10-16

    Diabetic retinopathy can result in impaired photostress recovery time despite normal visual acuity and fundoscopic appearance. The Macular Degeneration Detector (MDD-2) is a novel flash photostress recovery time device. In this study, we examine the repeatability of the MDD-2 in normal and diabetic subjects.

  9. Assessing Psycho-Social Resilience in Diplomatic, Civilian & Military Personnel Serving in a High-Threat Security Environment during Counter-Insurgency and Counter-Terrorism Operations in Iraq

    Directory of Open Access Journals (Sweden)

    Anne Speckhard

    2012-08-01

    Full Text Available Currently thousands of military, diplomatic and civilian personnel are deployed under NATO, UN, and other multi-national, as well as national auspices in high-threat security environments, including active conflict zones such as Iraq and Afghanistan.  Soldiers are generally well trained and prepared psychologically to face armed conflict. Civilian contractors and diplomats, on the other hand, often are not.  Moreover in today’s high-threat security environments terrorists, insurgents and even child soldiers may be the opposing force, creating a more uncertain and anxiety provoking environment and more difficult to identify security threat. These facts have serious implications for the psycho-social resilience of diplomatic, civilian and military personnel deployed in such environments.  This article investigates psycho-social resilience in a small exploratory sample of US embassy staff, contractors and US forces serving in Iraq during 2007, a time when Improvised Explosive Devices (IEDs, roadside bombings, mortar attacks, kidnappings, murders and sniper fire were an everyday occurrence in Iraq.

  10. Comparison of two spectral domain optical coherence tomography devices for angle-closure assessment.

    Science.gov (United States)

    Quek, Desmond T; Narayanaswamy, Arun K; Tun, Tin A; Htoon, Hla M; Baskaran, Mani; Perera, Shamira A; Aung, Tin

    2012-08-03

    To compare two spectral domain optical coherence tomography (SD-OCT) devices for the identification of angle structures and the presence of angle closure. This was a prospective comparative study. Consecutive patients underwent gonioscopy and anterior segment imaging using two SD-OCT devices (iVue and Cirrus). Images were evaluated for the ability to detect angle structures such as Schwalbe's line (SL), trabecular meshwork (TM), Schlemm's canal (SC), and scleral spur (SS), and the presence of angle closure. Angle closure was defined as iris contact with the angle wall anterior to the SS on SD-OCT, and nonvisibility of the posterior TM on gonioscopy. Angle closure in an eye was defined as ≥two quadrants of closed angles. AC1 statistic was used to assess the agreement between devices. Of the 69 subjects studied (46.4% male, 84.1% Chinese, mean age 64.0 ± 10.5 years), 40 subjects (40 eyes, 58.0%) had angle closure on gonioscopy. The most identifiable structure on Cirrus SD-OCT was the SS (82.2%) and SL on iVue SD-OCT (74.5%). Angle closure was indeterminable in 14.5% and 50.7% of Cirrus and iVue scans (P gonioscopy was only fair (AC1 = 0.35 and 0.50 for Cirrus and iVue, respectively). It was more difficult to determine angle closure status with iVue compared with Cirrus SD-OCT. There was fair agreement between both devices with gonioscopy for identifying angle closure.

  11. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  12. Toxicological Threats of Plastic

    Science.gov (United States)

    Plastics pose both physical (e.g., entanglement, gastrointestinal blockage, reef destruction) and chemical threats (e.g., bioaccumulation of the chemical ingredients of plastic or toxic chemicals sorbed to plastics) to wildlife and the marine ecosystem.

  13. The magazine picture collage: its clinical use and validity as an assessment device.

    Science.gov (United States)

    Lerner, C J

    1979-08-01

    To contribute to an understanding of the magazine picture collage as a clinical assessment device, experienced psychiatric staff from various disciplines were asked to distinguish the collages of hospitalized psychiatric patients from those of paired controls, to note whatever descriptive and dynamic features about the individual that could be inferred from the collage, and to document what specific aspects of the collage were used in drawing the inferences. The raters, on the basis of the collage, were not able to distinguish the patients from the controls but were able to derive highly accurate inferences. The results were taken to indicate that, while the collage is best used as a means of assessing psychological processes as contrasted with assigning a diagnosis or predicting behavior, more rigorous research is needed to relate collage factors to personality factors.

  14. Molecular cloning of Brevundimonas diminuta for efficacy assessment of reverse osmosis devices.

    Science.gov (United States)

    Donofrio, Robert; Saha, Ratul; Bestervelt, Lori; Bagley, Susan

    2012-06-01

    Brevundimonas diminuta is the test organism specified in the United States Environmental Protection Agency's (USEPA) reverse osmosis (RO) treatment device verification protocol. As non-selective growth medium is employed, enumeration of B. diminuta may be impaired due to interference by indigenous heterotrophic bacteria. Thus the microbial removal capability of the filtration system may be incorrectly assessed. As these treatment devices are used in emergency situations, the health of the public could be compromised. The objective of this study was to develop selective approaches for enumerating viable B. diminuta in test water. Two molecular approaches were investigated: expression of a kanamycin resistance gene and expression of a fluorescent protein gene. The USEPA protocol specifies a 0.3 μm cell size, so the expression of the selective markers were assessed following growth on media designed to induce this small cell diameter. The kan(R) strain was demonstrated to be equivalent to the wild type in cell dimension and survival following exposure to the test water. The kan(R) strain showed equivalent performance to the wild type in the RO protocol indicating that it is a viable alternative surrogate. By utilizing this strain, a more accurate validation of the RO system can be achieved.

  15. Assessment of biofilm formation in device-associated clinical bacterial isolates in a tertiary level hospital

    Directory of Open Access Journals (Sweden)

    Summaiya A Mulla

    2011-01-01

    Full Text Available Background: Biofilm formation is a developmental process with intercellular signals that regulate growth. Biofilms contaminate catheters, ventilators, and medical implants; they act as a source of disease for humans, animals, and plants. Aim: In this study we have done quantitative assessment of biofilm formation in device-associated clinical bacterial isolates in response to various concentrations of glucose in tryptic soya broth and with different incubation time. Materials and Methods: The study was carried out on 100 positive bacteriological cultures of medical devices, which were inserted in hospitalized patients. The bacterial isolates were processed as per microtitre plate method with tryptic soya broth alone and with varying concentrations of glucose and were observed in response to time. Results: Majority of catheter cultures were positive. Out of the total 100 bacterial isolates tested, 88 of them were biofilm formers. Incubation period of 16-20 h was found to be optimum for biofilm development. Conclusions: Availability of nutrition in the form of glucose enhances the biofilm formation by bacteria. Biofilm formation depends on adherence of bacteria to various surfaces. Time and availability of glucose are important factors for assessment of biofilm progress.

  16. Assessment of a prototype for the Systemization of Nursing Care on a mobile device

    Directory of Open Access Journals (Sweden)

    Laura Cristhiane Mendonça Rezende

    2016-01-01

    Full Text Available Abstract Objectives: assess a prototype for use on mobile devices that permits registering data for the Systemization of Nursing Care at a Neonatal Intensive Care Unit. Method: an exploratory and descriptive study was undertaken, characterized as an applied methodological research, developed at a teaching hospital. Results: the mobile technology the nurses at the Neonatal Intensive Care Unit use was positive, although some reported they faced difficulties to manage it, while others with experience in using mobile devices did not face problems to use it. The application has the functions needed for the Systematization of Nursing Care at the unit, but changes were suggested in the interface of the screens, some data collection terms and parameters the application offers. The main contributions of the software were: agility in the development and documentation of the systemization, freedom to move, standardization of infant assessment, optimization of time to develop bureaucratic activities, possibilities to recover information and reduction of physical space the registers occupy. Conclusion: prototype software for the Systemization of Nursing Care with mobile technology permits flexibility for the nurses to register their activities, as the data can be collected at the bedside.

  17. Assessment of a prototype for the Systemization of Nursing Care on a mobile device.

    Science.gov (United States)

    Rezende, Laura Cristhiane Mendonça; Santos, Sérgio Ribeiro Dos; Medeiros, Ana Lúcia

    2016-01-01

    assess a prototype for use on mobile devices that permits registering data for the Systemization of Nursing Care at a Neonatal Intensive Care Unit. an exploratory and descriptive study was undertaken, characterized as an applied methodological research, developed at a teaching hospital. the mobile technology the nurses at the Neonatal Intensive Care Unit use was positive, although some reported they faced difficulties to manage it, while others with experience in using mobile devices did not face problems to use it. The application has the functions needed for the Systematization of Nursing Care at the unit, but changes were suggested in the interface of the screens, some data collection terms and parameters the application offers. The main contributions of the software were: agility in the development and documentation of the systemization, freedom to move, standardization of infant assessment, optimization of time to develop bureaucratic activities, possibilities to recover information and reduction of physical space the registers occupy. prototype software for the Systemization of Nursing Care with mobile technology permits flexibility for the nurses to register their activities, as the data can be collected at the bedside.

  18. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  19. Radiological threat, public and media: a psychosociological view

    Energy Technology Data Exchange (ETDEWEB)

    Arciszewski, T. [University Rene Descartes - Paris 5, 92 - Boulogne (France)

    2006-07-01

    the fear of nuclear devices. In a scientific area as nuclear, where problems are often very complex for experts themselves, the way to communicate cannot be as simple as good information. Next to that statement, we will develop some conclusions based on the work of Slovic, Kasperson and some others, within the framework of the amplification of risk. This model describes how the threats can be diffuse in a population and specifically the radiological threat. Widely experimentally assessed, it analyse how the fear can spread and affect people, independently form the real measurable risk. We will lastly ask ourselves if there is a way of handle panic for this kind of threat. We will show that the notion of panic is somehow irrelevant to such threats whereas the confidence in political and public regulation is strongly related to them. Finally, we will ask if the social psychologist could make a model of public reaction in case of nuclear threat. That question remains open until further experiments are made. (author)

  20. Radiological threat, public and media: a psychosociological view

    International Nuclear Information System (INIS)

    Arciszewski, T.

    2006-01-01

    the fear of nuclear devices. In a scientific area as nuclear, where problems are often very complex for experts themselves, the way to communicate cannot be as simple as good information. Next to that statement, we will develop some conclusions based on the work of Slovic, Kasperson and some others, within the framework of the amplification of risk. This model describes how the threats can be diffuse in a population and specifically the radiological threat. Widely experimentally assessed, it analyse how the fear can spread and affect people, independently form the real measurable risk. We will lastly ask ourselves if there is a way of handle panic for this kind of threat. We will show that the notion of panic is somehow irrelevant to such threats whereas the confidence in political and public regulation is strongly related to them. Finally, we will ask if the social psychologist could make a model of public reaction in case of nuclear threat. That question remains open until further experiments are made. (author)

  1. Assessing the Influence of Smart Mobile Devices on How Employees Work

    Science.gov (United States)

    Gorski, Adam L.

    2017-01-01

    The smart mobile device market penetration reached 50% and has been increasing an average of 39% per year in the United States. More than 70% of the smart mobile device owners use such devices for personal and work activities. The problem was the lack of management's understanding of the effect smart mobile device use has on how employees work…

  2. The development and validation of a custom built device for assessing frontal knee joint laxity.

    Science.gov (United States)

    Ismail, Shiek Abdullah; Simic, Milena; Clarke, Jillian L; Lopes, Thiago Jambo Alves; Pappas, Evangelos

    2017-12-01

    This study reports the development and validation of a quantitative technique of assessing frontal knee joint laxity through a custom built device named KLICP. The objectives of this study were to determine: (i) the intra- and inter-rater reliability and (ii) the validity of the device when compared to real time ultrasound. Twenty-five participants had their frontal knee joint laxity assessed by the KLICP, by manual varus/valgus tests and by ultrasound. Two raters independently assessed laxity manually by three repeated measurements, repeated at least 48h later. Results were validated by comparing them to the medial and lateral joint space opening measured by the ultrasound. Intraclass correlation coefficients and standard error of measurement reliability were calculated. Pearson's correlation coefficients were calculated to determine the correlation between the KLICP and the joint space. Intra-rater reliability (intra-session) for each rater was good on both sessions (0.91-0.98), intra-rater reliability (inter-sessions) was moderate to good (0.62-0.87), and inter-rater reliability (intra-session) was good (0.75-0.80). There is low agreement for intra-rater (inter-session) and for inter-rater (intra-session) reliability. The KLICP measurement has a significant positive fair to moderate correlation to the ultrasound measurement at the left (r: 0.61, p: 0.01) and right (r: 0.48, p: 0.02) knee in the valgus direction and at the left (r: 0.51, p: 0.01) and right (r: 0.39, p: 0.05) knee in the varus direction. There is low agreement between the KLICP and the RTU. Reliability and agreement was good only when measured for intra-rater, within session. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. DEFINING THE RELEVANT OUTCOME MEASURES IN MEDICAL DEVICE ASSESSMENTS: AN ANALYSIS OF THE DEFINITION PROCESS IN HEALTH TECHNOLOGY ASSESSMENT.

    Science.gov (United States)

    Jacobs, Esther; Antoine, Sunya-Lee; Prediger, Barbara; Neugebauer, Edmund; Eikermann, Michaela

    2017-01-01

    Defining relevant outcome measures for clinical trials on medical devices (MD) is complex, as there is a large variety of potentially relevant outcomes. The chosen outcomes vary widely across clinical trials making the assessment in evidence syntheses very challenging. The objective is to provide an overview on the current common procedures of health technology assessment (HTA) institutions in defining outcome measures in MD trials. In 2012-14, the Web pages of 126 institutions involved in HTA were searched for methodological manuals written in English or German that describe methods for the predefinition process of outcome measures. Additionally, the institutions were contacted by email. Relevant information was extracted. All process steps were performed independently by two reviewers. Twenty-four manuals and ten responses from the email request were included in the analysis. Overall, 88.5 percent of the institutions describe the type of outcomes that should be considered in detail and 84.6 percent agree that the main focus should be on patient relevant outcomes. Specifically related to MD, information could be obtained in 26 percent of the included manuals and email responses. Eleven percent of the institutions report a particular consideration of MD related outcomes. This detailed analysis on common procedures of HTA institutions in the context of defining relevant outcome measures for the assessment of MD shows that standardized procedures for MD from the perspective of HTA institutions are not widespread. This leads to the question if a homogenous approach should be implemented in the field of HTA on MD.

  4. [Theoretical and practical assessment of Lille general practice and pharmacy students' knowledge about use of inhaler devices for asthma control].

    Science.gov (United States)

    Veylon, P; Rochoy, M; Gautier, S; Wallaert, B; Berkhout, C

    2018-04-01

    Asthma is a potentially serious chronic respiratory disease impacting patients quality of life. Satisfactory control requires proper use of inhaled devices. This study assesses general medical residents and pharmacy students knowledge about proper use of inhaled asthma devices. We evaluated knowledge of 43 general practice students and 43 pharmacy students in Lille for three inhaler devices (metered-dose inhaler, Turbuhaler ® and Diskus ® ) during individual interviews. Students were assessed on 8 proper use criterias for each device. General practice and pharmacy students are unfamiliar with proper use of inhaler devices. However, pharmacy students get better average scores than general practice students for all devices included in this study: 6.3/8 respected criterias against 5/8 for metered-dose inhaler; 5.3/8 against 3.2/8 for Turbuhaler ® ; and 6/8 against 4.3/8 for Diskus ® . Pharmacy students more frequently perform a demonstration of proper use to patients when a device is first prescribed or when a prescription is renewed; general practice students more frequently ask patients themselves to perform a demonstration of proper use. Introducing trainings workshops for inhaler devices to pharmacy and general practice students appears appropriate in order to promote therapeutic patient education, to increase asthma control and better patients life quality. Copyright © 2018 Elsevier Masson SAS. All rights reserved.

  5. Assessment of three frequently used blood glucose monitoring devices in clinical routine.

    Science.gov (United States)

    Zueger, Thomas; Schuler, Vanessa; Stettler, Christoph; Diem, Peter; Christ, Emanuel R

    2012-07-12

    Self-monitoring of blood glucose plays an important role in the management of diabetes and has been shown to improve metabolic control. The use of blood glucose meters in clinical practice requires sufficient reliability to allow adequate treatment. Direct comparison of different blood glucose meters in clinical practice, independent of the manufactures is scarce. We, therefore, aimed to evaluate three frequently used blood glucose meters in daily clinical practice. Capillary blood glucose was measured simultaneous using the following glucose meters: Contour® (Bayer Diabetes Care, Zürich, Switzerland), Accu-Chek® aviva (Roche Diagnostics, Rotkreuz, Switzerland), Free-Style® lite (Abbott Diabetes Care, Baar, Switzerland). The reference method consisted of the HemoCue® Glucose 201+ System (HemoCue® AB, Ängelholm, Sweden) with plasma conversion. The devices were assessed by comparison of the Mean Absolute Relative Differences (MARD), the Clarke Error Grid Analysis (EGA) and the compliance with the International Organization of Standardization criteria (ISO 15197:2003). Capillary blood samples were obtained from 150 patients. MARD was 10.1 ± 0.65%, 7.0 ± 0.62% and 7.8 ± 0.48% for Contour®, Accu-Chek® and Free-Style®, respectively. EGA showed 99.3% (Contour®), 98.7% (Accu-Chek®) and 100% (Free-Style®) of all measurements in zone A and B (clinically acceptable). The ISO criteria were fulfilled by Accu-Chek® (95.3%) and Free-Style® (96%), but not by Contour® (92%). In the present study the three glucose meters provided good agreement with the reference and reliable results in daily clinical routine. Overall, the Free-Style® and Accu-Chek® device slightly outperformed the Contour® device.

  6. Establishing 'design basis threat' in Norway

    International Nuclear Information System (INIS)

    Maerli, M.B.; Naadland, E.; Reistad, O.

    2002-01-01

    Full text: INFCIRC 225 (Rev. 4) assumes that a state's physical protection system should be based on the state's evaluation of the threat, and that this should be reflected in the relevant legislation. Other factors should also be considered, including the state's emergency response capabilities and the existing and relevant measures of the state's system of accounting for and control of nuclear material. A design basis threat developed from an evaluation by the state of the threat of unauthorized removal of nuclear material and of sabotage of nuclear material and nuclear facilities is an essential element of a state's system of physical protection. The state should continuously review the threat, and evaluate the implications of any changes in that threat for the required levels and the methods of physical protection. As part of a national design basis threat assessment, this paper evaluates the risk of nuclear or radiological terrorism and sabotage in Norway. Possible scenarios are presented and plausible consequences are discussed with a view to characterize the risks. The need for more stringent regulatory requirements will be discussed, together with the (positive) impact of improved systems and procedures of physical protection on nuclear emergency planning. Special emphasis is placed on discussing the design basis threat for different scenarios in order to systemize regulatory efforts to update the current legislation, requirement for operators' contingency planning, response efforts and the need for emergency exercises. (author)

  7. Psychometric and demographic predictors of the perceived risk of terrorist threats and the willingness to pay for terrorism risk management programs.

    Science.gov (United States)

    Mumpower, Jeryl L; Shi, Liu; Stoutenborough, James W; Vedlitz, Arnold

    2013-10-01

    A 2009 national telephone survey of 924 U.S. adults assessed perceptions of terrorism and homeland security issues. Respondents rated severity of effects, level of understanding, number affected, and likelihood of four terrorist threats: poisoned water supply; explosion of a small nuclear device in a major U.S. city; an airplane attack similar to 9/11; and explosion of a bomb in a building, train, subway, or highway. Respondents rated perceived risk and willingness to pay (WTP) for dealing with each threat. Demographic, attitudinal, and party affiliation data were collected. Respondents rated bomb as highest in perceived risk but gave the highest WTP ratings to nuclear device. For both perceived risk and WTP, psychometric variables were far stronger predictors than were demographic ones. OLS regression analyses using both types of variables to predict perceived risk found only two significant demographic predictors for any threat--Democrat (a negative predictor for bomb) and white male (a significant positive predictor for airline attack). In contrast, among psychometric variables, severity, number affected, and likelihood were predictors of all four threats and level of understanding was a predictor for one. For WTP, education was a negative predictor for three threats; no other demographic variables were significant predictors for any threat. Among psychometric variables, perceived risk and number affected were positive predictors of WTP for all four threats; severity and likelihood were predictors for three; level of understanding was a significant predictor for two. © 2013 Society for Risk Analysis.

  8. Assessing the potential roles of silicon and germanium phthalocyanines in planar heterojunction organic photovoltaic devices and how pentafluoro phenoxylation can enhance π-π interactions and device performance.

    Science.gov (United States)

    Lessard, Benoît H; White, Robin T; Al-Amar, Mohammad; Plint, Trevor; Castrucci, Jeffrey S; Josey, David S; Lu, Zheng-Hong; Bender, Timothy P

    2015-03-11

    In this study, we have assessed the potential application of dichloro silicon phthalocyanine (Cl2-SiPc) and dichloro germanium phthalocyanine (Cl2-GePc) in modern planar heterojunction organic photovoltaic (PHJ OPV) devices. We have determined that Cl2-SiPc can act as an electron donating material when paired with C60 and that Cl2-SiPc or Cl2-GePc can also act as an electron acceptor material when paired with pentacene. These two materials enabled the harvesting of triplet energy resulting from the singlet fission process in pentacene. However, contributions to the generation of photocurrent were observed for Cl2-SiPc with no evidence of photocurrent contribution from Cl2-GePc. The result of our initial assessment established the potential for the application of SiPc and GePc in PHJ OPV devices. Thereafter, bis(pentafluoro phenoxy) silicon phthalocyanine (F10-SiPc) and bis(pentafluoro phenoxy) germanium phthalocyanine (F10-GePc) were synthesized and characterized. During thermal processing, it was discovered that F10-SiPc and F10-GePc underwent a reaction forming small amounts of difluoro SiPc (F2-SiPc) and difluoro GePc (F2-GePc). This undesirable reaction could be circumvented for F10-SiPc but not for F10-GePc. Using single crystal X-ray diffraction, it was determined that F10-SiPc has significantly enhanced π-π interactions compared with that of Cl2-SiPc, which had little to none. Unoptimized PHJ OPV devices based on F10-SiPc were fabricated and directly compared to those constructed from Cl2-SiPc, and in all cases, PHJ OPV devices based on F10-SiPc had significantly improved device characteristics compared to Cl2-SiPc.

  9. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  10. Health technology assessment process of a cardiovascular medical device in four different settings.

    Science.gov (United States)

    Olry de Labry Lima, Antonio; Espín Balbino, Jaime; Lemgruber, Alexandre; Caro Martínez, Araceli; García-Mochón, Leticia; Martín Ruiz, Eva; Lessa, Fernanda

    2017-10-01

    Health technology assessment (HTA) is a tool to help the decision-making process. The aim is to describe methods and processes used in the reimbursement decision making for drug-eluting stents (DES) in four different settings. DES as a technology under study was selected according to different criteria, all of them agreed by a working group. A survey of key informants was designed. DES was evaluated following well-structured HTA processes. Nonetheless, scope for improvement was observed in relation to the data considered for the final decision, the transparency and inclusiveness of the process as well as in the methods employed. An attempt to describe the HTA processes of a well-known medical device.

  11. A confirmative clinimetric analysis of the 36-item Family Assessment Device.

    Science.gov (United States)

    Timmerby, Nina; Cosci, Fiammetta; Watson, Maggie; Csillag, Claudio; Schmitt, Florence; Steck, Barbara; Bech, Per; Thastum, Mikael

    2018-02-07

    The Family Assessment Device (FAD) is a 60-item questionnaire widely used to evaluate self-reported family functioning. However, the factor structure as well as the number of items has been questioned. A shorter and more user-friendly version of the original FAD-scale, the 36-item FAD, has therefore previously been proposed, based on findings in a nonclinical population of adults. We aimed in this study to evaluate the brief 36-item version of the FAD in a clinical population. Data from a European multinational study, examining factors associated with levels of family functioning in adult cancer patients' families, were used. Both healthy and ill parents completed the 60-item version FAD. The psychometric analyses conducted were Principal Component Analysis and Mokken-analysis. A total of 564 participants were included. Based on the psychometric analysis we confirmed that the 36-item version of the FAD has robust psychometric properties and can be used in clinical populations. The present analysis confirmed that the 36-item version of the FAD (18 items assessing 'well-being' and 18 items assessing 'dysfunctional' family function) is a brief scale where the summed total score is a valid measure of the dimensions of family functioning. This shorter version of the FAD is, in accordance with the concept of 'measurement-based care', an easy to use scale that could be considered when the aim is to evaluate self-reported family functioning.

  12. Design of a robotic device for assessment and rehabilitation of hand sensory function.

    Science.gov (United States)

    Lambercy, Olivier; Robles, Alejandro Juárez; Kim, Yeongmi; Gassert, Roger

    2011-01-01

    This paper presents the design and implementation of the Robotic Sensory Trainer, a robotic interface for assessment and therapy of hand sensory function. The device can provide three types of well controlled stimuli: (i) angular displacement at the metacarpophalangeal (MCP) joint using a remote-center-of-motion double-parallelogram structure, (ii) vibration stimuli at the fingertip, proximal phalange and palm, and (iii) pressure at the fingertip, while recording position, interaction force and feedback from the user over a touch screen. These stimuli offer a novel platform to investigate sensory perception in healthy subjects and patients with sensory impairments, with the potential to assess deficits and actively train detection of specific sensory cues in a standardized manner. A preliminary study with eight healthy subjects demonstrates the feasibility of using the Robotic Sensory Trainer to assess the sensory perception threshold in MCP angular position. An average just noticeable difference (JND) in the MCP joint angle of 2.46° (14.47%) was found, which is in agreement with previous perception studies. © 2011 IEEE

  13. 77 FR 75173 - Comprehensive Assessment of the Process for the Review of Device Submissions; Request for Comments

    Science.gov (United States)

    2012-12-19

    ..., ``Independent Assessment of Review Process Management'', of the commitment letter entitled ``MDUFA Performance Goals and Procedures'' \\1\\ (MDUFA III Commitment Letter). The assessment will be conducted by an... performance commitments relating to the Medical Device User Fee Amendments of 2012 (MDUFA III), which...

  14. Reliability of a Skin Diagnostic Device in Assessing Hydration and Erythema.

    Science.gov (United States)

    Huimin, Koh; Rowledge, Alexandra M; Borzdynski, Caroline J; Miller, Charne; Frescos, Nicoletta; McKenzie, Gayle; Perry, Elizabeth; McGuiness, William

    2017-10-01

    To examine the reliability of a skin diagnostic device, the SD202 (Courage+Khazaka GmBH, Cologne, Germany), in assessing hydration and erythema of periwound skin and pressure injury-prone areas. Intrarater reliabilities from 3 cross-sectional and prospective studies are reported. Patients attending an outpatient, nurse-led wound dressing clinic (n = 16), a podiatrist-led high-risk foot clinic (n = 17), and residents (n = 38) at a single residential aged-care facility. Skin hydration and erythema levels assessed using the SD202. High internal consistency was maintained for consecutive skin hydration and erythema measures at a single point on the venous leg ulcer periwound (α > .996 and α > .970 for hydration and erythema, respectively) and for the pressure-prone areas of the sacrum (α > .916), right (α > .994) and left (α > .967) ischium, right (α > .989) and left (α > .916) trochanter, right (α > .985) and left (α > .992) calcaneus, and right (α > .991) and left (α > .990) lateral malleolus. High consistency was also found for the measures obtained at 4 different locations around the periwound for the venous leg ulcer (α > .935 and α > .870 for hydration and erythema, respectively). In diabetic foot ulcer assessment, acceptable internal consistency of hydration measures around the periwound was observed (α > .634). Internal consistency of erythema measures was variable, ranging from low to high reliability, particularly among predebridement measures. Using the protocols outlined in this study, the SD202 demonstrates high reliability for assessing skin hydration and erythema levels. It is possible that the SD202 can be used in clinical practice as an appropriate tool for skin hydration and erythema assessment.

  15. Bankrupting terrorism: the role of US anti-terrorism litigation in the prevention of terrorism and other hybrid threats: a legal assessment and outlook

    OpenAIRE

    Bachmann, Sascha

    2012-01-01

    Global terrorist networks are dependent on receiving financial support from a variety of sources, including individuals, charities and corporations. Also known as terrorist financing, the potential of terrorism finance to resemble a global threat has been recognised and also its closeness to other international crimes such as money laundering and organized crime. As a result, possible responses have to constitute co-ordinated, multi-lateral and multi faceted actions under the umbrella of a wi...

  16. An Assessment of Coherence Between Early Warning and Response Systems and Serious Cross-Border Health Threats in the European Union and Turkey.

    Science.gov (United States)

    Ekmekci, Perihan Elif

    2016-12-01

    Disease outbreaks have attracted the attention of the public health community to early warning and response systems (EWRS) for communicable diseases and other cross-border threats to health. The European Union (EU) and the World Health Organization (WHO) have published regulations in this area. Decision 1082/2013/EU brought a new approach the management of public health threats in EU member states. Decision 1082/2013/EU brought several innovations, which included establishing a Health Security Committee; preparedness and response planning; joint procurement of medical countermeasures; ad hoc monitoring for biological, chemical, and environmental threats; EWRS; and recognition of an emergency situation and interoperability between various sectors. Turkey, as an acceding country to the EU and a member of the WHO, has been improving its national public health system to meet EU legislations and WHO standards. This article first explains EWRS as defined in Decision 1082/2013/EU and Turkey's obligations to align its public health laws to the EU acquis. EWRS in Turkey are addressed, particularly their coherence with EU policies regarding preparedness and response, alert notification, and interoperability between health and other sectors. Finally, the challenges and limitations of the current Turkish system are discussed and further improvements are suggested. (Disaster Med Public Health Preparedness. 2016;10:883-892).

  17. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  18. Linking terrestrial and marine conservation planning and threats analysis.

    Science.gov (United States)

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  19. Nuclear terrorism - Threat or not?

    Science.gov (United States)

    Pomper, Miles A.; Tarini, Gabrielle

    2017-11-01

    A terrorist attack using nuclear or radiological materials is a low-probability event, but if executed, would lead to unprecedented socio-economic, material, and psychological disruption and damage. This chapter seeks to provide a sound assessment of the scope and nature of the threat by examining the different types of nuclear terrorism, each of which poses different risks, involves different barriers to success, and requires different terrorist capabilities. In addition, the chapter aims to provide an overview of the sources and nature of terrorists' motivations to employ a nuclear attack.

  20. New monitoring technology to objectively assess adherence to prescribed footwear and assistive devices during ambulatory activity.

    Science.gov (United States)

    Bus, Sicco A; Waaijman, Roelof; Nollet, Frans

    2012-11-01

    To assess the validity and feasibility of a new temperature-based adherence monitor to measure footwear use. Observational study. University medical center and participants' homes. Convenience sample of healthy subjects (n=11) and neuropathic diabetic patients at high risk for foot ulceration (n=14). In healthy subjects, the validity of the in-shoe attached adherence monitor was investigated by comparing its registrations of donning and doffing of footwear during 7 days to an accurately kept log registration. In diabetic patients, the feasibility of using the adherence monitor for 7 days in conjunction with a time-synchronized ankle-worn step activity monitor to register prescribed footwear use during walking was assessed. Furthermore, a usability questionnaire was completed. For validity, the mean time difference and 95% confidence interval (CI) between moments of donning/doffing footwear recorded with the adherence monitor and in the log were calculated. For feasibility, technical performance, usability, and the percentage of steps that the footwear was worn (adherence) were assessed. The mean time difference between the adherence monitor and log recordings was 0.4 minutes (95% CI, 0.2-0.6min). One erroneous recording and 2 incomplete recordings were obtained in diabetic patients. Three patients reported discomfort with the step activity monitor, and 4 patients would not favor repeated testing. Patients used their footwear for between 9% and 99% of their walking steps. The adherence monitor shows good validity in measuring when footwear is used or not, and is, together with instrumented monitoring of walking activity, a feasible and objective method to assess treatment adherence. This method can have wide application in clinical practice and research regarding prescribed footwear and other body-worn assistive devices. Copyright © 2012 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  1. Application of handheld devices to field research among underserved construction worker populations: a workplace health assessment pilot study

    Directory of Open Access Journals (Sweden)

    Fleming Lora E

    2011-04-01

    Full Text Available Abstract Background Novel low-cost approaches for conducting rapid health assessments and health promotion interventions among underserved worker groups are needed. Recruitment and participation of construction workers is particularly challenging due to their often transient periods of work at any one construction site, and their limited time during work to participate in such studies. In the present methodology report, we discuss the experience, advantages and disadvantages of using touch screen handheld devices for the collection of field data from a largely underserved worker population. Methods In March 2010, a workplace-centered pilot study to examine the feasibility of using a handheld personal device for the rapid health assessment of construction workers in two South Florida Construction sites was undertaken. A 45-item survey instrument, including health-related questions on tobacco exposure, workplace safety practices, musculoskeletal disorders and health symptoms, was programmed onto Apple iPod Touch® devices. Language sensitive (English and Spanish recruitment scripts, verbal consent forms, and survey questions were all preloaded onto the handheld devices. The experience (time to survey administration and capital cost of the handheld administration method was recorded and compared to approaches available in the extant literature. Results Construction workers were very receptive to the recruitment, interview and assessment processes conducted through the handheld devices. Some workers even welcomed the opportunity to complete the questionnaire themselves using the touch screen handheld device. A list of advantages and disadvantages emerged from this experience that may be useful in the rapid health assessment of underserved populations working in a variety of environmental and occupational health settings. Conclusions Handheld devices, which are relatively inexpensive, minimize survey response error, and allow for easy storage of data

  2. Application of handheld devices to field research among underserved construction worker populations: a workplace health assessment pilot study.

    Science.gov (United States)

    Caban-Martinez, Alberto J; Clarke, Tainya C; Davila, Evelyn P; Fleming, Lora E; Lee, David J

    2011-04-01

    Novel low-cost approaches for conducting rapid health assessments and health promotion interventions among underserved worker groups are needed. Recruitment and participation of construction workers is particularly challenging due to their often transient periods of work at any one construction site, and their limited time during work to participate in such studies. In the present methodology report, we discuss the experience, advantages and disadvantages of using touch screen handheld devices for the collection of field data from a largely underserved worker population. In March 2010, a workplace-centered pilot study to examine the feasibility of using a handheld personal device for the rapid health assessment of construction workers in two South Florida Construction sites was undertaken. A 45-item survey instrument, including health-related questions on tobacco exposure, workplace safety practices, musculoskeletal disorders and health symptoms, was programmed onto Apple iPod Touch® devices. Language sensitive (English and Spanish) recruitment scripts, verbal consent forms, and survey questions were all preloaded onto the handheld devices. The experience (time to survey administration and capital cost) of the handheld administration method was recorded and compared to approaches available in the extant literature. Construction workers were very receptive to the recruitment, interview and assessment processes conducted through the handheld devices. Some workers even welcomed the opportunity to complete the questionnaire themselves using the touch screen handheld device. A list of advantages and disadvantages emerged from this experience that may be useful in the rapid health assessment of underserved populations working in a variety of environmental and occupational health settings. Handheld devices, which are relatively inexpensive, minimize survey response error, and allow for easy storage of data. These technological research modalities are useful in the

  3. The threat of proliferation

    International Nuclear Information System (INIS)

    Palme, Olof.

    1986-01-01

    The paper on the threat of proliferation, is a keynote speech delivered to the Colloquium on Nuclear War, Nuclear Proliferation and their Consequences, Geneva, 1985. Topics discussed in the address include: nuclear weapons, nuclear war, terrorists, Non-Proliferation Treaty, nuclear disarmament, and leadership in world affairs. (UK)

  4. Noninvasive Dry Eye Assessment Using High-Technology Ophthalmic Examination Devices.

    Science.gov (United States)

    Yamaguchi, Masahiko; Sakane, Yuri; Kamao, Tomoyuki; Zheng, Xiaodong; Goto, Tomoko; Shiraishi, Atsushi; Ohashi, Yuichi

    2016-11-01

    Recently, the number of dry eye cases has dramatically increased. Thus, it is important that easy screening, exact diagnoses, and suitable treatments be available. We developed 3 original and noninvasive assessments for this disorder. First, a DR-1 dry eye monitor was used to determine the tear meniscus height quantitatively by capturing a tear meniscus digital image that was analyzed by Meniscus Processor software. The DR-1 meniscus height value significantly correlated with the fluorescein meniscus height (r = 0.06, Bland-Altman analysis). At a cutoff value of 0.22 mm, sensitivity of the dry eye diagnosis was 84.1% with 90.9% specificity. Second, the Tear Stability Analysis System was used to quantitatively measure tear film stability using a topographic modeling system corneal shape analysis device. Tear film stability was objectively and quantitatively evaluated every second during sustained eye openings. The Tear Stability Analysis System is currently installed in an RT-7000 autorefractometer and topographer to automate the diagnosis of dry eye. Third, the Ocular Surface Thermographer uses ophthalmic thermography for diagnosis. The decrease in ocular surface temperature in dry eyes was significantly greater than that in normal eyes (P eye opening. Decreased corneal temperature correlated significantly with the tear film breakup time (r = 0.572; P dry eye, sensitivity was 0.83 and specificity was 0.80 after 10 seconds. This article describes the details and potential of these 3 noninvasive dry eye assessment systems.

  5. End the nuclear threat

    International Nuclear Information System (INIS)

    Douglas, Michael

    2005-01-01

    's promises and commitments. Fulfilling our promises in the Nuclear Non-Proliferation Treaty, now with 189 member States, must be a primary aim. This Treaty, essential to our security, will be reviewed formally in 2005 at the UN. The International Atomic Energy Agency (IAEA) performs a vital role under the Treaty - it's the world's nuclear inspectorate to check that countries are not pursuing nuclear weapons. I've had the chance to visit the UN and IAEA at their headquarters in Vienna, Austria, and know how tough the job can be. We need to back the IAEA and make sure it stays strong in our fight against nuclear weapons. At the 2000 Review of the Treaty, the US along with all other parties to the Treaty made a pledge. Let me remind you of what was promised, and I quote: 'an unequivocal undertaking by the nuclear weapons States to accomplish the total elimination of their nuclear arsenals. leading to nuclear disarmament.' There are tens of thousands of nuclear weapons in the world, over 90% are possessed by Russia and the US. Most are many times more devastating than those used on Hiroshima. The arsenals of Russia and the US are armed, targeted and poised, waiting for three short computer signals to fire. These hair trigger devices represent the devastation of approximately 100,000 Hiroshimas and pose a horrific threat to life. The use of a nuclear weapon could take place by accident or design by States, or even terrorists. These weapons pose an unacceptable risk to the planet. We must demonstrate our unambiguous commitment to fulfill our promises. Other-wise, the prospect of more nuclear weapons States, and the construction of new nuclear weapons, will only increase human peril. The world needs a more effective non-proliferation and disarmament regime and is looking to us for leadership

  6. Advances in chemical sensing technologies for VOCs in breath for security/threat assessment, illicit drug detection, and human trafficking activity.

    Science.gov (United States)

    Giannoukos, S; Agapiou, A; Taylor, S

    2018-01-17

    On-site chemical sensing of compounds associated with security and terrorist attacks is of worldwide interest. Other related bio-monitoring topics include identification of individuals posing a threat from illicit drugs, explosive manufacturing, as well as searching for victims of human trafficking and collapsed buildings. The current status of field analytical technologies is directed towards the detection and identification of vapours and volatile organic compounds (VOCs). Some VOCs are associated with exhaled breath, where research is moving from individual breath testing (volatilome) to cell breath (microbiome) and most recently to crowd breath metabolites (exposome). In this paper, an overview of field-deployable chemical screening technologies (both stand-alone and those with portable characteristics) is given with application to early detection and monitoring of human exposome in security operations. On-site systems employed in exhaled breath analysis, i.e. mass spectrometry (MS), optical spectroscopy and chemical sensors are reviewed. Categories of VOCs of interest include (a) VOCs in human breath associated with exposure to threat compounds, and (b) VOCs characteristic of, and associated with, human body odour (e.g. breath, sweat). The latter are relevant to human trafficking scenarios. New technological approaches in miniaturised detection and screening systems are also presented (e.g. non-scanning digital light processing linear ion trap MS (DLP-LIT-MS), nanoparticles, mid-infrared photo-acoustic spectroscopy and hyphenated technologies). Finally, the outlook for rapid and precise, real-time field detection of threat traces in exhaled breath is revealed and discussed.

  7. Date Sensitive Computing Problems: Understanding the Threat

    Science.gov (United States)

    1998-08-29

    equipment on Earth.3 It can also interfere with electromagnetic signals from such devices as cell phones, radio, televison , and radar. By itself, the ...spacecraft. Debris from impacted satellites will add to the existing orbital debris problem, and could eventually cause damage to other satellites...Date Sensitive Computing Problems Understanding the Threat Aug. 17, 1998 Revised Aug. 29, 1998 Prepared by: The National Crisis Response

  8. The indoor as a scene for biological threats

    DEFF Research Database (Denmark)

    Storgaard, Kresten; Gunnarsen, Lars; Bräuner, Elvira

    2014-01-01

    The paper presents the result of involving users in developing a user-friendly device for easy and fast detection of bio-threats in indoor settings. Bio-protect is a project supported by the European Commission, with the concept of developing a fast-alert, mobile, easy-to-use device to detect and...

  9. Terrorist threats of nuclear facilities

    International Nuclear Information System (INIS)

    Jozsef Solymosi; Jozser Ronaky; Zoltan Levai; Arpad Vincze; Laszlo Foldi

    2004-01-01

    More than one year has passed since the terrible terrorist attacks against the United States. The tragic event fundamentally restructured our security policy approach and made requirements of countering terrorism a top priority of the 21st century. In one year a lot of studies were published and the majority of them analyses primarily the beginnings of terrorism then focus on the interrelations of causes and consequences of the attacks against the WTC. In most of the cases the authors can only put their questions most of which have remained unanswered to date. Meanwhile, in a short while after the attacks the secret assessments of threat levels of potential targets and areas were also prepared. One of the high priority fields is the issue of nuclear, biological, and chemical security, in short NBC-security. Here and now we focus on component N, that is the assessment techniques of nuclear security in short, without aiming at completeness. Our definite objective is to make non-expert readers understand - and present a concrete example as it is done in risk analysis - the real danger-level of nuclear facilities and especially the terrorist threat. Our objective is not to give tips to terrorists but to provide them with deterring arguments and at the same time calm worried people. In our communique we give an overview of international practice of nuclear antiterrorism and of preventive nuclear protection in Hungary. (author)

  10. Cross-cultural adaptation of the assistive technology device - Predisposition assessment (ATD PA) for use in Brazil (ATD PA Br).

    Science.gov (United States)

    Alves, Ana Cristina de Jesus; Matsukura, Thelma Simões; Scherer, Marcia J

    2017-02-01

    The purpose of this study is to conduct a cross-cultural adaptation of the Assistive Technology Device Predisposition Assessment (ATD PA) for use in Brazil. The selection of the Assistive Technology Device Predisposition Assessment (ATD PA) was determined by previous literature reviews of articles published in 2014 and 2016 in six databases with the terms "assistive device" or "assistive technology" or "self-help device" combined with "evidence-based practice" or "framework" or "measurement scale" or "model and outcome assessment". This review indicated that the conceptual model of Assistive Technology (AT) most discussed in the literature was the Matching Person and Technology (MPT) model, and this finding determined the selection of ATD PA as an assessment within the MPT portfolio of measures. The procedures for cross-cultural adaptation were as follows: Equivalence of Concept, Semantic and Operational. Five experts were asked to translate 725 items and these translations were evaluated and a high level of agreement was demonstrated. The Portuguese version, Avaliação de Tecnologia Assistiva - Predisposição ao Uso - ATD PA Br, was derived from the original version in English (ATD PA). The ATD PA Br will support professionals and people with disabilities in Brazil to better select AT devices according to the clients' needs. Implications for rehabilitation Provides a systematic way of selecting assistive technology devices for the use of individuals with disabilities according to the Brazilian reality. A systematic way of selecting the assistive technology that can help decrease the abandonment of the assistive technology use. The use of the Matching Person and Technology theorical model and of the assessment ATD PA Br is essential to guide the researches and clinical practice in Brazil.

  11. Insider threats to cybersecurity

    CSIR Research Space (South Africa)

    Lakha, D

    2017-10-01

    Full Text Available ? Acting on opportunity Taking revenge for perceived injustice Making a statement Doing competitor s bidding Seeing themselves as a future competition INSIDER THREATS | Combating it! Darshan Lakha 7 5 January 2017 General Investigations...! Darshan Lakha 11 5 January 2017 Monitor user actions Use auditing to monitor access to files Examine cached Web files Monitor Web access at the firewall Monitor incoming and outgoing e-mail messages Control what software employees can install...

  12. Flexible training under threat.

    Science.gov (United States)

    Houghton, Anita; Eaton, Jennifer

    2002-10-01

    As the number of women in medicine and the general demand for a better work-life balance rises, flexible training is an increasingly important mechanism for maintaining the medical workforce. The new pay deal, together with entrenched cultural attitudes, are potential threats. Ways forward include more substantive part-time posts, more part-time opportunities at consultant level, and using positive experiences as a way of tackling attitudes in the less accepting specialties.

  13. Remaining useful life assessment of lithium-ion batteries in implantable medical devices

    Science.gov (United States)

    Hu, Chao; Ye, Hui; Jain, Gaurav; Schmidt, Craig

    2018-01-01

    This paper presents a prognostic study on lithium-ion batteries in implantable medical devices, in which a hybrid data-driven/model-based method is employed for remaining useful life assessment. The method is developed on and evaluated against data from two sets of lithium-ion prismatic cells used in implantable applications exhibiting distinct fade performance: 1) eight cells from Medtronic, PLC whose rates of capacity fade appear to be stable and gradually decrease over a 10-year test duration; and 2) eight cells from Manufacturer X whose rates appear to be greater and show sharp increase after some period over a 1.8-year test duration. The hybrid method enables online prediction of remaining useful life for predictive maintenance/control. It consists of two modules: 1) a sparse Bayesian learning module (data-driven) for inferring capacity from charge-related features; and 2) a recursive Bayesian filtering module (model-based) for updating empirical capacity fade models and predicting remaining useful life. A generic particle filter is adopted to implement recursive Bayesian filtering for the cells from the first set, whose capacity fade behavior can be represented by a single fade model; a multiple model particle filter with fixed-lag smoothing is proposed for the cells from the second data set, whose capacity fade behavior switches between multiple fade models.

  14. Performance of Noninvasive Assessment in the Diagnosis of Right Heart Failure After Left Ventricular Assist Device.

    Science.gov (United States)

    Joly, Joanna M; El-Dabh, Ashraf; Marshell, Ramey; Chatterjee, Arka; Smith, Michelle G; Tresler, Margaret; Kirklin, James K; Acharya, Deepak; Rajapreyar, Indranee N; Tallaj, José A; Pamboukian, Salpy V

    2018-06-01

    Right heart failure (RHF) after left ventricular assist device (LVAD) is associated with poor outcomes. Interagency Registry for Mechanically Assisted Circulatory Support (INTERMACS) defines RHF as elevated right atrial pressure (RAP) plus venous congestion. The purpose of this study was to examine the diagnostic performance of the noninvasive INTERMACS criteria using RAP as the gold standard. We analyzed 108 patients with LVAD who underwent 341 right heart catheterizations (RHC) between January 1, 2006, and December 31, 2013. Physical exam, echocardiography, and laboratory data at the time of RHC were collected. Conventional two-by-two tables were used and missing data were excluded. The noninvasive INTERMACS definition of RHF is 32% sensitive (95% CI, 0.21-0.44) and 97% specific (95% CI, 0.95-0.99) for identifying elevated RAP. Clinical assessment failed to identify two-thirds of LVAD patients with RAP > 16 mm Hg. More than half of patients with elevated RAP did not have venous congestion, which may represent a physiologic opportunity to mitigate the progression of disease before end-organ damage occurs. One-quarter of patients who met the noninvasive definition of RHF did not actually have elevated RAP, potentially exposing patients to unnecessary therapies. In practice, if any component of the INTERMACS definition is present or equivocal, our data suggest RHC is warranted to establish the diagnosis.

  15. Cerebral protection devices for use during carotid artery angioplasty with stenting: a health technology assessment.

    Science.gov (United States)

    Menon, Devidas; Stafinski, Tania

    2006-01-01

    This study sought to examine the safety, efficacy, and economic implications of the use of cerebral protection devices during carotid artery angioplasty and stenting (CAS) in high-risk patients with severe carotid artery disease (CAD). A comprehensive search for peer- and non-peer-reviewed studies that compared carotid endarterectomy (CEA) or CAS without cerebral protection to CAS with cerebral protection and appeared in the English language literature between January 1990 and January 2005 was completed. Information from studies identified was extracted using a common data abstraction form and then critically appraised against published quality assessment criteria. Of the eight studies found, six provided information on technical or procedural success rates, with values ranging from 95.6 percent to 100 percent. Three of the four studies comparing groups of patients who received CAS with cerebral protection with those who received only CAS reported a non-statistically significantly higher 30-day incidence of death and stroke (major or minor) in the latter group. None of the three studies comparing CAS with cerebral protection to CEA demonstrated a statistically significant difference in the 30-day incidence of death, major stroke, or myocardial infarction between treatment groups. No economic analyses were found. In high-risk patients with severe CAD, the evidence suggests that CAS with cerebral protection may offer a safe and efficacious alternative to CEA, reducing the risk of embolic peri-procedural complications associated with CAS to acceptable levels.

  16. Design of a factorial experiment with randomization restrictions to assess medical device performance on vascular tissue.

    Science.gov (United States)

    Diestelkamp, Wiebke S; Krane, Carissa M; Pinnell, Margaret F

    2011-05-20

    Energy-based surgical scalpels are designed to efficiently transect and seal blood vessels using thermal energy to promote protein denaturation and coagulation. Assessment and design improvement of ultrasonic scalpel performance relies on both in vivo and ex vivo testing. The objective of this work was to design and implement a robust, experimental test matrix with randomization restrictions and predictive statistical power, which allowed for identification of those experimental variables that may affect the quality of the seal obtained ex vivo. The design of the experiment included three factors: temperature (two levels); the type of solution used to perfuse the artery during transection (three types); and artery type (two types) resulting in a total of twelve possible treatment combinations. Burst pressures of porcine carotid and renal arteries sealed ex vivo were assigned as the response variable. The experimental test matrix was designed and carried out as a split-plot experiment in order to assess the contributions of several variables and their interactions while accounting for randomization restrictions present in the experimental setup. The statistical software package SAS was utilized and PROC MIXED was used to account for the randomization restrictions in the split-plot design. The combination of temperature, solution, and vessel type had a statistically significant impact on seal quality. The design and implementation of a split-plot experimental test-matrix provided a mechanism for addressing the existing technical randomization restrictions of ex vivo ultrasonic scalpel performance testing, while preserving the ability to examine the potential effects of independent factors or variables. This method for generating the experimental design and the statistical analyses of the resulting data are adaptable to a wide variety of experimental problems involving large-scale tissue-based studies of medical or experimental device efficacy and performance.

  17. A Feasibility Study on Detection of Insider Threats based on Human Bio-signals

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Young A; Yim, Man-Sung [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    The insider threat means that trusted workers in an organization might carry out harmful acts from the negligent use of classified data to potentially sabotage the workplace. Surveys and studies conducted over the last decade have consistently shown the critical nature of the insider threats problem, in both government and private sectors. The shortcomings of existing systems, such as mental self-assessment and peer review, are very subjective, biased-assessments and employed infrequently. To overcome these limitations, this study investigates the feasibility of detecting and predicting an insider threat by using human biodata, from smart wearable devices. This paper showed the feasibility of predicting and detecting insider threats using EEG, GSR and ECG signals. In the section 2.1, two research hypotheses were established to identify the significant difference on EEG, GSR and ECG signals when the subject decided bad action and is the placed in deceit situation. These hypotheses were tested using two kinds of pilot experiments in the form of input (stimulus) and output (checking response of physiological signals and reaction time)

  18. Contraband and threat material detection

    International Nuclear Information System (INIS)

    Lowrey, J. D.; Dunn, W.L.

    2008-01-01

    Full text: A pressing threat in modern society is the effective use of improvised explosive devices or IED's. One of the commonly used techniques to detect explosives is radiography. A primary drawback of this method is that humans are required in order to examine the image of each target. This requires trained personnel, who are subject to fatigue if many targets are being examined in rapid succession. Other trace element techniques generally require collection of samples from or near the surface of suspect targets. The signature-based radiation scanning (SBRS) technology has been developed to counter this threat. This technology can result in automated systems, requiring minimal operator involvement, that can rapidly identify IEDs from standoff. Preliminary research indicates that explosive samples of 5-10 kg or greater hidden in various targets can be detected from standoffs of more than a meter, with high sensitivity and high specificity. Many common explosives have similar concentrations of hydrogen, carbon, nitrogen and oxygen (HCNO). As neutrons interact with HCNO materials, unique signatures are created based on the specific composition of the material. We collect signatures from the HCNO prompt and inelastically scattered gamma rays and from scattered neutrons. Two neutron detectors (one bare and one cadmium-covered) are used in order to provide some measure of the back-scattered neutron spectrum. A library of signature templates, based on signatures detected from known targets containing known explosives in various configurations, is created. Similar signatures can be collected for suspect targets. Then a template-matching technique is used to construct two figure-of-merit metrics. The values of these metrics can be used to differentiate between safe targets and IEDs. Laboratory tests have been conducted using a high purity Germanium (HPGe) detector and two europium-doped lithium-iodide neutron detectors (one bare and one covered with cadmium) are used to

  19. Novel device (AirWave) to assess endotracheal tube migration: a pilot study.

    Science.gov (United States)

    Nacheli, Gustavo Cumbo; Sharma, Manish; Wang, Xiaofeng; Gupta, Amit; Guzman, Jorge A; Tonelli, Adriano R

    2013-08-01

    Little is known about endotracheal tube (ETT) migration during routine care among critically ill patients. AirWave is a novel device that uses sonar waves to measure ETT migration and obstructions in real time. The aim of the present study is to assess the accuracy of the AirWave to evaluate ETT migration. In addition, we determined the degree of variation in ETT position and tested whether more pronounced migration occurs in specific clinical scenarios. After institutional review board approval, we included mechanically ventilated patients from February 2012 to May 2012. A chest radiography (CXR) was obtained at baseline and 24 hours when clinically indicated. The ETT distance at the lips was recorded at baseline and every 4 hours. The AirWave system continuously recorded ETT position changes from baseline, and luminal obstructions. A total of 42 patients (age: 61 [SD ±13] years, men: 52%) were recruited. A total of 19 patients had measurements of ETT migration at 24 hours by the 3 methodologies used in this study. The mean (SD) of the ETT migration at 24 hours was +0.04 (1.2), -0.42 (0.7) and +0.34 (1.81) cm when measured by portable CXR, ETT distance at the teeth and AirWave device, respectively. Bland-Altman analysis of tube migration at 24 hours comparing the AirWave with CXR readings showed a bias of 0.1 cm with 95% limit of agreement of -3.8 and +4.3 cm. Comparison of tube migration at 24 hours determined by AirWave with ETT distance at the lips revealed a bias of -0.4 with 95% limit of agreement -3.7 to +3 cm, similar to the values observed between CXR and ETT distance at the lips (bias of -0.3 cm, 95% limit of agreement of -3.4 to +2.8 cm). Factors associated with ETT migration at 24 hours were ETT size and initial measurement from ETT tip to carina by portable CXR. AirWave detected in eight patients some degree of ETT obstruction (30% ± 9.6%) that resolved with prompt ETT catheter suction. The AirWave may provide useful information regarding ETT

  20. Stereotype Threat Lowers Older Adults' Self-Reported Hearing Abilities.

    Science.gov (United States)

    Barber, Sarah J; Lee, Soohyoung Rain

    2015-01-01

    Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults' subjective assessments of their own abilities or to the impact of stereotype threat in noncognitive domains. Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adults' subjective hearing abilities. To test this, 115 adults (mean age 50.03 years, range 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40s and early 50s were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50s and 60s rated their hearing as being subjectively worse when under stereotype threat. The current study provides a clear demonstration that stereotype threat negatively impacts older adults' subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype threat-free testing environment and also include assessments of stereotype threat within their studies. © 2015 S. Karger AG, Basel.

  1. Stereotype threat lowers older adults’ self-reported hearing abilities

    Science.gov (United States)

    Barber, Sarah J.; Lee, Soohyoung Rain

    2016-01-01

    Background Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults’ subjective assessments of their own abilities or to the impact of stereotype threat in non-cognitive domains. Objective Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adult's subjective hearing abilities. Methods To test this, 115 adults (M age = 50.02, range = 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. Results The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40's and early 50's were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50's and 60's rated their hearing as being subjectively worse when under stereotype threat. Conclusion The current study provides a clear demonstration that stereotype threat negatively impacts older adults’ subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype-threat free testing environment and also include assessments of stereotype threat within their studies. PMID:26461273

  2. A Randomized Trial of Pocket-Echocardiography Integrated Mobile Health Device Assessments in Modern Structural Heart Disease Clinics.

    Science.gov (United States)

    Bhavnani, Sanjeev P; Sola, Srikanth; Adams, David; Venkateshvaran, Ashwin; Dash, P K; Sengupta, Partho P

    2018-04-01

    This study sought to determine whether mobile health (mHealth) device assessments used as clinical decision support tools at the point-of-care can reduce the time to treatment and improve long-term outcomes among patients with rheumatic and structural heart diseases (SHD). Newly developed smartphone-connected mHealth devices represent promising methods to diagnose common diseases in resource-limited areas; however, the impact of technology-based care on long-term outcomes has not been rigorously evaluated. A total of 253 patients with SHD were randomized to an initial diagnostic assessment with wireless devices in mHealth clinics (n = 139) or to standard-care (n = 114) in India. mHealth clinics were equipped with point-of-care devices including pocket-echocardiography, smartphone-connected-electrocardiogram blood pressure and oxygen measurements, activity monitoring, and portable brain natriuretic peptide laboratory testing. All individuals underwent comprehensive transthoracic echocardiography to assess the severity of SHD. The primary endpoint was the time to referral for therapy with percutaneous valvuloplasty or surgical valve replacement. Secondary endpoints included the probability of a cardiovascular hospitalization and/or death over 1 year. An initial mHealth assessment was associated with a shorter time to referral for valvuloplasty and/or valve replacement (83 ± 79 days vs. 180 ± 101 days; p Mobile Health Device Assessments in Modern Structural Heart Disease Clinics; NCT02881398). Copyright © 2018 American College of Cardiology Foundation. Published by Elsevier Inc. All rights reserved.

  3. The interRAI Acute Care instrument incorporated in an eHealth system for standardized and web-based geriatric assessment: strengths, weaknesses, opportunities and threats in the acute hospital setting

    Science.gov (United States)

    2013-01-01

    Background The interRAI Acute Care instrument is a multidimensional geriatric assessment system intended to determine a hospitalized older persons’ medical, psychosocial and functional capacity and needs. Its objective is to develop an overall plan for treatment and long-term follow-up based on a common set of standardized items that can be used in various care settings. A Belgian web-based software system (BelRAI-software) was developed to enable clinicians to interpret the output and to communicate the patients’ data across wards and care organizations. The purpose of the study is to evaluate the (dis)advantages of the implementation of the interRAI Acute Care instrument as a comprehensive geriatric assessment instrument in an acute hospital context. Methods In a cross-sectional multicenter study on four geriatric wards in three acute hospitals, trained clinical staff (nurses, occupational therapists, social workers, and geriatricians) assessed 410 inpatients in routine clinical practice. The BelRAI-system was evaluated by focus groups, observations, and questionnaires. The Strengths, Weaknesses, Opportunities and Threats were mapped (SWOT-analysis) and validated by the participants. Results The primary strengths of the BelRAI-system were a structured overview of the patients’ condition early after admission and the promotion of multidisciplinary assessment. Our study was a first attempt to transfer standardized data between home care organizations, nursing homes and hospitals and a way to centralize medical, allied health professionals and nursing data. With the BelRAI-software, privacy of data is guaranteed. Weaknesses are the time-consuming character of the process and the overlap with other assessment instruments or (electronic) registration forms. There is room for improving the user-friendliness and the efficiency of the software, which needs hospital-specific adaptations. Opportunities are a timely and systematic problem detection and continuity of

  4. 24 CFR 9.131 - Direct threat.

    Science.gov (United States)

    2010-04-01

    ... health or safety of others. (b) “Direct threat” means a significant risk to the health or safety of... provision of auxiliary aids or services. (c) In determining whether an individual poses a direct threat to the health or safety of others, the agency must make an individualized assessment, based on reasonable...

  5. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  6. Assessing the accommodation response after near visual tasks using different handheld electronic devices

    Directory of Open Access Journals (Sweden)

    Aikaterini I. Moulakaki

    Full Text Available ABSTRACT Purpose: To assess the accommodation response after short reading periods using a tablet and a smartphone as well as determine potential differences in the accommodation response at various stimulus vergences using a Hartmann- Shack aberrometer. Methods: Eighteen healthy subjects with astigmatism of less than 1 D, corrected visual acuity of 20/20 or better, and normal findings in an ophthalmic examination were enrolled. Accommodation responses were obtained under three different conditions: accommodation system of the eye relaxed and visually stressed with a tablet and an smartphone for 10 min, at a distance of 0.25 m from the subject's eyes. Three measurements of accommodation response were monocularly acquired at stimulus vergences ranging from 0 to 4 D (1-D step. Results: No statistically significant differences were found in the accommodation responses among the conditions. A moderate but gradually increasing root mean square, coma-like aberration was found for every condition. Conversely, the spherical aberration decreased as stimulus vergences increased. These outcomes were identified in comparison to the one-to-one ideal accommodation response, implying that a certain lag value was present in all stimulus vergences different from 0 D. Conclusions: The results support the hypothesis that the difference between the ideal and real accommodation responses is mainly attributed to parameters associated with the accommodation process, such as the near visual acuity, depth of focus, pupil diameter, and wavefront aberrations. The wavefront aberrations were dependent on the 3-mm pupil size selected in this study. The accommoda tion response was not dependent on the electronic device employed in each condition, and it was mainly associated with young age and level of amplitude of accommodation of the subjects.

  7. The threat from without

    Directory of Open Access Journals (Sweden)

    Lassi Saressalo

    1987-01-01

    Full Text Available Of greatest importance in ethnic folklore are the recognised and unrecognised elements that are used when founding identity on tradition. For the aim of ethnic identification is to note and know the cultural features that connect me with people like me and separate me from people who are not like me. Every group and each of its members thus needs an opponent, a contact partner in order to identify itself. What about the Lapps? The ethnocentric values of ethnic folklore provide a model for this generalising comparison. 'They' are a potential danger, are unknown, strange, a threat from beyond the fells. They are sufficiently common for the group's ethnic feeling. It is here that we find tradition, folk tales, describing the community's traditional enemies, describing the threat from without, engendering preconceived ideas, conflicts and even war. The Lapps have never had an empire, they have never conquered others' territory, they have never engaged in systematic warfare against other peoples. For this reason Lapp tradition lacks an offensive ethnic folklore proper with emphasis on aggression, power, violence, heroism and an acceptance of the ideology of subordinating others. On the contrary,Lapp folklore is familiar with a tradition in which strangers are always threatening the Lapps' existence, plundering their territories, burning and destroying. The Lapp has always had to fight against alien powers, to give in or to outwit the great and powerful enemy. In the Lapp tradition the staalo represents an outside threat that cannot be directly concretised. If foes are regarded as concrete enemies that may be defeated in physical combat or that can be made to look ridiculous, a staalo is more mythical, more supranormal, more vague. One basic feature of the staalo tradition is that it only appears as one party to a conflict. The stories about the Lapp who succeeds in driving away a staalo threatening the community, to outwit the stupid giant or to kill

  8. Threats to international science

    Science.gov (United States)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  9. Assessing symmetry using the mirror stand device with manual and software-assisted methods in postoperative zygomatic fracture patients

    Science.gov (United States)

    Syarif, A. N.; Bangun, K.

    2017-08-01

    Zygomatic fractures are among the most common fractures to the facial skeleton. However, because no standard and reliable method of evaluation is available to assess postoperative patients, we often rely on photographs and subjective assessments. A portable mirror stand device (MiRS), which is a new method for the standardization of photography, was developed in our institution. Used with image analysis software, this device provides a new method for evaluating outcomes after the open reduction and internal fixation of zygomatic fractures. The portable mirror stand device was set up in our outpatient clinic at the Cleft Craniofacial Center at Cipto Mangunkusumo Hospital. Photographs of 11 postoperative patients were taken using the device, and they were analyzed both manually and using image analysis software (ImageJ 1.46) for symmetry. The two methods were then compared to assess the correlation and agreement of the results. The measurements taken using the manual method and the software-assisted method did not differ significantly, which indicated the good agreement between the two methods. The results of the symmetry achieved atour center were similar to other centers in the Asian region (ΔZy = 3.4±1.5 mm, ΔBc = 2.6±1.6 mm, ΔCh = 2.3±2.4 mm) compared with (ΔZy = 3.2±1.7 mm, ΔBc = 2.6±1.6 mm, ΔCh = 2.3±2.5 mm). The treatment of zygomatic fracture a tour center achieved good results. The portable mirror stand device assisted the image analysis software (ImageJ 1.46), which could be beneficial in assessing symmetry in postoperative zygomatic fracture patients.

  10. A Maturity Grid Assessment Tool for Environmentally Conscious Design in the Medical Device Industry

    DEFF Research Database (Denmark)

    Moultrie, James; Sutcliffe, Laura Francesca Rose; Maier, Anja

    2016-01-01

    . This intervention tool provides designers and product marketers with insights on how to improve the design of their medical devices and specifically allows consideration of the complex trade-offs between decisions that influence different life-cycle stages. Through the tool, actionable insight is created......The medical device industry is growing increasingly concerned about environmental impact of products. Whilst there are many tools aiming to support environmentally conscious design, they are typically complex to use, demand substantial data collection and are not tailored to the specific needs...... of the medical device sector. This paper reports on the development of a Maturity Grid to address this gap. This novel design tool was developed iteratively through application in five case studies. The tool captures principles of eco-design for medical devices in a simple form, designed to be used by a team...

  11. Radiological assessment of placement of the hysteroscopically inserted Essure permanent birth control device.

    Science.gov (United States)

    Lorente Ramos, R M; Azpeitia Armán, J; Aparicio Rodríguez-Miñón, P; Salazar Arquero, F J; Albillos Merino, J C

    2015-01-01

    Essure is a permanent birth control device that is inserted through the cervix by hysteroscopy. The device is placed in the fallopian tubes, where it causes occlusion by stimulating fibrosis. Patients can be followed up with plain-film X-rays, hysterosalpingography, and ultrasonography, although the devices can also be identified incidentally on CT and MRI. The follow-up of Essure is based on checking the criteria for appropriate positioning and correct functioning (tubal occlusion) and on diagnosing complications. The most common complications are perforation, migration (toward the uterine or peritoneal cavity), and occlusion failure. In hysterosalpingography, vascular intravasation is the most common cause of diagnostic error. Radiologists need to know how to recognize the device on different imaging techniques, how to check that it is correctly placed and functioning, and how to diagnose complications. Copyright © 2014 SERAM. Published by Elsevier España, S.L.U. All rights reserved.

  12. The Role of Device Diagnostic Algorithms in the Assessment and Management of Patients with Systolic Heart Failure: A Review

    Directory of Open Access Journals (Sweden)

    Andrew C. T. Ha

    2011-01-01

    Full Text Available Hospitalization due to heart failure (HF exacerbation represents a major burden in health care and portends a poor long-term prognosis for patients. As a result, there is considerable interest to develop novel tools and strategies to better detect onset of volume overload, as HF hospitalizations may be reduced if appropriate interventions can be promptly delivered. One such innovation is the use of device-based diagnostic parameters in HF patients with implantable cardioverter defibrillators (ICD and/or cardiac resynchronization therapy (CRT devices. These diagnostic algorithms can effectively monitor and detect changes in patients' HF status, as well as predict one's risk of HF hospitalization. This paper will review the role of these device diagnostics parameters in the assessment and management of HF patients in ambulatory settings. In addition, the integration of these novel algorithms in existing HF disease management models will be discussed.

  13. Kidnapping and abduction minimizing the threat and lessons in survival

    CERN Document Server

    Heard, Brian John

    2014-01-01

    Terrorist groups and organized crime cartels pose an increasing threat of kidnapping throughout many regions in the word. At the same time, international travel has become more commonplace for both business and leisure purposes. Kidnapping and Abduction: Minimizing the Threat and Lessons in Survival provides a practical guide on the precautions travelers can take to avoid being kidnapped or derail a kidnapping attempt in progress. In the event this cannot be avoided, the book supplies advice on how to ensure survival during captivity. Readers will learn: The basic elements of kidnapping and abduction The motivations and mechanisms of kidnappers The hotspots where kidnapping/hostage taking is prevalent Vehicles best suited for avoidance of kidnap threat and proposals for up-armoring an existing vehicle How to recognize immediate threats and precautions to be taken in assessing threat level The types of weapons most favored by kidnappers and their threat level Available bullet-resistant materials and their use ...

  14. Science framework for the conservation and restoration strategy of DOI secretarial order 3336: Utilizing resilience and resistance concepts to assess threats to sagebrush ecosystems and greater sage-grouse, prioritize conservation and restoration actions, and inform management strategies

    Science.gov (United States)

    Chambers, Jeanne C.; Campbell, Steve; Carlson, John; Beck, Jeffrey L.; Clause, Karen J.; Dinkins, Jonathan B.; Doherty, Kevin E.; Espinosa, Shawn; Griffin, Kathleen A.; Christiansen, Thomas J.; Crist, Michele R.; Hanser, Steven E.; Havlina, Douglas W.; Henke, Kenneth F.; Hennig, Jacob D.; Kurth, Laurie L.; Maestas, Jeremy D.; Mayer, Kenneth E.; Manning, Mary E.; Mealor, Brian A.; McCarthy, Clinton; Pellant, Mike; Prentice, Karen L.; Perea, Marco A.; Pyke, David A.; Wiechman , Lief A.; Wuenschel, Amarina

    2016-01-01

    The Science Framework for the Conservation and Restoration Strategy of the Department of the Interior, Secretarial Order 3336 (SO 3336), Rangeland Fire Prevention, Management and Restoration, provides a strategic, multiscale approach for prioritizing areas for management and determining effective management strategies across the sagebrush biome. The emphasis of this version is on sagebrush ecosystems and greater sage-grouse. The Science Framework uses a six step process in which sagebrush ecosystem resilience to disturbance and resistance to nonnative, invasive annual grasses is linked to species habitat information based on the distribution and abundance of focal species. The predominant ecosystem and anthropogenic threats are assessed, and a habitat matrix is developed that helps decision makers evaluate risks and determine appropriate management strategies at regional and local scales. Areas are prioritized for management action using a geospatial approach that overlays resilience and resistance, species habitat information, and predominant threats. Decision tools are discussed for determining the suitability of priority areas for management and the most appropriate management actions at regional to local scales. The Science Framework and geospatial crosscut are intended to complement the mitigation strategies associated with the Greater Sage-Grouse Land Use Plan amendments for the Department of the Interior Bureaus, such as the Bureau of Land Management, and the U.S. Forest Service.

  15. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  16. Hospital-based health technology assessment in France: A focus on medical devices.

    Science.gov (United States)

    Martelli, Nicolas; Puc, Cyril; Szwarcensztein, Karine; Beuscart, Régis; Coulonjou, Hélène; Degrassat-Théas, Albane; Dutot, Camille; Epis de Fleurian, Anne-Aurélie; Favrel-Feuillade, Florence; Hounliasso, Iliona; Lechat, Philippe; Luigi, Emmanuel; Mairot, Laurent; Nguyen, Thao; Piazza, Laurent; Roussel, Christophe; Vienney, Cécile

    2017-02-01

    Hospital-based health technology assessment (HTA) guides decisions as to whether new healthcare products should be made available within hospital structures. Its extension to medical devices (MDs) makes it possible to analyse several relevant aspects of these healthcare products in addition to their clinical value, and such evaluations are of interest to national health authorities, other healthcare establishments and industry. The aim of this work was to formulate several recommendations for a blueprint for hospital-based HTA for MDs in France. Five themes based on the work of the European Adopting hospital-based HTA in the EU (AdHopHTA) project were defined. Each member of the roundtable was then allocated a documentation task based on their experience of the theme concerned, and a literature review was carried out. An inventory of hospital-based HTA was performed and six recommendations aiming to strengthen and improve this approach were put forward: (1) encouragement of the spread of the hospital-based HTA culture and participation in communications and the promotion of this approach to hospital decision-makers; (2) adaptation of hospital-based HTA to the needs of decision-makers, taking into account the financial timetable and strategic objectives of the healthcare establishment; (3) harmonisation of the dossiers requested from industry between healthcare establishments, based on a common core; (4) promotion of the sharing of hospital-based HTA data under certain conditions, with data dissociable from the HTA report and the use of a validated methodology for the literature review; (5) creation of a composite indicator reflecting data production effort and the sharing of HTA activities, to be taken into account in the distribution of funds allocated for teaching, research and innovation missions considered of general interest; (6) the transmission of information directly from local to national level by pioneering centres. This work highlights the major issues

  17. A novel device for grasping assessment during functional tasks: preliminary results

    Directory of Open Access Journals (Sweden)

    Ana Carolinne Portela Rocha

    2016-02-01

    Full Text Available This paper presents a methodology and first results obtained in a study with a novel device that allows the analysis of grasping quality. Such a device is able to acquire motion information of upper limbs allowing kinetic of manipulation analysis as well. A pilot experiment was carried out with six groups of typically developing children aged between 5 and 10 years old, with 7-8 children in each one. The device, designed to emulate a glass, has an optical system composed by one digital camera and a special convex mirror that together allow image acquisition of grasping hand posture when it is grasped and manipulated. It also carries an Inertial Measurement Unit (IMU that captures motion data as acceleration, orientation, and angular velocities. The novel instrumented object is used in our approach to evaluate functional tasks performance in quantitative terms. During tests each child was invited to grasp the cylindrical part of the device that was placed on the top of a table, simulating the task of drinking a glass of water. In the sequence the child was oriented to transport the device back to the starting position and release it. The task was repeated 3 times for each child. A grasping hand posture evaluation is presented as an example to evaluate grasping quality. Additionally, motion patterns obtained with the triasl performed with the different groups are presented and discussed. This device is attractive due to its portable characteristics, the small size and its ability to evaluate grasping form. The results may be also useful to analyze the evolution of the rehabilitation process through reach-to-grasping movement and the grasping images analysis.

  18. Threats, protests greet conference.

    Science.gov (United States)

    Struck, D

    1994-09-04

    In preparation for the 1994 International Conference on Population and Development, Egypt has deployed 14,000 police to protect participants from threatened violence. The Vatican has joined forces with Muslim fundamentalists to condemn the conference as a vehicle for imposing Western ideals, particularly abortion, on Third world countries. In addition, the opposition is raising the specter of a descent of homosexuals onto Cairo and Muslim fundamentalists have threatened to murder Western representatives. A suit filed by Islamic lawyers, aimed at stopping the conference, failed. Sudan and Saudi Arabia plan to boycott the conference, and it remains uncertain whether Libya will be represented. Conference organizers have not been deterred by the threats and note that the controversy has drawn public attention to the central issues under debate.

  19. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  20. TBI Assessment of Readiness Using a Gait Evaluation Test (TARGET): Development of a Portable mTBI Screening Device

    Science.gov (United States)

    2016-05-01

    determine the validity and reliability of an Android device-based mTBI (mild traumatic brain injury) screening test app for assessing motor function. The...individuals and those with clinically confirmed mTBI in both a civilian and military population. 15. SUBJECT TERMS- 16. SECURITY CLASSIFICATION OF: 17...8 5. Changes/ Problems 9 6. Products 11 7. Participants & Other Collaborating Organizations 14 8. Special Reporting Requirements 16 9. Appendices

  1. Assessment study of devices from the generation of electricity from stored hydrogen

    International Nuclear Information System (INIS)

    Ackerman, J.P.; Barghusen, J.J.; Link, L.E.

    1975-12-01

    A study was performed to evaluate alternative methods for the generation of electricity from stored hydrogen. The generation systems considered were low-temperature and high-temperature fuel cells, gas turbines and steam turbines. These systems were evaluated in terms of present-day technology and future (1995) technology. Of primary interest were the costs and efficiencies of the devices, the versatility of the devices toward various types of gaseous feeds, and the likelihood of commercial development. On the basis of these evaluations, recommendations were made describing the areas of technology which should be developed

  2. Mobile Workforce, Mobile Technology, Mobile Threats

    International Nuclear Information System (INIS)

    Garcia, J.

    2015-01-01

    Mobile technologies' introduction into the world of safeguards business processes such as inspection creates tremendous opportunity for novel approaches and could result in a number of improvements to such processes. Mobile applications are certainly the wave of the future. The success of the application ecosystems has shown that users want full fidelity, highly-usable, simple purpose applications with simple installation, quick responses and, of course, access to network resources at all times. But the counterpart to opportunity is risk, and the widespread adoption of mobile technologies requires a deep understanding of the threats and vulnerabilities inherent in mobile technologies. Modern mobile devices can be characterized as small computers. As such, the threats against computing infrastructure apply to mobile devices. Meanwhile, the attributes of mobile technology that make it such an obvious benefit over traditional computing platforms all have elements of risk: pervasive, always-on networking; diverse ecosystems; lack of centralized control; constantly shifting technological foundations; intense competition among competitors in the marketplace; the scale of the installation base (from millions to billions); and many more. This paper will explore the diverse and massive environment of mobile, the number of attackers and vast opportunities for compromise. The paper will explain how mobile devices prove valuable targets to both advanced and persistent attackers as well as less-skilled casual hackers. Organized crime, national intelligence agencies, corporate espionage are all part of the landscape. (author)

  3. Relationships Among Attention Networks and Physiological Responding to Threat

    Science.gov (United States)

    Sarapas, Casey; Weinberg, Anna; Langenecker, Scott A.

    2016-01-01

    Although researchers have long hypothesized a relationship between attention and anxiety, theoretical and empirical accounts of this relationship have conflicted. We attempted to resolve these conflicts by examining relationships of attentional abilities with responding to predictable and unpredictable threat, related but distinct motivational process implicated in a number of anxiety disorders. Eighty-one individuals completed a behavioral task assessing efficiency of three components of attention – alerting, orienting, and executive control (Attention Network Test - Revised). We also assessed startle responding during anticipation of both predictable, imminent threat (of mild electric shock) and unpredictable contextual threat. Faster alerting and slower disengaging from non-emotional attention cues were related to heightened responding to unpredictable threat, whereas poorer executive control of attention was related to heightened responding to predictable threat. This double dissociation helps to integrate models of attention and anxiety and may be informative for treatment development. PMID:27816781

  4. 75 FR 5335 - Workshop on Pediatric Neurological and Neurocognitive Assessments for Cardiovascular Devices...

    Science.gov (United States)

    2010-02-02

    ..., 2010, from 8 a.m. to 5 p.m. Participants are encouraged to arrive early to ensure time for parking and... about lodging, and other relevant information will be posted, as it becomes available, on the Internet... on the Internet at http://www.fda.gov/MedicalDevices/NewsEvents/WorkshopsConferences/default.htm...

  5. Utilization of YouTube as a Tool to Assess Patient Perception Regarding Implanted Cardiac Devices.

    Science.gov (United States)

    Hayes, Kevin; Mainali, Prajeena; Deshmukh, Abhishek; Pant, Sadip; Badheka, Apurva O; Paydak, Hakan

    2014-07-01

    The outreach of YouTube may have a dramatic role in the widespread dissemination of knowledge on implantable cardioverter devices (ICD). This study was designed to review and analyze the information available on YouTube pertaining to implantable cardiac devices such as implantable cardioverter defibrillators (ICDs) and pacemakers. YouTube was queried for the terms "ICD", "Implantable Cardioverter Defibrillator", and "Pacemaker". The videos were reviewed and categorized as according to content; number of views and "likes" or "dislikes" was recorded by two separate observers. Of the 55 videos reviewed, 18 of the videos were categorized as patient education, 12 were advertisements, 8 were intraoperative videos documenting the device implantation procedures, 7 of the videos were produced to document personal patient experiences, and 4 were categorized as documentation of a public event. 3 were intended to educate health care workers. The remaining 3 were intended to raise public awareness about sudden cardiac death. The videos portraying intraoperative procedures generated the most "likes" or "dislikes" per view. While YouTube provides a logical platform for delivery of health information, the information on this platform is not regulated. Initiative by reputed authorities and posting accurate information in such platform can be a great aid in public education regarding device therapy.

  6. Early assessment of medical devices in development for company decision making : An exploration of best practices

    NARCIS (Netherlands)

    Markiewicz, Katarzyna; Van Til, Janine; IJzerman, Maarten

    2017-01-01

    To improve successful development and clinical use of medical technologies, it is suggested that manufacturers should start collecting evidence on devices effectiveness and eficiency early in their development. The aim of this study was to explore whether and how Dutch manufacturers perform an early

  7. High-Throughput Computational Assessment of Previously Synthesized Semiconductors for Photovoltaic and Photoelectrochemical Devices

    DEFF Research Database (Denmark)

    Kuhar, Korina; Pandey, Mohnish; Thygesen, Kristian Sommer

    2018-01-01

    Using computational screening we identify materials with potential use as light absorbers in photovoltaic or photoelectrochemical devices. The screening focuses on compounds of up to three different chemical elements which are abundant and nontoxic. A prescreening is carried out based on informat...

  8. Characterization of Vertical Impact Device Acceleration Pulses Using Parametric Assessment: Phase II Accelerated Free-Fall

    Science.gov (United States)

    2016-04-30

    support contractor , Infoscitex, conducted a series of tests to identify the performance capabilities of the Vertical Impact Device (VID). The VID is a...C. Table 3. AFD Evaluation with Red IMPAC Programmer: Data Summary Showing Means and Standard Deviations Test Cell Drop Ht . (in) Mean Peak

  9. 76 FR 16350 - Medical Devices; Ovarian Adnexal Mass Assessment Score Test System; Labeling; Black Box Restrictions

    Science.gov (United States)

    2011-03-23

    ... inflation) in any one year.'' The current threshold after adjustment for inflation is $135 million, using the most current (2009) Implicit Price Deflator for the Gross Domestic Product. FDA does not expect... proposes to amend 21 CFR part 866 as follows. PART 866--IMMUNOLOGY AND MICROBIOLOGY DEVICES 1. The...

  10. Threats to Computer Systems

    Science.gov (United States)

    1973-03-01

    unmarked building behind a branch bank in Garden Grove near Disneyland . Identilogic door control devices are used, but they find the use of card keys too... granting , c. More than one can grant authority, d. Individual users can authorize others, e. Other 2.1.9 Security levels present. (Circle letters

  11. Portable Ultraviolet Light Surface-Disinfecting Devices for Prevention of Hospital-Acquired Infections: A Health Technology Assessment

    Science.gov (United States)

    Nikitovic-Jokic, Milica; Kabali, Conrad; Li, Chunmei; Higgins, Caroline

    2018-01-01

    Background Hospital-acquired infections (HAIs) are infections that patients contract while in the hospital that were neither present nor developing at the time of admission. In Canada an estimated 10% of adults with short-term hospitalization have HAIs. According to 2003 Canadian data, between 4% and 6% of these patients die from these infections. The most common HAIs in Ontario are caused by Clostridium difficile. The standard method of reducing and preventing these infections is decontamination of patient rooms through manual cleaning and disinfection. Several portable no-touch ultraviolet (UV) light systems have been proposed to supplement current hospital cleaning and disinfecting practices. Methods We searched for studies published from inception of UV disinfection technology to January 23, 2017. We compared portable UV surface-disinfecting devices used together with standard hospital room cleaning and disinfecting versus standard hospital cleaning and disinfecting alone. The primary outcome was HAI from C. difficile. Other outcomes were combined HAIs, colonization (i.e., carrying an infectious agent without exhibiting disease symptoms), and the HAI-associated mortality rate. We used Grading of Recommendations Assessment, Development, and Evaluation (GRADE) to rate the quality of evidence of included studies. We also performed a 5-year budget impact analysis from the hospital's perspective. This assessment was limited to portable devices and did not examine wall mounted devices, which are used in some hospitals. Results The database search for the clinical review yielded 10 peer-reviewed publications that met eligibility criteria. Three studies focused on mercury UV-C–based technology, seven on pulsed xenon UV technology. Findings were either inconsistent or produced very low-quality evidence using the GRADE rating system. The intervention was effective in reducing the rate of the composite outcome of HAIs (combined) and colonization (but quality of evidence

  12. Performance characteristics of a novel blood bag in-line closure device and subsequent product quality assessment

    Science.gov (United States)

    Serrano, Katherine; Levin, Elena; Culibrk, Brankica; Weiss, Sandra; Scammell, Ken; Boecker, Wolfgang F; Devine, Dana V

    2010-01-01

    BACKGROUND In high-volume processing environments, manual breakage of in-line closures can result in repetitive strain injury (RSI). Furthermore, these closures may be incorrectly opened causing shear-induced hemolysis. To overcome the variability of in-line closure use and minimize RSI, Fresenius Kabi developed a new in-line closure, the CompoFlow, with mechanical openers. STUDY DESIGN AND METHODS The consistency of the performance of the CompoFlow closure device was assessed, as was its effect on component quality. A total of 188 RBC units using CompoFlow blood bag systems and 43 using the standard bag systems were produced using the buffy coat manufacturing method. Twenty-six CompoFlow platelet (PLT) concentrates and 10 control concentrates were prepared from pools of four buffy coats. RBCs were assessed on Days 1, 21, and 42 for cellular variables and hemolysis. PLTs were assessed on Days 1, 3, and 7 for morphology, CD62P expression, glucose, lactate, and pH. A total of 308 closures were excised after processing and the apertures were measured using digital image analysis. RESULTS The use of the CompoFlow device significantly improved the mean extraction time with 0.46 ± 0.11 sec/mL for the CompoFlow units and 0.52 ± 0.13 sec/mL for the control units. The CompoFlow closures showed a highly reproducible aperture after opening (coefficient of variation, 15%) and the device always remained opened. PLT and RBC products showed acceptable storage variables with no differences between CompoFlow and control. CONCLUSIONS The CompoFlow closure devices improved the level of process control and processing time of blood component production with no negative effects on product quality. PMID:20529007

  13. A cross-sectional study to assess inhalation device handling and patient satisfaction in COPD

    Directory of Open Access Journals (Sweden)

    Miravitlles M

    2016-02-01

    Full Text Available Marc Miravitlles,1 Jéssica Montero-Caballero,2 Frank Richard,2 Salud Santos,3 Juan Luis Garcia-Rivero,4 Francisco Ortega,5 Xavier Ribera61Pneumology Department, Hospital Universitari Vall d’Hebron, Ciber de Enfermedades Respiratorias (CIBERES, Barcelona, Spain; 2Boehringer Ingelheim Pharma GmbH & Co KG, Ingelheim, Germany; 3Pulmonology Department, Hospital Universitari de Bellvitge, IDIBELL, Universitat de Barcelona, Ciber de Enfermedades Respiratorias (CIBERES, Barcelona, Spain; 4Pneumology Department, Hospital de Laredo, Cantabria, Spain; 5Pneumology Department, Hospital Virgen del Rocío, Sevilla, Spain; 6Boehringer Ingelheim Pharma GmbH & Co KG, Barcelona, Spain Abstract: Delivery of inhaled medications via an inhaler device underpins the effectiveness of treatment for patients with chronic obstructive pulmonary disease (COPD. Correct inhaler technique among patients is also a predictor of achieving treatment compliance and adherence. Reporting of patient satisfaction with inhalers is therefore gaining increasing attention and is now recognized as an important patient-reported outcome in clinical trials involving patients with COPD or asthma. In this cross-sectional study, we use the validated Patient Satisfaction and Preference Questionnaire (PASAPQ to assess the handling and satisfaction for Respimat® Soft Mist™ Inhaler (SMI compared with the Breezhaler® dry powder inhaler (DPI among patients with COPD in Spain. Patients were already assigned to therapy with either SPIRIVA® (tiotropium Respimat® or with Hirobriz®/Onbrez®/Oslif® (indacaterol Breezhaler® for at least 3 but not more than 6 months before completing the PASAPQ at a single visit to the study site. The primary endpoint of the trial was the mean total PASAPQ score. Secondary endpoints were the performance score domain of the PASAPQ, the convenience score domain of the PASAPQ, and the overall satisfaction score of the PASAPQ. For the primary endpoint, the mean PASAPQ

  14. Power Cycling Test Method for Reliability Assessment of Power Device Modules in Respect to Temperature Stress

    DEFF Research Database (Denmark)

    Choi, Ui-Min; Blaabjerg, Frede; Jørgensen, Søren

    2018-01-01

    Power cycling test is one of the important tasks to investigate the reliability performance of power device modules in respect to temperature stress. From this, it is able to predict the lifetime of a component in power converters. In this paper, representative power cycling test circuits......, measurement circuits of wear-out failure indicators as well as measurement strategies for different power cycling test circuits are discussed in order to provide the current state of knowledge of this topic by organizing and evaluating current literature. In the first section of this paper, the structure...... of a conventional power device module and its related wear-out failure mechanisms with degradation indicators are discussed. Then, representative power cycling test circuits are introduced. Furthermore, on-state collector-emitter voltage (VCE ON) and forward voltage (VF) measurement circuits for wear-out condition...

  15. NIMROD simulations and physics assessment of possible designs for a next generation Steady Inductive Helicity Injection HIT device

    Science.gov (United States)

    Penna, James; Morgan, Kyle; Grubb, Isaac; Jarboe, Thomas

    2017-10-01

    The Helicity Injected Torus - Steady Inductive 3 (HIT-SI3) experiment forms and maintains spheromaks via Steady Inductive Helicity Injection (SIHI) using discrete injectors that inject magnetic helicity via a non-axisymmetric perturbation and drive toroidally symmetric current. Newer designs for larger SIHI-driven spheromaks incorporate a set of injectors connected to a single external manifold to allow more freedom for the toroidal structure of the applied perturbation. Simulations have been carried out using the NIMROD code to assess the effectiveness of various imposed mode structures and injector schema in driving current via Imposed Dynamo Current Drive (IDCD). The results are presented here for varying flux conserver shapes on a device approximately 1.5 times larger than the current HIT-SI3 experiment. The imposed mode structures and spectra of simulated spheromaks are analyzed in order to examine magnetic structure and stability and determine an optimal regime for IDCD sustainment in a large device. The development of scaling laws for manifold operation is also presented, and simulation results are analyzed and assessed as part of the development path for the large scale device.

  16. Personal medical electronic devices and walk-through metal detector security systems: assessing electromagnetic interference effects.

    Science.gov (United States)

    Guag, Joshua; Addissie, Bisrat; Witters, Donald

    2017-03-20

    There have been concerns that Electromagnetic security systems such as walk-through metal detectors (WTMDs) can potentially cause electromagnetic interference (EMI) in certain active medical devices including implantable cardiac pacemakers and implantable neurostimulators. Incidents of EMI between WTMDs and active medical devices also known as personal medical electronic devices (PMED) continue to be reported. This paper reports on emission measurements of sample WTMDs and testing of 20 PMEDs in a WTMD simulation system. Magnetic fields from sample WTMD systems were characterized for emissions and exposure of certain PMEDs. A WTMD simulator system designed and evaluated by FDA in previous studies was used to mimic the PMED exposures to the waveform from sample WTMDs. The simulation system allows for controlled PMED exposure enabling careful study with adjustable magnetic field strengths and exposure duration, and provides flexibility for PMED exposure at elevated levels in order to study EMI effects on the PMED. The PMED samples consisted of six implantable cardiac pacemakers, six implantable cardioverter defibrillators (ICD), five implantable neurostimulators, and three insulin pumps. Each PMED was exposed in the simulator to the sample WTMD waveforms using methods based on appropriate consensus test standards for each of the device type. Testing the sample PMEDs using the WTMD simulator revealed EMI effects on two implantable pacemakers and one implantable neurostimulator for exposure field strength comparable to actual WTMD field strength. The observed effects were transient and the PMEDs returned to pre-exposure operation within a few seconds after removal from the simulated WTMD exposure fields. No EMI was observed for the sample ICDs or insulin pumps. The findings are consistent with earlier studies where certain sample PMEDs exhibited EMI effects. Clinical implications were not addressed in this study. Additional studies are needed to evaluate potential PMED

  17. Characterization of Vertical Impact Device Acceleration Pulses Using Parametric Assessment: Phase IV Dual Impact Pulses

    Science.gov (United States)

    2017-01-04

    support contractor , Infoscitex, conducted a series of tests to identify the performance capabilities of the Vertical Impact Device (VID) and the Warrior...Impact Response: Test Series 1 Data Summary for Carriage Test Cell VID Carriage Programmer Drop Ht . (in) Mean Velocity Change (m/s) Mean...Table 6. VID Impact Response: Test Series 1 Data Summary for Seat Pan Test Cell VID Carriage Programmer Drop Ht . (in) Mean Velocity

  18. An Assessment of Mobile Device Internet Services on Customer Perceived Value and Loyalty

    OpenAIRE

    Tai, Wern Shin Valerie

    2009-01-01

    The objective of this study is to explore the effect of a complementary mobile and internet service offering around mobile devices on customer perceived value and consumer loyalty, as well as investigate if perceived value can predict consumer loyalty. Gender differences were also explored in both perceived value and loyalty. The study built on a review of existing literature in order to establish the constructs explored and develop the research structure and focus. A consumer study w...

  19. Cold Environment Assessment Tool (CEAT) User’s Guide for Apple Mobile Devices

    Science.gov (United States)

    2015-06-01

    discussion of mobile Android device relevance to the military see, “Android Smartphone Relevance to Military Weather Applications”.5 2. CEAT Inputs To...eating, resting, sleeping , clerical work • Low: Walking, marching without rucksack, drill and ceremony • High: Digging foxhole, running, marching...2013. 5. Sauter, D. Android smartphone relevance to military weather applications. White Sands Missile Range (NM): Army Research Laboratory (US

  20. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  1. Bio-threat microparticle simulants

    Energy Technology Data Exchange (ETDEWEB)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  2. Stroke treatment academic industry roundtable: research priorities in the assessment of neurothrombectomy devices.

    Science.gov (United States)

    Saver, Jeffrey L; Jovin, Tudor G; Smith, Wade S; Albers, Gregory W; Baron, Jean-Claude; Boltze, Johannes; Broderick, Joseph P; Davis, Lisa A; Demchuk, Andrew M; DeSena, Salvatore; Fiehler, Jens; Gorelick, Philip B; Hacke, Werner; Holt, Bill; Jahan, Reza; Jing, Hui; Khatri, Pooja; Kidwell, Chelsea S; Lees, Kennedy R; Lev, Michael H; Liebeskind, David S; Luby, Marie; Lyden, Patrick; Megerian, J Thomas; Mocco, J; Muir, Keith W; Rowley, Howard A; Ruedy, Richard M; Savitz, Sean I; Sipelis, Vitas J; Shimp, Samuel K; Wechsler, Lawrence R; Wintermark, Max; Wu, Ona; Yavagal, Dileep R; Yoo, Albert J

    2013-12-01

    The goal of the Stroke Treatment Academic Industry Roundtable (STAIR) meetings is to advance the development of stroke therapies. At STAIR VIII, consensus recommendations were developed for clinical trial strategies to demonstrate the benefit of endovascular reperfusion therapies for acute ischemic stroke. Prospects for success with forthcoming endovascular trials are robust, because new neurothrombectomy devices have superior reperfusion efficacy compared with earlier-generation interventions. Specific recommendations are provided for trial designs in 3 populations: (1) patients undergoing intravenous fibrinolysis, (2) early patients ineligible for or having failed intravenous fibrinolysis, and (3) wake-up and other late-presenting patients. Among intravenous fibrinolysis-eligible patients, key principles are that CT or MRI confirmation of target arterial occlusions should precede randomization; endovascular intervention should be pursued with the greatest rapidity possible; and combined intravenous and neurothrombectomy therapy is more promising than neurothrombectomy alone. Among patients ineligible for or having failed intravenous fibrinolysis, scientific equipoise was affirmed and the need to randomize all eligible patients emphasized. Vessel imaging to confirm occlusion is mandatory, and infarct core and penumbral imaging is desirable in later time windows. Additional STAIR VIII recommendations include approaches to test multiple devices in a single trial, utility weighting of disability end points, and adaptive designs to delineate time and tissue injury thresholds at which benefits from intervention no longer accrue. Endovascular research priorities in acute ischemic stroke are to perform trials testing new, highly effective neuro thrombectomy devices rapidly deployed in patients confirmed to have target vessel occlusions.

  3. Identifying key conservation threats to Alpine birds through expert knowledge

    Science.gov (United States)

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  4. Identifying key conservation threats to Alpine birds through expert knowledge

    Directory of Open Access Journals (Sweden)

    Dan E. Chamberlain

    2016-02-01

    Full Text Available Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds. For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community.

  5. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  6. Accuracy of Transthoracic Echocardiography in Assessing Retro-aortic Rim prior to Device Closure of Atrial Septal Defects.

    Science.gov (United States)

    O'Byrne, Michael L; Glatz, Andrew C; Goldberg, David J; Shinohara, Russell; Dori, Yoav; Rome, Jonathan J; Gillespie, Matthew J

    2015-01-01

    Deficient retro-aortic rim has been identified as a risk factor for device erosion following trans-catheter closure of atrial septal defects (ASDs). Transthoracic echocardiography (TTE) is the primary screening method for subjects for possible device closure of ASD, but its reliability in measuring retro-aortic rim size has not been assessed previously. A single-institution cross-sectional analysis of children and adults referred for trans-catheter device closure of single ostium secundum ASD from January 1, 2005 to April 1, 2012 with reviewable TTE and trans-esophageal echocardiogram images was performed. Inter-rater reliability of measurements was tested in a 24% sample. Accuracy of TTE measurement of retro-aortic rim was assessed using a Bland-Altman plot with trans-esophageal echocardiogram measurement as the gold standard. Test characteristics of TTE detection of deficient retro-aortic rim were calculated. Risk factors for misclassification of deficient retro-aortic rim were assessed using receiver operator characteristic curves. Risk factors for measurement error were assessed through multivariate linear regression. In total, 163 subjects of median age 5 years (range: 0.3-46 years) were included. Trans-thoracic echocardiography had 90% sensitivity, 84% specificity, 90% positive predictive value, and 83% negative predictive value to detect deficient retro-aortic rim. Bland-Altman plot demonstrated no fixed bias (P = .23), but errors in measurement increased on average as the aortic rim increased in size (P affect receiver operator characteristic curve area under the curve, nor were any patient-level risk factors independently associated with increased measurement error on TTE. TTE is a sensitive and specific screening test for deficient retro-aortic rim across a range of patient ages and sizes. © 2014 Wiley Periodicals, Inc.

  7. Exploring a New Security Framework for Remote Patient Monitoring Devices

    Directory of Open Access Journals (Sweden)

    Brian Ondiege

    2017-02-01

    Full Text Available Security has been an issue of contention in healthcare. The lack of familiarity and poor implementation of security in healthcare leave the patients’ data vulnerable to attackers. The main issue is assessing how we can provide security in an RPM infrastructure. The findings in literature show there is little empirical evidence on proper implementation of security. Therefore, there is an urgent need in addressing cybersecurity issues in medical devices. Through the review of relevant literature in remote patient monitoring and use of a Microsoft threat modelling tool, we identify and explore current vulnerabilities and threats in IEEE 11073 standard devices to propose a new security framework for remote patient monitoring devices. Additionally, current RPM devices have a limitation on the number of people who can share a single device, therefore, we propose the use of NFC for identification in Remote Patient Monitoring (RPM devices for multi-user environments where we have multiple people sharing a single device to reduce errors associated with incorrect user identification. We finally show how several techniques have been used to build the proposed framework.

  8. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    Science.gov (United States)

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  9. Mobbing, threats to employees

    Directory of Open Access Journals (Sweden)

    Tatjana Vene

    2012-02-01

    Full Text Available RQ: Is there a connection among perception of hostile and unethical communication, timely removal of causes and employee satisfaction?Purpose: Perceived mobbing in the organization, analysing causes and timely removal of them without any effect; achieve an environment of satisfied employees. The purpose is to study the relationship amongthe categories: perceiving mobbing, removing the effects, employee satisfaction.Methods: Qualitative research approach, method of interview by using the seven steps principles.Results: The findings clearly state that being aware of the negative factors and psychological abuse in organizations was present. The interview participants perceived different negative behaviours especially by the female population and from the side of superiors. In some organizations perceived negative factors are insults,insinuations, low wages, inadequate working day, competition, lobbying, and verbal threats. All negative factors lead to serious implications for employees, in which the organization can lose its reputation, productivity is reduced, costs of employment can increase with more sick leaves and in extreme cases, the results can be soserious that the organization can end in bankruptcy or liquidation.Organization: The result of the study warns management to acceptcertain actions and remediate the situation in organizations. The employer and managers must do everything to protect their subordinates from violence and potential offenders.Society: The research study warns on the seriousness of mobbing among employees, the aim is to bring the issue to individuals and society. The victim usually needs help (health costs, losses in the pension system, increased unemployment, and lower productivity of the whole society.Originality: In view of the sensitivity of the issues, the author concludes that the existing research studies are based especially on closed questions (questionnaires; however, interviews create mutual trust between

  10. Digital Threat and Vulnerability Management: The SVIDT Method

    Directory of Open Access Journals (Sweden)

    Roland W. Scholz

    2017-04-01

    Full Text Available The Digital Revolution is inducing major threats to many types of human systems. We present the SVIDT method (a Strengths, Vulnerability, and Intervention Assessment related to Digital Threats for managing the vulnerabilities of human systems with respect to digital threats and changes. The method first performs a multilevel system–actor analysis for assessing vulnerabilities and strengths with respect to digital threats. Then, the method identifies threat scenarios that may become real. By constructing, evaluating, and launching interventions against all identified digital threats and their critical negative outcomes, the resilience of a specific human system can be improved. The evaluation of interventions is done when strengthening the adaptive capacity, i.e., a system’s capability to cope with negative outcomes that may take place in the future. The SVIDT method is embedded in the framework of coupled human–environment systems, the theory of risk and vulnerability assessment, types of adaptation (assimilation vs. accommodation, and a comprehensive sustainability evaluation. The SVIDT method is exemplarily applied to an enterprise (i.e., a Swiss casino for which online gaming has become an essential digital-business field. The discussion reflects on the specifics of digital threats and discusses both the potential benefits and limitations of the SVIDT method.

  11. 78 FR 75571 - Independent Assessment of the Process for the Review of Device Submissions; High Priority...

    Science.gov (United States)

    2013-12-12

    ... section V, ``Independent Assessment of Review Process Management'', of the commitment letter entitled ``MDUFA Performance Goals and Procedures'' \\1\\ (MDUFA III Commitment Letter). The assessment is being... certain performance goals outlined in the MDUFA III Commitment Letter.\\4\\ \\4\\ www.fda.gov/downloads...

  12. [Assessing the conformity of medical devices for in vitro diagnosis: international and domestic experience].

    Science.gov (United States)

    Manzeniuk, I N; Shipulin, G A; Men'shikov, V V

    2009-10-01

    The conformity of medical articles was assessed for in vitro diagnosis is the most importance procedure for their entering the market. This paper describes the basic elements of assessment of the conformity of these articles, analyzes worldwide experience, shows differences in the Russian regulatory system in the circulation of medical articles for in vitro diagnosis, and gives recommendations for its improvement.

  13. A Computational Procedure for Assessing the Dynamic Performance of Diffusion-Controlled Transdermal Delivery Devices

    Directory of Open Access Journals (Sweden)

    Laurent Simon

    2011-08-01

    Full Text Available Abstract: The dynamic performances of two different controlled-release systems were analyzed. In a reservoir-type drug-delivery patch, the transdermal flux is influenced by the properties of the membrane. A constant thermodynamic drug activity is preserved in the donor compartment. Monolithic matrices are among the most inexpensive systems used to direct drug delivery. In these structures, the active pharmaceutical ingredients are encapsulated within a polymeric material. Despite the popularity of these two devices, to tailor the properties of the polymer and additives to specific transient behaviors can be challenging and time-consuming. The heuristic approaches often considered to select the vehicle formulation provide limited insight into key permeation mechanisms making it difficult to predict the device performance. In this contribution, a method to calculate the flux response time in a system consisting of a reservoir and a polymeric membrane was proposed and confirmed. Nearly 8.60 h passed before the metoprolol delivery rate reached ninety-eight percent of its final value. An expression was derived for the time it took to transport the active pharmaceutical ingredient out of the polymer. Ninety-eight percent of alpha-tocopherol acetate was released in 461.4 h following application to the skin. The effective time constant can be computed to help develop optimum design strategies.

  14. Active implantable medical device EMI assessment for wireless power transfer operating in LF and HF bands.

    Science.gov (United States)

    Hikage, Takashi; Nojima, Toshio; Fujimoto, Hiroshi

    2016-06-21

    The electromagnetic interference (EMI) imposed on active implantable medical devices by wireless power transfer systems (WPTSs) is discussed based upon results of in vitro experiments. The purpose of this study is to present comprehensive EMI test results gathered from implantable-cardiac pacemakers and implantable cardioverter defibrillators exposed to the electromagnetic field generated by several WPTSs operating in low-frequency (70 kHz-460 kHz) and high-frequency (6.78 MHz) bands. The constructed in vitro experimental test system based upon an Irnich's flat torso phantom was applied. EMI test experiments are conducted on 14 types of WPTSs including Qi-compliant system and EV-charging WPT system mounted on current production EVs. In addition, a numerical simulation model for active implantable medical device (AIMD) EMI estimation based on the experimental test system is newly proposed. The experimental results demonstrate the risk of WPTSs emitting intermittent signal to affect the correct behavior of AIMDs when operating at very short distances. The proposed numerical simulation model is applicable to obtain basically the EMI characteristics of various types of WPTSs.

  15. Assessment of image quality in x-ray radiography imaging using a small plasma focus device

    Science.gov (United States)

    Kanani, A.; Shirani, B.; Jabbari, I.; Mokhtari, J.

    2014-08-01

    This paper offers a comprehensive investigation of image quality parameters for a small plasma focus as a pulsed hard x-ray source for radiography applications. A set of images were captured from some metal objects and electronic circuits using a low energy plasma focus at different voltages of capacitor bank and different pressures of argon gas. The x-ray source focal spot of this device was obtained to be about 0.6 mm using the penumbra imaging method. The image quality was studied by several parameters such as image contrast, line spread function (LSF) and modulation transfer function (MTF). Results showed that the contrast changes by variations in gas pressure. The best contrast was obtained at a pressure of 0.5 mbar and 3.75 kJ stored energy. The results of x-ray dose from the device showed that about 0.6 mGy is sufficient to obtain acceptable images on the film. The measurements of LSF and MTF parameters were carried out by means of a thin stainless steel wire 0.8 mm in diameter and the cut-off frequency was obtained to be about 1.5 cycles/mm.

  16. Assessment and testing of industrial devices robustness against cyber security attacks

    International Nuclear Information System (INIS)

    Tilaro, F.; Copy, B.

    2012-01-01

    CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. CERN - in collaboration with Siemens - has designed and implemented a dedicated working environment, the Test-bench for Robustness of Industrial Equipment. Such tests attempt to detect possible anomalies by exploiting corrupt communication channels and manipulating the normal behavior of the communication protocols, in the same way as a cyber attacker would proceed. Our approach consists of analyzing protocol implementations by injecting malformed PDUs (Protocol Data Unit) to corrupt the normal behaviour of the system. As a PDU typically has many fields, the number of possible syntactically faulty PDUs grows exponentially with the number of fields. In this document, we proposed a strategy to explore this huge test domain using a hybrid approach of fuzzing and syntax techniques, specifically developed to evaluate industrial device communication robustness. So far, not all the tests can be integrated into automatic tools, human analysis and management is necessary to discover and investigate specific possible failures

  17. Vessel noise pollution as a human threat to fish: assessment of the stress response in gilthead sea bream (Sparus aurata, Linnaeus 1758).

    Science.gov (United States)

    Celi, Monica; Filiciotto, Francesco; Maricchiolo, Giulia; Genovese, Lucrezia; Quinci, Enza Maria; Maccarrone, Vincenzo; Mazzola, Salvatore; Vazzana, Mirella; Buscaino, Giuseppa

    2016-04-01

    This study examined the effects of boat noise pollution on the stress indices of gilthead sea bream (Sparus aurata, Linnaeus 1758). To assess the stress response in these fish, biometric values and plasma parameters such as ACTH, cortisol, glucose, lactate, haematocrit, Hsp70, total protein, cholesterol, triglycerides and osmolarity were analysed. After acclimatization of the animals, the experiment was carried out in a tank fitted with underwater speakers where the fish were exposed to sound treatments (in duplicate) consisting of: 10 days of no sound (control treatment; the animals were only exposed to the experimental tank's background noise) and 10 days of noise derived from original recordings of motor boats, including recreational boats, hydrofoil, fishing boat and ferry boat (vessel noise treatment). The exposure to noise produced significant variations in almost all the plasma parameters assessed, but no differences were observed in weights and fork lengths. A PERMANOVA analysis highlighted significantly increased values (p < 0.05) of ACTH, cortisol, glucose, lactate, haematocrit, Hsp70, cholesterol, triglycerides and osmolarity in the fish exposed to vessel noise for 10 days. This study clearly highlights that anthropogenic noise negatively affects fish, and they are valuable targets for detailed investigations into the effects of this global pollutant. Finally, these experimental studies could represent part of the science that is able to improve the quality of the policies related to management plans for maritime spaces (Marine Strategy Framework Directive 56/2008 CE) that are aimed at stemming this pollutant phenomenon.

  18. Ferroelectric devices

    CERN Document Server

    Uchino, Kenji

    2009-01-01

    Updating its bestselling predecessor, Ferroelectric Devices, Second Edition assesses the last decade of developments-and setbacks-in the commercialization of ferroelectricity. Field pioneer and esteemed author Uchino provides insight into why this relatively nascent and interdisciplinary process has failed so far without a systematic accumulation of fundamental knowledge regarding materials and device development.Filling the informational void, this collection of information reviews state-of-the-art research and development trends reflecting nano and optical technologies, environmental regulat

  19. Reliability assessment platform for the power semiconductor devices - Study case on 3-phase grid-connected inverter application

    DEFF Research Database (Denmark)

    Vernica, Ionut; Ma, Ke; Blaabjerg, Frede

    2017-01-01

    provide valuable reliability information based on given mission profiles and system specification is first developed and its main concept is presented. In order to facilitate the test and access to the loading and lifetime information of the power devices, a novel mission profile based stress emulator...... experimental setup is proposed and designed. The link between the stress emulator setup and the reliability tool software is highlighted. Finally, the reliability assessment platform is demonstrated on a 3-phase grid-connected inverter application study case....

  20. Keep taking the tablets? Assessing the use of tablet devices in learning and teaching activities in the Further Education sector

    Directory of Open Access Journals (Sweden)

    Khristin Fabian

    2014-02-01

    Full Text Available This article summarises the methodology and outcomes of an interventionist/action research project to assess the benefits, and potential pitfalls, of the use of mobile devices in learning and teaching activities in a Further Education environment. A bank of 15 tablet devices were purchased and prepared for classroom use. Staff members were approached to scope potential activities and uses for the tablet devices. Three departments took part in the research activity: the Language School, Social and Vocational Studies and the Hairdressing department. Use of the tablets was varied in nature and included: use of multimedia tools, use of apps, creation and use of a bespoke app, multimedia manipulation and sharing, and creation of an online e-portfolio. Staff and student feedback was gathered during and after the project, and project authors were present during classroom activities for observation and recording purposes. Overall feedback was very positive, but there were issues with tablet use and administration. One of the major issues was the onerous nature of the security setup, and app administration.

  1. Determination of Wave Model Uncertainties used for Probabilistic Reliability Assessments of Wave Energy Devices

    DEFF Research Database (Denmark)

    Ambühl, Simon; Kofoed, Jens Peter; Sørensen, John Dalsgaard

    2014-01-01

    Wave models used for site assessments are subject to model uncertainties, which need to be quantified when using wave model results for probabilistic reliability assessments. This paper focuses on determination of wave model uncertainties. Considered are four different wave models and validation...... data is collected from published scientific research. The bias, the root-mean-square error as well as the scatter index are considered for the significant wave height as well as the mean zero-crossing wave period. Based on an illustrative generic example it is shown how the estimated uncertainties can...... be implemented in probabilistic reliability assessments....

  2. The threat of nuclear terrorism

    International Nuclear Information System (INIS)

    Maerli, M.

    2001-01-01

    Full text: There have always been enormous gaps between the potential of a weapon and the abilities and/or the will to employ it by terrorists. New means and methods of violence with unknown outcomes could be less appealing for sub-national groups. Conventional 'off the shelf' weaponry is thus likely to remain the major tools for traditional terrorists. However, the analysis show that while the risk of nuclear terrorism may be remote, it should not and cannot be excluded. Rigorous standards and means the protection, control and accounting of fissile materials are thus needed. 'Nuclear terrorism' can be defined as acts of violence and destruction where the means applied are nuclear devices, or threats of use of such means, to create a condition of fear, to get attention, or to blackmail to have wider effect on others than the directly targeted victim(s). Nuclear terrorism is a subset of radiological terrorism, were the means (or threats) applied are radioactive substances. While being distinctly dissimilar in terms of technical approaches and damage potentials, many of the features with regards to public threat perception are likely to be similar. No non-state actors have ever deployed or used a nuclear device, and the number of (publicly known) nuclear bomb treats has been limited. However, there is a disturbing interest among some terrorist organizations in acquiring nuclear weapon capabilities, probably for tactical purposes. The biological and chemical programs of the Japanese 'Aum Shinrikyo' cult that culminated in the Tokyo metro attack is highly publicized. Less well-known is the nuclear weapon program of the group. Nuclear material was acquired from the sect's properties in Australia and markets were explored to purchase nuclear technology via straw trading companies. Another highly profiled terrorist group with obvious nuclear intentions is the 'Al- Qa'ida', the group of bin Laden. The recent trail for the bombings of the U.S. embassies in Nairobi, Kenya

  3. Assessing hopping developmental level in childhood using wearable inertial sensor devices.

    Science.gov (United States)

    Masci, Ilaria; Vannozzi, Giuseppe; Getchell, Nancy; Cappozzo, Aurelio

    2012-07-01

    Assessing movement skills is a fundamental issue in motor development. Current process-oriented assessments, such as developmental sequences, are based on subjective judgments; if paired with quantitative assessments, a better understanding of movement performance and developmental change could be obtained. Our purpose was to examine the use of inertial sensors to evaluate developmental differences in hopping over distance. Forty children executed the task wearing the inertial sensor and relevant time durations and 3D accelerations were obtained. Subjects were also categorized in different developmental levels according to the hopping developmental sequence. Results indicated that some time and kinematic parameters changed with some developmental levels, possibly as a function of anthropometry and previous motor experience. We concluded that, since inertial sensors were suitable in describing hopping performance and sensitive to developmental changes, this technology is promising as an in-field and user-independent motor development assessment tool.

  4. Utilization of remote traffic monitoring devices for urban freeway work zone assessment.

    Science.gov (United States)

    2012-01-01

    The objective of this project was to promote and facilitate analysis and evaluation of the impacts of road construction activities in Smart : Work Zone Deployment Initiative (SWZDI) states. : The two primary objectives of this project were to assess ...

  5. Assessment of the viscoelastic mechanical properties of polycarbonate urethane for medical devices.

    Science.gov (United States)

    Beckmann, Agnes; Heider, Yousef; Stoffel, Marcus; Markert, Bernd

    2018-06-01

    The underlying research work introduces a study of the mechanical properties of polycarbonate urethane (PCU), used in the construction of various medical devices. This comprises the discussion of a suitable material model, the application of elemental experiments to identify the related parameters and the numerical simulation of the applied experiments in order to calibrate and validate the mathematical model. In particular, the model of choice for the simulation of PCU response is the non-linear viscoelastic Bergström-Boyce material model, applied in the finite-element (FE) package Abaqus®. For the parameter identification, uniaxial tension and unconfined compression tests under in-laboratory physiological conditions were carried out. The geometry of the samples together with the applied loadings were simulated in Abaqus®, to insure the suitability of the modelling approach. The obtained parameters show a very good agreement between the numerical and the experimental results. Copyright © 2018 Elsevier Ltd. All rights reserved.

  6. Assessment of Cooperative and Heterogeneous Indoor Localization Algorithms with Real Radio Devices

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen; Noureddine, Hadi; Amiot, Nicolas

    2014-01-01

    In this paper we present results of real-life local- ization experiments performed in an unprecedented cooperative and heterogeneous wireless context. The experiments covered measurements of different radio devices packed together on a trolley, emulating a multi-standard Mobile Terminal (MT) along...... representative trajectories in a crowded office environment. Among all the radio access technologies involved in this campaign (including LTE, WiFi...), the focus is herein put mostly on Impulse Radio - Ultra Wideband (IR-UWB) and ZigBee sub-systems, which are enabled with peer-to-peer ranging capabilities based...... on Time of Arrival (ToA) estimation and Received Signal Strength (RSS) measurements respectively. Single-link model parameters are preliminarily drawn and discussed. In comparison with existing similar campaigns, new algorithms are also applied to the measurement data, showing the interest of advanced de...

  7. Assessment of image quality in x-ray radiography imaging using a small plasma focus device

    International Nuclear Information System (INIS)

    Kanani, A.; Shirani, B.; Jabbari, I.; Mokhtari, J.

    2014-01-01

    This paper offers a comprehensive investigation of image quality parameters for a small plasma focus as a pulsed hard x-ray source for radiography applications. A set of images were captured from some metal objects and electronic circuits using a low energy plasma focus at different voltages of capacitor bank and different pressures of argon gas. The x-ray source focal spot of this device was obtained to be about 0.6 mm using the penumbra imaging method. The image quality was studied by several parameters such as image contrast, line spread function (LSF) and modulation transfer function (MTF). Results showed that the contrast changes by variations in gas pressure. The best contrast was obtained at a pressure of 0.5 mbar and 3.75 kJ stored energy. The results of x-ray dose from the device showed that about 0.6 mGy is sufficient to obtain acceptable images on the film. The measurements of LSF and MTF parameters were carried out by means of a thin stainless steel wire 0.8 mm in diameter and the cut-off frequency was obtained to be about 1.5 cycles/mm. - Highlights: • We investigated a small plasma focus as pulsed x-ray source for radiography applications. • The image quality was studied by several parameters such as image contrast, LSF and MTF. • The x-ray source focal spot was obtained to be ∼0.6 mm using the penumbra imaging method. • The x-ray dose measurement showed that about 0.6 mGy is sufficient to obtain acceptable images on the film. • The profiles of LSF and MTF showed that the cut-off frequency is about 1.5 cycles/mm

  8. Assessing electronic cigarette effects and regulatory impact: Challenges with user self-reported device power.

    Science.gov (United States)

    Rudy, Alyssa K; Leventhal, Adam M; Goldenson, Nicholas I; Eissenberg, Thomas

    2017-10-01

    Electronic cigarettes (ECIGs) aerosolize liquids for user inhalation that usually contain nicotine. ECIG nicotine emission is determined, in part, by user behavior, liquid nicotine concentration, and electrical power. Whether users are able to report accurately nicotine concentration and device electrical power has not been evaluated. This study's purpose was to examine if ECIG users could provide data relevant to understanding ECIG nicotine emission, particularly liquid nicotine concentration (mg/ml) as well as battery voltage (V) and heater resistance (ohms, Ω) - needed to calculate power (watts, W). Adult ECIG users (N=165) were recruited from Los Angeles, CA for research studies examining the effects of ECIG use. We asked all participants who visited the laboratory to report liquid nicotine concentration, V, and Ω. Liquid nicotine concentration was reported by 89.7% (mean=9.5mg/ml, SD=7.3), and responses were consistent with the distribution of liquids available in commonly marketed products. The majority could not report voltage (51.5%) or resistance (63.6%). Of the 40 participants (24.8%) who reported voltage and resistance, there was a substantial power range (2.2-32,670W) the upper limit of which exceeds that of the highest ECIG reported by any user to our knowledge (i.e., 2512W). If 2512W is taken as the upper limit, only 30 (18.2%) reported valid results (mean 237.3W, SD=370.6; range=2.2-1705.3W). Laboratory, survey, and other researchers interested in understanding ECIG effects to inform users and policymakers may need to use methods other than user self-report to obtain information regarding device power. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. Review on Invasive Tree of Heaven (Ailanthus altissima (Mill.) Swingle) Conflicting Values: Assessment of Its Ecosystem Services and Potential Biological Threat.

    Science.gov (United States)

    Sladonja, Barbara; Sušek, Marta; Guillermic, Julia

    2015-10-01

    Globally, invasions by alien plants are rapidly increasing in extent and severity, leading to large-scale ecosystem degradation. One of the most widespread invasive alien plant species in Europe and North America, Tree of Heaven (Ailanthus altissima (Mill.) Swingle) was introduced intentionally for use as an ornamental plant in the 18th century. Since then, it has spread and is now frequently found in a number of countries. Today, Tree of Heaven is considered one of the worst invasive plant species in Europe and is also listed as invasive in North America and many other countries. Millennium Ecosystem Assessment is one of many systems trying to list and categorize biological services to humans and to provide a tool for identifying services delivered by natural ecosystems. Invasive species have generally caused degradation of the services, have a major impact on the environment, and are threatening biodiversity and reducing overall species abundance and diversity. On the other hand, some invasive species can provide services useful to human well-being. In the present review A. altissima impacts on ecosystems are identified and positive influences on some ecosystem services are weighed against the negative effects on the environment and human health. The aim of the present review is to resume the general knowledge of A. altissima, group available references on distribution and ecology according to countries, compare ecosystem services provided or enhanced by A. altissima presence and the negative effects it causes, identify gaps in current knowledge, and give recommendations for future lines of research.

  10. Imaging assessment of a portable hemodialysis device: detection of possible failure modes and monitoring of functional performance.

    Science.gov (United States)

    Olorunsola, Olufoladare G; Kim, Steven H; Chang, Ryan; Kuo, Yuo-Chen; Hetts, Steven W; Heller, Alex; Kant, Rishi; Saeed, Maythem; Fissell, William H; Roy, Shuvo; Wilson, Mark W

    2014-03-27

    The purpose of this study was to investigate the utility and limitations of various imaging modalities in the noninvasive assessment of a novel compact hemodialyzer under development for renal replacement therapy, with specific aim towards monitoring its functional performance. The prototype is a 4×3×6 cm aluminum cartridge housing "blood" and "dialysate" flow paths arranged in parallel. A sheet of semipermeable silicon nanopore membranes forms the blood-dialysate interface, allowing passage of small molecules. Blood flow was simulated using a peristaltic pump to instill iodinated contrast through the blood compartment, while de-ionized water was instilled through the dialysate compartment at a matched rate in the countercurrent direction. Images were acquired under these flow conditions using multi-detector computed tomography (MDCT), fluoroscopy, high-resolution quantitative computed tomography (HR-QCT), and magnetic resonance imaging (MRI). MDCT was used to monitor contrast diffusion efficiency by plotting contrast density as a function of position along the path of flow through the cartridge during steady state infusion at 1 and 20 mL/min. Both linear and exponential regressions were used to model contrast decay along the flow path. Both linear and exponential models of contrast decay appeared to be reasonable approximations, yielding similar results for contrast diffusion during a single pass through the cartridge. There was no measurable difference in contrast diffusion when comparing 1 mL/min and 20 mL/min flow rates. Fluoroscopy allowed a gross qualitative assessment of flow within the device, and revealed flow inhomogeneity within the corner of the cartridge opposite the blood inlet port. MRI and HR-QCT were both severely limited due to the paramagnetic properties and high atomic number of the target material, respectively. During testing, we encountered several causes of device malfunction, including leak formation, trapped gas, and contrast

  11. Bomb Threat Becomes Real News.

    Science.gov (United States)

    Gastaldo, Evann

    1999-01-01

    Discusses how the staff of the newspaper at Camarillo High School (California) covered a bomb threat at their school. Describes how they, overnight, conducted interviews, took and developed photographs, produced the layout, and published the newspaper. (RS)

  12. A Category Based Threat Evaluation Model Using Platform Kinematics Data

    Directory of Open Access Journals (Sweden)

    Mustafa Çöçelli

    2017-08-01

    Full Text Available Command and control (C2 systems direct operators to make accurate decisions in the stressful atmosphere of the battlefield at the earliest. There are powerful tools that fuse various instant piece of information and brings summary of those in front of operators. Threat evaluation is one of the important fusion method that provides these assistance to military people. However, C2 systems could be deprived of valuable data source due to the absence of capable equipment. This situation has a bad unfavorable influence on the quality of tactical picture in front of C2 operators. In this paper, we study on the threat evaluation model that take into account these deficiencies. Our method extracts threat level of various targets mostly from their kinematics in two dimensional space. In the meantime, classification of entities around battlefield is unavailable. Only, category of targets are determined as a result of sensors process, which is the information of whether entities belong to air or surface environment. Hereby, threat evaluation model is consist of three fundamental steps that runs on entities belongs to different environment separately: the extraction of threat assessment cues, threat selection based on Bayesian Inference and the calculation of threat assessment rating. We have evaluated performance of proposed model by simulating a set of synthetic scenarios.

  13. Ventricular Assist Device implant (AB 5000 prototype cannula: In vitro assessment of MRI issues at 3-Tesla

    Directory of Open Access Journals (Sweden)

    Valencerina Samuel

    2008-05-01

    Full Text Available Abstract Purpose To evaluate MRI issues at 3-Tesla for a ventricular assist device (VAD. Methods The AB5000 Ventricle with a prototype Nitinol wire-reinforced In-Flow Cannula and Out-Flow Cannula attached (Abiomed, Inc., Danvers, MA was evaluated for magnetic field interactions, heating, and artifacts at 3-Tesla. MRI-related heating was assessed with the device in a gelled-saline-filled, head/torso phantom using a transmit/received RF body coil while performing MRI at a whole body averaged SAR of 3-W/kg for 15-min. Artifacts were assessed for the main metallic component of this VAD (atrial cannula using T1-weighted, spin echo and gradient echo pulse sequences. Results The AB5000 Ventricle with the prototype In-Flow Cannula and Out-Flow Cannula attached showed relatively minor magnetic field interactions that will not cause movement in situ. Heating was not excessive (highest temperature change, +0.8°C. Artifacts may create issues for diagnostic imaging if the area of interest is in the same area or close to the implanted metallic component of this VAD (i.e., the venous cannula. Conclusion The results of this investigation demonstrated that it would be acceptable for a patient with this VAD (AB5000 Ventricle with a prototype Nitinol wire-reinforced In-Flow Cannula and Out-Flow Cannula attached to undergo MRI at 3-Tesla or less. Notably, it is likely that the operation console for this device requires positioning a suitable distance (beyond the 100 Gauss line or in the MR control room from the 3-Tesla MR system to ensure proper function of the VAD.

  14. Asymmetric threat data mining and knowledge discovery

    Science.gov (United States)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  15. Affirmative Action and Stereotype Threat

    OpenAIRE

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  16. Hypersonic Threats to the Homeland

    Science.gov (United States)

    2017-03-28

    ADAM) system . This ground based system protects 7 soldiers against rocket threats and utilizes a 10 kW laser with an effective range out to...early warning systems for response to hypersonic threats . The integration of directed energy defensive systems with Space Based Infrared Sensors (SBIRS...and early warning radars already in operation will save costs. By capitalizing on Terminal High Altitude Area Defense (THAAD) system capabilities

  17. Mercury in aquatic forage of large herbivores: impact of environmental conditions, assessment of health threats, and implications for transfer across ecosystem compartments.

    Science.gov (United States)

    Bergman, Brenda Gail; Bump, Joseph K

    2014-05-01

    Mercury (Hg) is a leading contaminant across U.S. water bodies, warranting concern for wildlife species that depend upon food from aquatic systems. The risk of Hg toxicity to large herbivores is little understood, even though some large herbivores consume aquatic vascular plants (macrophytes) that may hyper-accumulate Hg. We investigated whether total Hg and methylmercury (MeHg) in aquatic forage may be of concern to moose (Alces alces) and beaver (Castor canadensis) by measuring total Hg and MeHg concentrations, calculating sediment-water bioconcentration factors for macrophyte species these herbivores consume, and estimating herbivore daily Hg consumption. Abiotic factors impacting macrophyte Hg were assessed, as was the difference in Hg concentrations of macrophytes from glacial lakes and those created or expanded by beaver damming. The amount of aquatic-derived Hg that moose move from aquatic to terrestrial systems was calculated, in order to investigate the potential for movement of Hg across ecosystem compartments by large herbivores. Results indicate that the Hg exposure of generalist herbivores may be affected by macrophyte community composition more so than by many abiotic factors in the aquatic environment. Mercury concentrations varied greatly between macrophyte species, with relatively high concentrations in Utricularia vulgaris (>80 ng g(-1) in some sites), and negligible concentrations in Nuphar variegata (~6 ng g(-1)). Macrophyte total Hg concentration was correlated with water pH in predictable ways, but not with other variables generally associated with aquatic Hg concentrations, such as dissolved organic carbon. Moose estimated daily consumption of MeHg is equivalent to or below human reference levels, and far below wildlife reference levels. However, estimated beaver Hg consumption exceeds reference doses for humans, indicating the potential for sub-lethal nervous impairment. In regions of high moose density, moose may be ecologically important

  18. Quantitative Assessment of the Arm/Hand Movements in Parkinson’s Disease Using a Wireless Armband Device

    Directory of Open Access Journals (Sweden)

    Sofija Spasojević

    2017-08-01

    Full Text Available We present an approach for quantitative assessment of the arm/hand movements in patients with Parkinson’s disease (PD, from sensor data acquired with a wearable, wireless armband device (Myo sensor. We propose new Movement Performance Indicators that can be adopted by practitioners for the quantitative evaluation of motor performance and support their clinical evaluations. In addition, specific Movement Performance Indicators can indicate the presence of the bradykinesia symptom. The study includes seventeen PD patients and sixteen age-matched controls. A set of representative arm/hand movements is defined under the supervision of movement disorder specialist. In order to assist the evaluations, and for progress monitoring purposes, as well as for assessing the amount of bradykinesia in PD, a total set of 84 Movement Performance Indicators are computed from the sensor readings. Subsequently, we investigate whether wireless armband device, with the use of the proposed Movement Performance Indicators can be utilized: (1 for objective and precise quantitative evaluation of the arm/hand movements of Parkinson’s patients, (2 for assessment of the bradykinesia motor symptom, and (3 as an adequate low-cost alternative for the sensor glove. We conducted extensive analysis of proposed Movement Performance Indicators and results are indicating following clinically relevant characteristics: (i adequate reliability as measured by ICC; (ii high accuracy in discrimination between the patients and controls, and between the disease stages (support to disease diagnosis and progress monitoring, respectively; (iii substantial difference in comparison between the left-hand and the right-hand movements across controls and patients, as well as between disease stage groups; (iv statistically significant correlation with clinical scales (tapping test and UPDRS-III Motor Score; and (v quantitative evaluation of bradykinesia symptom. Results suggest that the proposed

  19. An overview of non-traditional nuclear threats

    International Nuclear Information System (INIS)

    Geelhood, B.D.; Wogman, N.A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or 'dirty' bombs. The consequences of these nuclear and radiological threats are both economic and life threatening. The defense against undesirable materials entering our borders involves extensive radiation monitoring at ports of entry. The radiation and other signatures of potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve radiation detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo. (author)

  20. The triple threat of pregnancy, HIV infection and malaria: reported causes of maternal mortality in two nationwide health facility assessments in Mozambique, 2007 and 2012.

    Science.gov (United States)

    Bailey, Patricia E; Keyes, Emily; Moran, Allisyn C; Singh, Kavita; Chavane, Leonardo; Chilundo, Baltazar

    2015-11-09

    The paper's primary purpose is to determine changes in magnitude and causes of institutional maternal mortality in Mozambique. We also describe shifts in the location of institutional deaths and changes in availability of prevention and treatment measures for malaria and HIV infection. Two national cross-sectional assessments of health facilities with childbirth services were conducted in 2007 and 2012. Each collected retrospective data on deliveries and maternal deaths and their causes. In 2007, 2,199 cases of maternal deaths were documented over a 12 month period; in 2012, 459 cases were identified over a three month period. In 2007, data collection also included reviews of maternal deaths when records were available (n = 712). Institutional maternal mortality declined from 541 to 284/100,000 births from 2007 to 2012. The rate of decline among women dying of direct causes was 66% compared to 26% among women dying of indirect causes. Cause-specific mortality ratios fell for all direct causes. Patterns among indirect causes were less conclusive given differences in cause-of-death recording. In absolute numbers, the combination of antepartum and postpartum hemorrhage was the leading direct cause of death each year and HIV and malaria the main non-obstetric causes. Based on maternal death reviews, evidence of HIV infection, malaria or anemia was found in more than 40% of maternal deaths due to abortion, ectopic pregnancy and sepsis. Almost half (49%) of all institutional maternal deaths took place in the largest hospitals in 2007 while in 2012, only 24% occurred in these hospitals. The availability of antiretrovirals and antimalarials increased in all types of facilities, but increases were most dramatic in health centers. The rate at which women died of direct causes in Mozambique's health facilities appears to have declined significantly. Despite a clear improvement in access to antiretrovirals and antimalarials, especially at lower levels of health care

  1. Validity of Devices That Assess Body Temperature During Outdoor Exercise in the Heat

    OpenAIRE

    Casa, Douglas J; Becker, Shannon M; Ganio, Matthew S; Brown, Christopher M; Yeargin, Susan W; Roti, Melissa W; Siegler, Jason; Blowers, Julie A; Glaviano, Neal R; Huggins, Robert A; Armstrong, Lawrence E; Maresh, Carl M

    2007-01-01

    Context: Rectal temperature is recommended by the National Athletic Trainers' Association as the criterion standard for recognizing exertional heat stroke, but other body sites commonly are used to measure temperature. Few authors have assessed the validity of the thermometers that measure body temperature at these sites in athletic settings.

  2. Weapon and Sighting System Compatibility Assessment for Prototype Maxillofacial Protection Devices

    Science.gov (United States)

    2013-03-01

    system was employed during ingress and egress maneuvers. This was necessary for visibility of hand and foot positioning during ingress, egress...well as combat vehicle-specific operators as expert research participants (mounted assessment), all of which will incorporate anthropometric

  3. Development of Critical Thinking Self-Assessment System Using Wearable Device

    Science.gov (United States)

    Gotoh, Yasushi

    2015-01-01

    In this research the author defines critical thinking as skills and dispositions which enable one to solve problems logically and to attempt to reflect autonomously by means of meta-cognitive activities on one's own problem-solving processes. The author focuses on providing meta-cognitive knowledge to help with self-assessment. To develop…

  4. Clinimetric properties of a novel feedback device for assessing gait parameters in stroke survivors

    NARCIS (Netherlands)

    Punt, M.; van Alphen, B.; van de Port, I.G.; van Dieen, J.H.; Michael, K.; Outermans, J.C.; Wittink, H.

    2014-01-01

    Introduction. Community-dwelling stroke survivors tend to become less physically active over time. There is no 'gold standard' to measure walking activity in this population. Assessment of walking activity generally involves subjective or observer-rated instruments. Objective measuring with an

  5. 76 FR 82129 - Medical Devices; Ovarian Adnexal Mass Assessment Score Test System; Labeling; Black Box Restrictions

    Science.gov (United States)

    2011-12-30

    ... and 13563 direct Agencies to assess all costs and benefits of available regulatory alternatives and... potential economic, environmental, public health and safety, and other advantages; distributive impacts; and... misuse. With the addition of this black box warning to product labeling, advertising, and marketing...

  6. Assessment of a wearable force- and electromyography device and comparison of the related signals for myocontrol

    Directory of Open Access Journals (Sweden)

    Mathilde Connan

    2016-11-01

    Full Text Available In the frame of assistive robotics, multi-finger prosthetic hand/wrists have recently appeared,offering an increasing level of dexterity; however, in practice their control is limited to a few handgrips and still unreliable, with the effect that pattern recognition has not yet appeared in the clinicalenvironment. According to the scientific community, one of the keys to improve the situation ismulti-modal sensing, i.e., using diverse sensor modalities to interpret the subject’s intent andimprove the reliability and safety of the control system in daily life activities. In this work, wefirst describe and test a novel wireless, wearable force- and electromyography device; throughan experiment conducted on ten intact subjects, we then compare the obtained signals bothqualitatively and quantitatively, highlighting their advantages and disadvantages. Our resultsindicate that force-myography yields signals which are more stable across time during whenevera pattern is held, than those obtained by electromyography. We speculate that fusion of the twomodalities might be advantageous to improve the reliability of myocontrol in the near future.

  7. Experimental Assessment of the Hydraulics of a Miniature Axial-Flow Left Ventricular Assist Device

    Science.gov (United States)

    Smith, P. Alex; Cohn, William; Metcalfe, Ralph

    2017-11-01

    A minimally invasive partial-support left ventricular assist device (LVAD) has been proposed with a flow path from the left atrium to the arterial system to reduce left ventricular stroke work. In LVAD design, peak and average efficiency must be balanced over the operating range to reduce blood trauma. Axial flow pumps have many geometric parameters. Until recently, testing all these parameters was impractical, but modern 3D printing technology enables multi-parameter studies. Following theoretical design, experimental hydraulic evaluation in steady state conditions examines pressure, flow, pressure-flow gradient, efficiency, torque, and axial force as output parameters. Preliminary results suggest that impeller blades and stator vanes with higher inlet angles than recommended by mean line theory (MLT) produce flatter gradients and broader efficiency curves, increasing compatibility with heart physiology. These blades also produce less axial force, which reduces bearing load. However, they require slightly higher torque, which is more demanding of the motor. MLT is a low order, empirical model developed on large pumps. It does not account for the significant viscous losses in small pumps like LVADs. This emphasizes the importance of experimental testing for hydraulic design. Roderick D MacDonald Research Fund.

  8. Engaging and Assessing Students through their Electronic Devices and Real Time Quizzes

    Directory of Open Access Journals (Sweden)

    E. Ferrándiz

    2016-10-01

    Full Text Available This paper describes a teaching experience using Socrative, a third party electronic tool, for real-time questioning in lectures of Econometrics.  Econometrics is a theoretical-practical subject, but traditionally a large proportion of our students tend to focus on the practical and discard the theory, often skipping classes on theory and avoiding studying its content, probably motivated by its complexity. As a consequence, students’ marks obtained in the theoretical part of the exam are usually low. In this context, we put forward a change in our teaching methodology to include the use of Socrative, a freely available app, that allows students to answer teachers’ short, true/false, or multiple choice questions posed during each class using their smartphones (or other electronic devices with Internet connection. The objectives of this project are twofold: 1 to engage students and increase attendance at lectures; 2 to improve feedback on the learning process. The results of a survey of a sample of 186 students reveal that Socrative has been an effective tool for achieving these objectives.

  9. Illicit trafficking of nuclear and other radioactive material: the 'net' security threat

    International Nuclear Information System (INIS)

    Zaitseva, L.; Steinhaeusler, F.

    2005-01-01

    Full text: Illicit trafficking in nuclear and other radioactive material, which could lead to the creation of a nuclear device or a radiological dispersal device (RDD), has been a subject of concern for more than a decade now. This concern became even more pronounced after the September 11 th attacks in the United States, which demonstrated that modern day terrorists are willing and capable of inflicting mass casualties among civilian population in target countries in order to further their goals. The problem of illicit trafficking - intentional diversion and smuggling of nuclear fissile material and radioactive sources - has been closely watched and studied by several national institutions and international organizations. This resulted in the establishment of several nuclear smuggling databases, tracking illicit trafficking incidents. The number of such incidents for a given period varies widely between the different databases, reflecting the different sources of information used, the different geographical regions covered, as well as the different methodologies applied to data mining and data analysis. One major obstacle to assessing the actual security threat due to illicit trafficking is the inclusion of incidents in the analysis, which do not represent a security threat in the sense of being the pre-stage of a terrorist operation or a malevolent act. Such incidents mainly involve inadvertent movement of illegally disposed of radioactive sources in scrap metal or contaminated goods across international borders and discoveries of so called 'orphan' radiation sources. This paper analyzes the global data contained in the database on nuclear smuggling, theft and orphan radiation sources (DSTO) operated by the University of Salzburg, using special filters to discriminate between illicit trafficking incidents involving a criminal intent and those that do not. Thereby, the net security threat of illicit trafficking will be determined to help provide a realistic

  10. Computer security threats faced by small businesses in Australia

    OpenAIRE

    Hutchings, Alice

    2012-01-01

    In this paper, an overview is provided of computer security threats faced by small businesses. Having identified the threats, the implications for small business owners are described, along with countermeasures that can be adopted to prevent incidents from occurring. The results of the Australian Business Assessment of Computer User Security (ABACUS) survey, commissioned by the Australian Institute of Criminology (AIC), are drawn upon to identify key risks (Challice 2009; Richards 2009). Addi...

  11. BUILDING UP STATE STRATEGIC RESISTANCE AGAINST HYBRID THREATS

    Directory of Open Access Journals (Sweden)

    Miroslaw Banasik

    2017-11-01

    Full Text Available Hybrid warfare, conducted in Ukraine since 2014, has become a new geopolitical phenomenon which threatens the Euro-Atlantic security that appeared after the collapse of the bipolar world. The paper discusses how the Russian Federation takes advantage of hybrid warfare to achieve its political objectives and to further its own interests. The paper also contains an assessment of the threat of hybrid warfare in Poland and determines what undertakings are necessary to effectively counter threats coming from Russia.

  12. Experimental estimation of snare detectability for robust threat monitoring

    OpenAIRE

    O Kelly, H. J.; Rowcliffe, M.; Durant, S.; Milner-Gulland, E. J.

    2018-01-01

    Hunting with wire snares is rife within many tropical forest systems, and constitutes one of the severest threats to a wide range of vertebrate taxa. As for all threats, reliable monitoring of snaring levels is critical for assessing the relative effectiveness of management interventions. However, snares pose a particular challenge in terms of tracking spatial or temporal trends in their prevalence because they are extremely difficult to detect, and are typically spread across large, inaccess...

  13. Improving toxicity assessment of pesticide mixtures: the use of polar passive sampling devices extracts in microalgae toxicity tests

    Directory of Open Access Journals (Sweden)

    Sandra KIM TIAM

    2016-09-01

    Full Text Available Complexity of contaminants exposure needs to be taking in account for an appropriate evaluation of risks related to mixtures of pesticides released in the ecosystems. Toxicity assessment of such mixtures can be made through a variety of toxicity tests reflecting different level of biological complexity. This paper reviews the recent developments of passive sampling techniques for polar compounds, especially Polar Organic Chemical Integrative Samplers (POCIS and Chemcatcher® and the principal assessment techniques using microalgae in laboratory experiments. The progresses permitted by the coupled use of such passive samplers and ecotoxicology testing as well as their limitations are presented. Case studies combining passive sampling devices (PSD extracts and toxicity assessment toward microorganisms at different biological scales from single organisms to communities level are presented. These case studies, respectively aimed i at characterizing the toxic potential of waters using dose-response curves, and ii at performing microcosm experiments with increased environmental realism in the toxicant exposure in term of cocktail composition and concentration. Finally perspectives and limitations of such approaches for future applications in the area of environmental risk assessment are discussed.

  14. Polymeric Materials Models in the Warrior Injury Assessment Manikin (WIAMan) Anthropomorphic Test Device (ATD) Tech Demonstrator

    Science.gov (United States)

    2017-01-01

    analytical model currently used by military vehicle analysts has been continuously updated to address the model’s inherent deficiencies and make the... model is a hyperelastic polymer model based upon statistical mechanics and the finite extensibility of a polymer chain.23 Its rheological ...ARL-TR-7927 ● JAN 2017 US Army Research Laboratory Polymeric Materials Models in the Warrior Injury Assessment Manikin (WIAMan

  15. Assessment of Joint Improvised Explosive Device Defeat Organization (JIEDDO) Training Activity

    Science.gov (United States)

    2013-01-01

    the RAND study team was asked to assess whether JIEDDO duplicated or showed close similarity to the training programs and functions already...duplication and relatively few cases of close similarity. We also note that Services or CCMDs did use the programs provided and indicated that they used...tailored interactive modules. TBD ALL Home station/CTC/ Theater VISDeS The expansion of KEYHOLE /Route Clearance Optic System/Marine Corps EOD Optic

  16. Assessment of dosimetrical performance in 11 Varian a-Si500 electronic portal imaging devices

    International Nuclear Information System (INIS)

    Kavuma, Awusi; Glegg, Martin; Currie, Garry; Elliott, Alex

    2008-01-01

    Dosimetrical characteristics of 11 Varian a-Si-500 electronic portal imaging devices (EPIDs) in clinical use for periods ranging between 10 and 86 months were investigated for consistency of performance and portal dosimetry implications. Properties studied include short-term reproducibility, signal linearity with monitor units, response to reference beam, signal uniformity across the detector panel, signal dependence on field size, dose-rate influence, memory effects and image profiles as a function of monitor units. The EPID measurements were also compared with those of the ionization chambers' to ensure stability of the linear accelerators. Depending on their clinical installation date, the EPIDs were interfaced with one of the two different acquisition control software packages, IAS2/IDU-II or IAS3/IDU-20. Both the EPID age and image acquisition system influenced the dosimetric characteristics with the newer version (IAS3 with IDU-20) giving better data reproducibility and linearity fit than the older version (IAS2 with IDU-II). The relative signal response (uniformity) after 50 MU was better than 95% of the central value and independent of detector. Sensitivity for all EPIDs reduced continuously with increasing dose rates for the newer image acquisition software. In the dose-rate range 100-600 MU min -1 , the maximum variation in sensitivity ranged between 1 and 1.8% for different EPIDs. For memory effects, the increase in the measured signal at the centre of the irradiated field for successive images was within 1.8% and 1.0% for the older and newer acquisition systems, respectively. Image profiles acquired at a lower MU in the radial plane (gun-target) had gradients in measured pixel values of up to 25% for the older system. Detectors with software/hardware versions IAS3/IDU-20 have a high degree of accuracy and are more suitable for routine quantitative IMRT dosimetrical verification.

  17. A Comparison and Calibration of a Wrist-Worn Blood Pressure Monitor for Patient Management: Assessing the Reliability of Innovative Blood Pressure Devices

    Science.gov (United States)

    Melville, Sarah; Teskey, Robert; Philip, Shona; Simpson, Jeremy A; Lutchmedial, Sohrab

    2018-01-01

    Background Clinical guidelines recommend monitoring of blood pressure at home using an automatic blood pressure device for the management of hypertension. Devices are not often calibrated against direct blood pressure measures, leaving health care providers and patients with less reliable information than is possible with current technology. Rigorous assessments of medical devices are necessary for establishing clinical utility. Objective The purpose of our study was 2-fold: (1) to assess the validity and perform iterative calibration of indirect blood pressure measurements by a noninvasive wrist cuff blood pressure device in direct comparison with simultaneously recorded peripheral and central intra-arterial blood pressure measurements and (2) to assess the validity of the measurements thereafter of the noninvasive wrist cuff blood pressure device in comparison with measurements by a noninvasive upper arm blood pressure device to the Canadian hypertension guidelines. Methods The cloud-based blood pressure algorithms for an oscillometric wrist cuff device were iteratively calibrated to direct pressure measures in 20 consented patient participants. We then assessed measurement validity of the device, using Bland-Altman analysis during routine cardiovascular catheterization. Results The precalibrated absolute mean difference between direct intra-arterial to wrist cuff pressure measurements were 10.8 (SD 9.7) for systolic and 16.1 (SD 6.3) for diastolic. The postcalibrated absolute mean difference was 7.2 (SD 5.1) for systolic and 4.3 (SD 3.3) for diastolic pressures. This is an improvement in accuracy of 33% systolic and 73% diastolic with a 48% reduction in the variability for both measures. Furthermore, the wrist cuff device demonstrated similar sensitivity in measuring high blood pressure compared with the direct intra-arterial method. The device, when calibrated to direct aortic pressures, demonstrated the potential to reduce a treatment gap in high blood

  18. Life Cycle Assessment and Costing Methods for Device Procurement: Comparing Reusable and Single-Use Disposable Laryngoscopes.

    Science.gov (United States)

    Sherman, Jodi D; Raibley, Lewis A; Eckelman, Matthew J

    2018-01-09

    Traditional medical device procurement criteria include efficacy and safety, ease of use and handling, and procurement costs. However, little information is available about life cycle environmental impacts of the production, use, and disposal of medical devices, or about costs incurred after purchase. Reusable and disposable laryngoscopes are of current interest to anesthesiologists. Facing mounting pressure to quickly meet or exceed conflicting infection prevention guidelines and oversight body recommendations, many institutions may be electively switching to single-use disposable (SUD) rigid laryngoscopes or overcleaning reusables, potentially increasing both costs and waste generation. This study provides quantitative comparisons of environmental impacts and total cost of ownership among laryngoscope options, which can aid procurement decision making to benefit facilities and public health. We describe cradle-to-grave life cycle assessment (LCA) and life cycle costing (LCC) methods and apply these to reusable and SUD metal and plastic laryngoscope handles and tongue blade alternatives at Yale-New Haven Hospital (YNHH). The US Environmental Protection Agency's Tool for the Reduction and Assessment of Chemical and other environmental Impacts (TRACI) life cycle impact assessment method was used to model environmental impacts of greenhouse gases and other pollutant emissions. The SUD plastic handle generates an estimated 16-18 times more life cycle carbon dioxide equivalents (CO2-eq) than traditional low-level disinfection of the reusable steel handle. The SUD plastic tongue blade generates an estimated 5-6 times more CO2-eq than the reusable steel blade treated with high-level disinfection. SUD metal components generated much higher emissions than all alternatives. Both the SUD handle and SUD blade increased life cycle costs compared to the various reusable cleaning scenarios at YNHH. When extrapolated over 1 year (60,000 intubations), estimated costs increased

  19. Functional effectiveness of threat appeals in exercise promotion messages

    Directory of Open Access Journals (Sweden)

    Olivier Mairesse

    2010-01-01

    Full Text Available As more than 70% of individuals in Western societies can be categorized as sedentary and inactivity has been recognized to lead to a series of serious physical and psychological disorders, the importance of physical activity promotion is ever more emphasized. Many social marketing campaigns use threat (or fear appeals to promote healthy behaviors. Theoretical models, such as the Extended Parallel Process Model integrate concepts as 'perceived threat' and 'perceived efficacy' to explain how such messages operate and can cause diverse behavioral reactions. It is however still not entirely clear how these different aspects are valuated and combined to determine desired versus undesired response behaviors in individuals. In a functional integration task, threat-appeal based exercise promotion messages varying in psychological threat and efficacy content were shown to sedentary employees in order to assess how they affect their intention to engage in physical exercise. Our results show that individuals can be categorized in 4 different clusters depending on the way they valuate threat and efficacy appeals: i.e. individuals sensitive to both types of cues, those sensitive to either the threat or the efficacy component in the message and those insensitive to either one of them. As different segments of receivers of the message react differently to threat and efficacy combinations, it is concluded that different approaches to designing effective mass media campaigns may be required for effective exercise promotion.

  20. NATIONAL SECURITY IMPLICATIONS OF CYBER THREATS

    Directory of Open Access Journals (Sweden)

    ALEJANDRO AMIGO TOSSI

    2017-09-01

    Full Text Available Cyber threat is one of the main risks for security in developing countries, as well in States on the development path, such as ours. This phenomena is a challenge to national security, that needs the adoption of a paramount approach in its analysis, that have to consider all the aspects that had transformed the actors and malevolent actions in this environment in one of the most important challenges to the security of governmental as well as private organizations all over the world. States, hackers, cyber activists, and cyber criminals have been main actors in several situations that had shaped a new dimension for international and national security. The purpose of this article is to propose topics that could be included in the national assessment of cyber threats to the Chilean national security, based upon several conceptual definitions, cyber attacks already executed to state and military organization’s in Chile, and lastly, considerations over cyber threats included in the National Security Strategies of some western powers.

  1. Cyber threat model for tactical radio networks

    Science.gov (United States)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  2. Protection without detection: a threat mitigation technique

    Science.gov (United States)

    White, Joshua; McCoy, Joseph R.; Ratazzi, Paul

    2012-05-01

    Networking systems and individual applications have traditionally been defended using signature-based tools that protect the perimeter, many times to the detriment of service, performance, and information flow. These tools require knowledge of both the system on which they run and the attack they are preventing. As such, by their very definition, they only account for what is known to be malicious and ignore the unknown. The unknown, or zero day threat, can occur when defenses have yet to be immunized via a signature or other identifier of the threat. In environments where execution of the mission is paramount, the networks and applications must perform their function of information delivery without endangering the enterprise or losing the salient information, even when facing zero day threats. In this paper we, describe a new defensive strategy that provides a means to more deliberately balance the oft mutually exclusive aspects of protection and availability. We call this new strategy Protection without Detection, since it focuses on network protection without sacrificing information availability. The current instantiation analyzes the data stream in real time as it passes through an in-line device. Critical files are recognized, and mission-specific trusted templates are applied as they are forwarded to their destination. The end result is a system which eliminates the opportunity for propagation of malicious or unnecessary payloads via the various containers that are inherent in the definition of standard file types. In some cases, this method sacrifices features or functionality that is typically inherent in these files. However, with the flexibility of the template approach, inclusion or exclusion of these features becomes a deliberate choice of the mission owners, based on their needs and amount of acceptable risk. The paper concludes with a discussion of future extensions and applications.

  3. Objective Assessment of Joint Stiffness: A Clinically Oriented Hardware and Software Device with an Application to the Shoulder Joint.

    Science.gov (United States)

    McQuade, Kevin; Price, Robert; Liu, Nelson; Ciol, Marcia A

    2012-08-30

    Examination of articular joints is largely based on subjective assessment of the "end-feel" of the joint in response to manually applied forces at different joint orientations. This technical report aims to describe the development of an objective method to examine joints in general, with specific application to the shoulder, and suitable for clinical use. We adapted existing hardware and developed laptop-based software to objectively record the force/displacement behavior of the glenohumeral joint during three common manual joint examination tests with the arm in six positions. An electromagnetic tracking system recorded three-dimensional positions of sensors attached to a clinician examiner and a patient. A hand-held force transducer recorded manually applied translational forces. The force and joint displacement were time-synchronized and the joint stiffness was calculated as a quantitative representation of the joint "end-feel." A methodology and specific system checks were developed to enhance clinical testing reproducibility and precision. The device and testing protocol were tested on 31 subjects (15 with healthy shoulders, and 16 with a variety of shoulder impairments). Results describe the stiffness responses, and demonstrate the feasibility of using the device and methods in clinical settings.

  4. A novel device for hazardous substances degradation based on double-cavitating-jets impingement: Parameters optimization and efficiency assessment.

    Science.gov (United States)

    Tao, Yuequn; Cai, Jun; Huai, Xiulan; Liu, Bin

    2017-08-05

    Hydrodynamic cavitation is an effective advanced oxidation process. But sometimes it cannot obtain satisfactory treatment efficiency by using hydrodynamic cavitation individually, so it is necessary to introduce intensive methods. Based on double-cavitating-jets impingement, this paper presents a novel device that has advantages of strong heat and mass transfer and efficient chemical reactions. Based on the device, a series of experimental investigations on degradation of a basic dye, i.e. Rhodamine B were carried out. Significant Rhodamine B removal from aqueous solution was observed during 2h treatment and the degradation reaction conformed to pseudo-first-order kinetics. The synergetic effects between double-cavitating-jets impingement and Fenton chemistry on simultaneous degradation of Rhodamine B were confirmed. Both single-variable experiments and orthogonal experiments were carried out to study the effects of initial hydrogen peroxide, ferrous sulfate and Rhodamine B concentrations and the optimum conditions were found out. Effects of jet inlet pressure in the range of 6-12MPa and solution pH value in the range of 2-8 were also investigated. The cavitation yield was evaluated to assess the energy efficiency. The present treatment scheme showed advantages in terms of reducing the demand of hydrogen peroxide concentration and enhancing the treatment efficiency in large scale operation. Copyright © 2017 Elsevier B.V. All rights reserved.

  5. Computerized Neuropsychological Assessment Devices: Joint Position Paper of the American Academy of Clinical Neuropsychology and the National Academy of Neuropsychology†

    Science.gov (United States)

    Bauer, Russell M.; Iverson, Grant L.; Cernich, Alison N.; Binder, Laurence M.; Ruff, Ronald M.; Naugle, Richard I.

    2012-01-01

    This joint position paper of the American Academy of Clinical Neuropsychology and the National Academy of Neuropsychology sets forth our position on appropriate standards and conventions for computerized neuropsychological assessment devices (CNADs). In this paper, we first define CNADs and distinguish them from examiner-administered neuropsychological instruments. We then set forth position statements on eight key issues relevant to the development and use of CNADs in the healthcare setting. These statements address (a) device marketing and performance claims made by developers of CNADs; (b) issues involved in appropriate end-users for administration and interpretation of CNADs; (c) technical (hardware/software/firmware) issues; (d) privacy, data security, identity verification, and testing environment; (e) psychometric development issues, especially reliability, and validity; (f) cultural, experiential, and disability factors affecting examinee interaction with CNADs; (g) use of computerized testing and reporting services; and (h) the need for checks on response validity and effort in the CNAD environment. This paper is intended to provide guidance for test developers and users of CNADs that will promote accurate and appropriate use of computerized tests in a way that maximizes clinical utility and minimizes risks of misuse. The positions taken in this paper are put forth with an eye toward balancing the need to make validated CNADs accessible to otherwise underserved patients with the need to ensure that such tests are developed and utilized competently, appropriately, and with due concern for patient welfare and quality of care. PMID:22382386

  6. Foreign Terrorist Threat to Singapore: An Assessment

    National Research Council Canada - National Science Library

    Choon, Ang

    2001-01-01

    ... to Singapore, by studying five main phenomena in Asia that tends to result in terrorism: communist insurgency, ethnic/religious separatism, religious extremism, international terrorism, and political rivalries...

  7. Threat Based Risk Assessment for Enterprise Networks

    Science.gov (United States)

    2016-02-15

    devastating insider attacks, Edward Snowden exfiltrated 1.7 million documents from the National Security Agency [1]. That same year, the security company...Weller-Fahy, and Tamara Yu. References 1. G. Greenwald, No Place to Hide: Edward Snowden , the NSA, and the U.S. Surveillance State. London: Hamish

  8. Amazon forest dieback: assessing vulnerabilities and threats

    OpenAIRE

    Nobrega, Caroline Correa

    2016-01-01

    Nos últimos anos, tem surgido cada vez mais evidências que a Amazônia pode estar ameaçada em decorrências das mudanças regionais no clima e no uso do solo. Por causa de um sistema de retroalimentação positivo, em que impactos intensificam outros impactos, alguns modelos projetam para o final do século uma substituição da floresta amazônica por formações tipo savana ou semiáridas (forest dieback). Diversas evidências têm indicado uma alta vulnerabilidade da Amazônia às mudanças ...

  9. Assessing the Biological Weapons and Bioterrorism Threat

    Science.gov (United States)

    2005-12-01

    Senate testimony, Dr. Craig Venter suggested that “outbreaks and spread of avian and other fl u virus strains . . . could potentially kill hundreds of...May 23, 2005. 36. Dr. Craig Venter, Testimony to Hearing of the U.S. Senate Committee on Health, Education, Labor and Pensions, “21st Century...International Studies. 241. Robert M. Cook- Deegan , “Issues in Biosecurity and Biosafety,” Science, Vol. 308, No. 5730, June 24, 2005, pp. 1867-1868

  10. Development of a semi-quantitative risk assessment model for evaluating environmental threat posed by the three first EU watch-list pharmaceuticals to urban wastewater treatment plants: An Irish case study.

    Science.gov (United States)

    Tahar, Alexandre; Tiedeken, Erin Jo; Clifford, Eoghan; Cummins, Enda; Rowan, Neil

    2017-12-15

    Contamination of receiving waters with pharmaceutical compounds is of pressing concern. This constitutes the first study to report on the development of a semi-quantitative risk assessment (RA) model for evaluating the environmental threat posed by three EU watch list pharmaceutical compounds namely, diclofenac, 17-beta-estradiol and 17-alpha-ethinylestradiol, to aquatic ecosystems using Irish data as a case study. This RA model adopts the Irish Environmental Protection Agency Source-Pathway-Receptor concept to define relevant parameters for calculating low, medium or high risk score for each agglomeration of wastewater treatment plant (WWTP), which include catchment, treatments, operational and management factors. This RA model may potentially be used on a national scale to (i) identify WWTPs that pose a particular risk as regards releasing disproportionally high levels of these pharmaceutical compounds, and (ii) help identify priority locations for introducing or upgrading control measures (e.g. tertiary treatment, source reduction). To assess risks for these substances of emerging concern, the model was applied to 16 urban WWTPs located in different regions in Ireland that were scored for the three different compounds and ranked as low, medium or high risk. As a validation proxy, this case study used limited monitoring data recorded at some these plants receiving waters. It is envisaged that this semi-quantitative RA approach may aid other EU countries investigate and screen for potential risks where limited measured or predicted environmental pollutant concentrations and/or hydrological data are available. This model is semi-quantitative, as other factors such as influence of climate change and drug usage or prescription data will need to be considered in a future point for estimating and predicting risks. Copyright © 2017 Elsevier B.V. All rights reserved.

  11. Anti-malware software and medical devices.

    Science.gov (United States)

    2010-10-01

    Just as much as healthcare information systems, medical devices need protection against cybersecurity threats. Anti-malware software can help safeguard the devices in your facility-but it has limitations and even risks. Find out what steps you can take to manage anti-malware applications in your devices.

  12. [Physiological and hygienic assessment of perception of the information from electronic device for reading (reader)].

    Science.gov (United States)

    Kuchma, V R; Teksheva, L M; Vyatleva, O A; Kurgansky, A M

    2013-01-01

    A comparison of the legibility of the three different media: paper personal computer (LCD) and the e-reader in schoolchildren (12-14 years of age) was performed. Comprehensive assessment of the reading performance (speed of reading aloud, the number of errors in reading, and integral indicator of the degree of difficulty of visual task), its physiological value (according to data of EEG, EOG and ECG), and subjective preference of type of media by the schoolchildren showed that by the sum of signs e-reader occupies an intermediate position between printed text and the computer screen. The effect of increased emotional intensity of using e-reader (increased motivation), which is manifested in the preservation of the sympathetic nervous system activation after the reading, was obtained. The necessity of additional research has been shown.

  13. Assessment of martensitic steels as structural materials in magnetic fusion devices

    International Nuclear Information System (INIS)

    Rawls, J.M.; Chen, W.Y.K.; Cheng, E.T.; Dalessandro, J.A.; Miller, P.H.; Rosenwasser, S.N.; Thompson, L.D.

    1980-01-01

    This manuscript documents the results of preliminary experiments and analyses to assess the feasibility of incorporating ferromagnetic martensitic steels in fusion reactor designs and to evaluate the possible advantages of this class of material with respect to first wall/blanket lifetime. The general class of alloys under consideration are ferritic steels containing from about 9 to 13 percent Cr with some small additions of various strengthening elements such as Mo. These steels are conventionally used in the normalized and tempered condition for high temperature applications and can compete favorably with austenitic alloys up to about 600 0 C. Although the heat treatment can result in either a tempered martensite or bainite structure, depending on the alloy and thermal treatment parameters, this general class of materials will be referred to as martensitic stainless steels for simplicity

  14. Parametric Approach to Assessing Performance of High-Lift Device Active Flow Control Architectures

    Directory of Open Access Journals (Sweden)

    Yu Cai

    2017-02-01

    Full Text Available Active Flow Control is at present an area of considerable research, with multiple potential aircraft applications. While the majority of research has focused on the performance of the actuators themselves, a system-level perspective is necessary to assess the viability of proposed solutions. This paper demonstrates such an approach, in which major system components are sized based on system flow and redundancy considerations, with the impacts linked directly to the mission performance of the aircraft. Considering the case of a large twin-aisle aircraft, four distinct active flow control architectures that facilitate the simplification of the high-lift mechanism are investigated using the demonstrated approach. The analysis indicates a very strong influence of system total mass flow requirement on architecture performance, both for a typical mission and also over the entire payload-range envelope of the aircraft.

  15. Assessing locomotor skills development in childhood using wearable inertial sensor devices: the running paradigm.

    Science.gov (United States)

    Masci, Ilaria; Vannozzi, Giuseppe; Bergamini, Elena; Pesce, Caterina; Getchell, Nancy; Cappozzo, Aurelio

    2013-04-01

    Objective quantitative evaluation of motor skill development is of increasing importance to carefully drive physical exercise programs in childhood. Running is a fundamental motor skill humans adopt to accomplish locomotion, which is linked to physical activity levels, although the assessment is traditionally carried out using qualitative evaluation tests. The present study aimed at investigating the feasibility of using inertial sensors to quantify developmental differences in the running pattern of young children. Qualitative and quantitative assessment tools were adopted to identify a skill-sensitive set of biomechanical parameters for running and to further our understanding of the factors that determine progression to skilled running performance. Running performances of 54 children between the ages of 2 and 12 years were submitted to both qualitative and quantitative analysis, the former using sequences of developmental level, the latter estimating temporal and kinematic parameters from inertial sensor measurements. Discriminant analysis with running developmental level as dependent variable allowed to identify a set of temporal and kinematic parameters, within those obtained with the sensor, that best classified children into the qualitative developmental levels (accuracy higher than 67%). Multivariate analysis of variance with the quantitative parameters as dependent variables allowed to identify whether and which specific parameters or parameter subsets were differentially sensitive to specific transitions between contiguous developmental levels. The findings showed that different sets of temporal and kinematic parameters are able to tap all steps of the transitional process in running skill described through qualitative observation and can be prospectively used for applied diagnostic and sport training purposes. Copyright © 2012 Elsevier B.V. All rights reserved.

  16. Reliability and validity of a short version of the general functioning subscale of the McMaster Family Assessment Device.

    Science.gov (United States)

    Boterhoven de Haan, Katrina L; Hafekost, Jennifer; Lawrence, David; Sawyer, Michael G; Zubrick, Stephen R

    2015-03-01

    The General Functioning 12-item subscale (GF12) of The McMaster Family Assessment Device (FAD) has been validated as a single index measure to assess family functioning. This study reports on the reliability and validity of using only the six positive items from the General Functioning subscale (GF6+). Existing data from two Western Australian studies, the Raine Study (RS) and the Western Australian Child Health Survey (WACHS), was used to analyze the psychometric properties of the GF6+ subscale. The results demonstrated that the GF6+ subscale had virtually equivalent psychometric properties and was able to identify almost all of the same families who had healthy or unhealthy levels of functioning as the full GF12 subscale. In consideration of the constraints faced by large-scale population-based surveys, the findings of this study support the use of a GF6+ subscale from the FAD, as a quick and effective tool to assess the overall functioning of families. © 2014 Family Process Institute.

  17. Biological Threats Detection Technologies

    International Nuclear Information System (INIS)

    Bartoszcze, M.

    2007-01-01

    Among many decisive factors, which can have the influence on the possibility of decreases the results of use biological agents should be mentioned obligatory: rapid detection and identification of biological factor used, the proper preventive treatment and the medical management. The aims of identification: to identify the factor used, to estimate the area of contamination, to evaluate the possible countermeasure efforts (antibiotics, disinfectants) and to assess the effectiveness of the decontamination efforts (decontamination of the persons, equipment, buildings, environment etc.). The objects of identification are: bacteria and bacteria's spores, viruses, toxins and genetically modified factors. The present technologies are divided into: based on PCR techniques (ABI PRISM, APSIS, BIOVERIS, RAPID), immuno (BADD, RAMP, SMART) PCR and immuno techniques (APDS, LUMINEX) and others (BDS2, LUNASCAN, MALDI). The selected technologies assigned to field conditions, mobile and stationary laboratories will be presented.(author)

  18. Stereotype threat spillover: how coping with threats to social identity affects aggression, eating, decision making, and attention.

    Science.gov (United States)

    Inzlicht, Michael; Kang, Sonia K

    2010-09-01

    Stereotype threat spillover is a situational predicament in which coping with the stress of stereotype confirmation leaves one in a depleted volitional state and thus less likely to engage in effortful self-control in a variety of domains. We examined this phenomenon in 4 studies in which we had participants cope with stereotype and social identity threat and then measured their performance in domains in which stereotypes were not "in the air." In Study 1 we examined whether taking a threatening math test could lead women to respond aggressively. In Study 2 we investigated whether coping with a threatening math test could lead women to indulge themselves with unhealthy food later on and examined the moderation of this effect by personal characteristics that contribute to identity-threat appraisals. In Study 3 we investigated whether vividly remembering an experience of social identity threat results in risky decision making. Finally, in Study 4 we asked whether coping with threat could directly influence attentional control and whether the effect was implemented by inefficient performance monitoring, as assessed by electroencephalography. Our results indicate that stereotype threat can spill over and impact self-control in a diverse array of nonstereotyped domains. These results reveal the potency of stereotype threat and that its negative consequences might extend further than was previously thought. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

  19. Computer Security of NPP Instrumentation and Control Systems: Cyber Threats

    International Nuclear Information System (INIS)

    Klevtsov, A.L.; Trubchaninov, S.A.

    2015-01-01

    The paper is devoted to cyber threats, as one of the aspects in computer security of instrumentation and control systems for nuclear power plants (NPP). The basic concepts, terms and definitions are shortly addressed. The paper presents a detailed analysis of potential cyber threats during the design and operation of NPP instrumentation and control systems. Eleven major types of threats are considered, including: the malicious software and hardware Trojans (in particular, in commercial-off-the-shelf software and hardware), computer attacks through data networks and intrusion of malicious software from an external storage media and portable devices. Particular attention is paid to the potential use of lower safety class software as a way of harmful effects (including the intrusion of malicious fragments of code) on higher safety class software. The examples of actual incidents at various nuclear facilities caused by intentional cyber attacks or unintentional computer errors during the operation of software of systems important to NPP safety.

  20. Balance assessment during squatting exercise: A comparison between laboratory grade force plate and a commercial, low-cost device.

    Science.gov (United States)

    Mengarelli, Alessandro; Verdini, Federica; Cardarelli, Stefano; Di Nardo, Francesco; Burattini, Laura; Fioretti, Sandro

    2018-04-11

    Testing balance through squatting exercise is a central part of many rehabilitation programs and sports and plays also an important role in clinical evaluation of residual motor ability. The assessment of center of pressure (CoP) displacement and its parametrization is commonly used to describe and analyze squat movement and the laboratory-grade force plates (FP) are the gold standard for measuring balance performances from a dynamic view-point. However, the Nintendo Wii Balance Board (NWBB) has been recently proposed as an inexpensive and easily available device for measuring ground reaction force and CoP displacement in standing balance tasks. Thus, this study aimed to compare the NWBB-CoP data with those obtained from a laboratory FP during a dynamic motor task, such as the squat task. CoP data of forty-eight subjects were acquired simultaneously from a NWBB and a FP and the analyses were performed over the descending squatting phase. Outcomes showed a very high correlation (r) and limited root-mean-square differences between CoP trajectories in anterior-posterior (r > 0.99, 1.63 ± 1.27 mm) and medial-lateral (r > 0.98, 1.01 ± 0.75 mm) direction. Spatial parameters computed from CoP displacement and ground reaction force peak presented fixed biases between NWBB and FP. Errors showed a high consistency (standard deviation < 2.4% of the FP outcomes) and a random spread distribution around the mean difference. Mean velocity is the only parameter which exhibited a tendency towards proportional values. Findings of this study suggested the NWBB as a valid device for the assessment and parametrization of CoP displacement during squatting movement. Copyright © 2018 Elsevier Ltd. All rights reserved.

  1. Using a Mobile Device “App” and Proximal Remote Sensing Technologies to Assess Soil Cover Fractions on Agricultural Fields

    Directory of Open Access Journals (Sweden)

    Ahmed Laamrani

    2018-02-01

    Full Text Available Quantifying the amount of crop residue left in the field after harvest is a key issue for sustainability. Conventional assessment approaches (e.g., line-transect are labor intensive, time-consuming and costly. Many proximal remote sensing devices and systems have been developed for agricultural applications such as cover crop and residue mapping. For instance, current mobile devices (smartphones & tablets are usually equipped with digital cameras and global positioning systems and use applications (apps for in-field data collection and analysis. In this study, we assess the feasibility and strength of a mobile device app developed to estimate crop residue cover. The performance of this novel technique (from here on referred to as “app” method was compared against two point counting approaches: an established digital photograph-grid method and a new automated residue counting script developed in MATLAB at the University of Guelph. Both photograph-grid and script methods were used to count residue under 100 grid points. Residue percent cover was estimated using the app, script and photograph-grid methods on 54 vertical digital photographs (images of the ground taken from above at a height of 1.5 m collected from eighteen fields (9 corn and 9 soybean, 3 samples each located in southern Ontario. Results showed that residue estimates from the app method were in good agreement with those obtained from both photograph–grid and script methods (R2 = 0.86 and 0.84, respectively. This study has found that the app underestimates the residue coverage by −6.3% and −10.8% when compared to the photograph-grid and script methods, respectively. With regards to residue type, soybean has a slightly lower bias than corn (i.e., −5.3% vs. −7.4%. For photos with residue <30%, the app derived residue measurements are within ±5% difference (bias of both photograph-grid- and script-derived residue measurements. These methods could therefore be used to track

  2. Using a Mobile Device "App" and Proximal Remote Sensing Technologies to Assess Soil Cover Fractions on Agricultural Fields.

    Science.gov (United States)

    Laamrani, Ahmed; Pardo Lara, Renato; Berg, Aaron A; Branson, Dave; Joosse, Pamela

    2018-02-27

    Quantifying the amount of crop residue left in the field after harvest is a key issue for sustainability. Conventional assessment approaches (e.g., line-transect) are labor intensive, time-consuming and costly. Many proximal remote sensing devices and systems have been developed for agricultural applications such as cover crop and residue mapping. For instance, current mobile devices (smartphones & tablets) are usually equipped with digital cameras and global positioning systems and use applications (apps) for in-field data collection and analysis. In this study, we assess the feasibility and strength of a mobile device app developed to estimate crop residue cover. The performance of this novel technique (from here on referred to as "app" method) was compared against two point counting approaches: an established digital photograph-grid method and a new automated residue counting script developed in MATLAB at the University of Guelph. Both photograph-grid and script methods were used to count residue under 100 grid points. Residue percent cover was estimated using the app, script and photograph-grid methods on 54 vertical digital photographs (images of the ground taken from above at a height of 1.5 m) collected from eighteen fields (9 corn and 9 soybean, 3 samples each) located in southern Ontario. Results showed that residue estimates from the app method were in good agreement with those obtained from both photograph-grid and script methods (R² = 0.86 and 0.84, respectively). This study has found that the app underestimates the residue coverage by -6.3% and -10.8% when compared to the photograph-grid and script methods, respectively. With regards to residue type, soybean has a slightly lower bias than corn (i.e., -5.3% vs. -7.4%). For photos with residue <30%, the app derived residue measurements are within ±5% difference (bias) of both photograph-grid- and script-derived residue measurements. These methods could therefore be used to track the recommended minimum

  3. In situ exposure assessment of intermediate frequency fields of diverse devices

    International Nuclear Information System (INIS)

    Van Den Bossche, Matthias; Verloock, Leen; Aerts, Sam; Joseph, Wout; Martens, Luc

    2015-01-01

    In this study, in situ exposure assessment of both electric and magnetic fields of different intermediate frequency (IF) sources is investigated. The authors investigated smart boards and touch-screens, energy-saving bulbs, fluorescent lamps, a portable hearing unit and an electro-surgical unit (ESU). For most of these sources, the electric field is the dominating quantity. International Commission on Non-Ionizing Radiation Protection reference levels are exceeded for touch-screens (44 kHz: up to 155.7 V m -1 at 5 cm), energy-saving bulbs (38-52 kHz: up to 117.3 V m -1 ), fluorescent lamps (52 kHz: up to 471 V m -1 at 5 cm) and ESUs (up to 920 kHz: 792 V m -1 at 0.5 cm). Magnetic field strengths up to 1.8 and 10.5 A m -1 were measured close to the ESU and portable hearing unit (69 V m -1 ), respectively. Large differences of measured field values exist among the various operating modes of the IF equipment. Compliance distances for general public range from 15.3 cm (touch-screen) to 25 cm (fluorescent lamps). (authors)

  4. Defeating Improvised Explosive Devices (IED): Asymmetric Threats and Capability Gaps

    Science.gov (United States)

    2011-03-23

    City, Oklahoma bombings in 1995. In order to adapt and avoid detection, terrorists are exploring other options, such as using potassium chlorate ...white, odorless powder) or sodium chlorate (yellow, odorless powder) when making IEDs. High-profile, historic examples include the London attacks...and potassium nitrate. It is the main ingredient found in fireworks. In the past it was used as a propellant powder in ammunition, http

  5. Maritime Improvised Explosive Devices: A Threat Based Technology Study

    Science.gov (United States)

    2015-06-12

    id/3078682/ns/technology_and_science- science/t/dolphins-go-front-lines-iraq-war/#.VPsmDZU5DIV. Carnegie , Dale , and Rita Kiley. 1948. How to Stop...Besides, if I let those things get me, I wouldn’t last long. ( Carnegie and Kiley 1948, 6) ― Admiral Ernest J. King Admiral King’s focus on

  6. Insider Threats: DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

    Science.gov (United States)

    2015-06-01

    2011). Insiders have an advantage over others who may want to harm an organization because insiders may have an awareness of their...process currently includes threat assessments, a risk-indicator matrix , and a risk assessment to prompt organizations to consider threats and risk to...is to oversee departmental capabilities and resources to counter insider threats, and make recommendations on program improvements and resources

  7. Practical Field Survey Approach with Handle Device for Lead Contamination Assessment in Kabwe, Zambia

    Science.gov (United States)

    Nakamura, S.; Hirose, K.; Takeda, T.; Uchida, Y.; Nakata, H.; Nakayama, S.; Ishizuka, M.; Yabe, J.; Ito, M.; Igarashi, T.

    2017-12-01

    International joint research project for assessing lead soil contamination in Kabwe, Zambia was started by Zambian and Japanese scientists in 2008. Various scientific data and results have been obtained up to now. Data sharing among researchers and government officials is necessary for understanding current situation of lead contamination in Kabwe comprehensively. As lead contamination affects on local communities seriously, local community participation is important to solve the environmental issue in near future. This study, therefore, aims to develop GIS Data Integration System (GDIS as followed) consisted of GIS Data Sharing System (GDSS as followed) as web-GIS, FIELDNAUT as Android App for field survey and opensource SNS instance named Mastodon. GDIS will provide local communities to participate easily and support researchers to collect and understand about everyday situation and visualize lead contamination status in Kabwe, Zambia. GDIS is developed with opensource programs. GDSS was simply designed and developed on one desktop PC (Hirose et al., 2015) although common web-GIS requires many servers (Suresh et al., 2015). FIELDNAUT was developed in 2016. FIELDNAUT provides researchers plotting their locations on satellite images and thematic maps, filming and texting with their locations, and compiling and sharing data through GDSS. Mastodon will be used as a new FIELDNAUT communication function between local communities and researchers. It is an independent SNS instance, and the closed and secure communication system will be able to be developed. With this function, local communities will share photos and texts about their daily lives and situation around Kabwe by FIELDNAUT, and those data will be collected into GDSS. Researchers provide their results as hazard maps to local communities through FIELDNAUT. GDIS consisted of GDSS, FIELDNAUT and Mastodon encourages local community participation and let local communities be interested in their environmental issues

  8. The population threat.

    Science.gov (United States)

    Teitelbaum, M S

    1992-01-01

    Commentary is provided on the challenges faced by the new Clinton administration in formulating US key foreign policy initiatives. There is an urgent need to provide balanced and effective foreign aid for reducing high fertility rates in the developing world. There is also a need to effectively monitor the large migrations of populations. Over the past 10 years, the US has not been actively practicing world leadership on population issues. 3 changes in 1993 give impetus to redirect foreign policy: 1) the waning influence of fringe groups who controlled population issues; 2) the campaign promises to restore UN population stabilization programs; and 3) the evidence from the Persian Gulf and Yugoslavia that demographic issues require planning and assessment. Global population growth has been concentrated in the past 40 years, in part due to mortality declines and sustained high fertility. Of significance is the rapidness and momentum of growth. A high percentage are and will be children. Urban population is also growing rapidly in high fertility countries. Countries with high fertility and significant rural-to-urban migration also have large international migrations. The evolution of policy since the 1950s, which for the most part ignored population issues, is discussed. The American debates have been charged with emotionalism: about human sexuality, legitimacy of voluntary fertility control, the role and status of women and men, abortion, intergenerational transfer of obligations, ethnic solidarity and the sovereignty of national borders, and the proper roles of the state versus the marketplace. There have been over 200 years of ideological argument over population issues. The Malthusian argument was that large population size did not increase prosperity, and growth should be limited. The Marxist-Leninist position was that contraception was Malthusian, abortion was a woman's right, and population growth was neutral. By late 1970 the Chinese Maoists adopted the moral

  9. Understanding Cyber Threats and Vulnerabilities

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2012-01-01

    This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was first coined during the 1980s. Being the

  10. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  11. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  12. Threat from Emerging Vectorborne Viruses

    Centers for Disease Control (CDC) Podcasts

    2016-06-09

    Reginald Tucker reads an abridged version of the commentary by CDC author Ronald Rosenberg, Threat from Emerging Vectorborne Viruses.  Created: 6/9/2016 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 6/9/2016.

  13. The threat of soil salinity

    NARCIS (Netherlands)

    Daliakopoulos, I.N.; Tsanis, I.K.; Koutroulis, A.; Kourgialas, N.N.; Varouchakis, A.E.; Karatzas, G.P.; Ritsema, C.J.

    2016-01-01

    Soil salinisation is one of the major soil degradation threats occurring in Europe. The effects of salinisation can be observed in numerous vital ecological and non-ecological soil functions. Drivers of salinisation can be detected both in the natural and man-made environment, with climate and

  14. Insider Threat Security Reference Architecture

    Science.gov (United States)

    2012-04-01

    this challenge. CMU/SEI-2012-TR-007 | 2 2 The Components of the ITSRA Figure 2 shows the four layers of the ITSRA. The Business Security layer......organizations improve their level of preparedness to address the insider threat. Business Security Architecture Data Security Architecture

  15. Bomb Threats Taking Financial Toll

    Science.gov (United States)

    Bowman, Darcia Harris

    2004-01-01

    Despite all its efforts to crack down on the bomb scares that disrupted classes again and again in 2003, North Carolina's Orange County district fell victim to yet another false alarm this school year, 2004. For some schools, bomb threats have become more routine than fire drills, with each incident ringing up multi-thousand-dollar tabs for…

  16. Barrage balloons against aircraft threat: A well proven concept revisited

    International Nuclear Information System (INIS)

    Petrangeli, Gianni

    2010-01-01

    Since the event of September 11, 2001 in New York City, many people started to speculate that the same type of attack could in future be brought against other installations. Indeed, the U.S. Nuclear Regulatory Commission decided to require for future plants to assess their resistance to the impact of a large civil airliner. Nuclear plant control authorities of other countries decided in a similar direction. The solutions to the technical problem is usually pursued in the direction of a reinforcement of external plant structures and, in some case, they may not be sufficient. Other solutions of more psychological nature have also been adopted. This paper aims at the demonstration that the use of barrage balloons, already adopted with success in both World Wars and also occasionally after these events, can afford a satisfactory solution to the protection problem at a reasonable cost. This solution is also applicable to existing plants. The history of barrage balloons is summarized. Modern technology offers electronic devices capable to detect in time an approaching threat and the paper describes a new barrage system based also on such new possibilities. If the aircraft crash problem is a real one or not for the next years, nobody knows for sure; however some considerations should be kept in mind: ·The fact that an accident of this kind 'anywhere' is an accident 'everywhere' as usual; ·The extremely uncertain political outlook worldwide, the peculiarities of the oil market and the possible nuclear renaissance.

  17. Classification of buildings mold threat using electronic nose

    Science.gov (United States)

    Łagód, Grzegorz; Suchorab, Zbigniew; Guz, Łukasz; Sobczuk, Henryk

    2017-07-01

    Mold is considered to be one of the most important features of Sick Building Syndrome and is an important problem in current building industry. In many cases it is caused by the rising moisture of building envelopes surface and exaggerated humidity of indoor air. Concerning historical buildings it is mostly caused by outdated raising techniques among that is absence of horizontal isolation against moisture and hygroscopic materials applied for construction. Recent buildings also suffer problem of mold risk which is caused in many cases by hermetization leading to improper performance of gravitational ventilation systems that make suitable conditions for mold development. Basing on our research there is proposed a method of buildings mold threat classification using electronic nose, based on a gas sensors array which consists of MOS sensors (metal oxide semiconductor). Used device is frequently applied for air quality assessment in environmental engineering branches. Presented results show the interpretation of e-nose readouts of indoor air sampled in rooms threatened with mold development in comparison with clean reference rooms and synthetic air. Obtained multivariate data were processed, visualized and classified using a PCA (Principal Component Analysis) and ANN (Artificial Neural Network) methods. Described investigation confirmed that electronic nose - gas sensors array supported with data processing enables to classify air samples taken from different rooms affected with mold.

  18. The evaluation of family functioning by the family assessment device: a systematic review of studies in adult clinical populations.

    Science.gov (United States)

    Staccini, Laura; Tomba, Elena; Grandi, Silvana; Keitner, Gabor I

    2015-03-01

    A large body of research, documenting the impact of a family's functioning on health outcomes, highlights the importance of introducing the evaluation of patients' family dynamics into clinical judgment. The Family Assessment Device (FAD) is a self-report questionnaire designed to assess specific dimensions of family functioning. This qualitative systematic review, which follows PRISMA guidelines, aimed to identify the FAD's clinimetric properties and to report the incremental utility of its inclusion in clinical settings. A thorough literature search was performed, using both computerized and manual searches, yielding a total of 148 studies that were included in this review. The FAD has been extensively used in a variety of research contexts. In the majority of studies it was able to discriminate between clinical populations and controls and among groups of patients with different illnesses. The FAD also showed good test-retest and concurrent reliability, and modest sensitivity to change after treatment. FAD-dysfunctional family functioning was related to several patient clinical outcomes, including lower recovery rates and adherence to treatment, longer recovery time, poorer quality of life, and increased risk of relapse and drop-out. The present review demonstrates that the FAD is a suitable instrument for the evaluation of family functioning both in clinical and research settings. © 2014 Family Process Institute.

  19. Prevention and preparedness for response to nuclear and radiological threats

    International Nuclear Information System (INIS)

    Pradeepkumar, K.S.

    2016-01-01

    Challenges from smuggled or illegally transported radioactive sources with malevolent intention of causing potential threats to the society are much higher to those potential radiological emergencies from misplaced, orphan or lost radioactive sources. Large number of radioactive sources world over is transported for its application in various fields. The emergency preparedness and response system is less developed for potential radiological emergencies caused by them compared to those at nuclear facilities which are kept in readiness to respond to any kind of emergency. After the terrorist attack on WTC of 2001, there is significant concern world over about the malicious use of nuclear and other radioactive material. This calls for prevention of stealing/smuggling of radioactive materials and improving the emergency response system. Use of Radiological Dispersal Device (RDD) and Improvised Nuclear Device (IND) are considered as possible radiological and nuclear threats, can lead to large area contamination in addition to the injuries caused by blast and thermal effects. (author)

  20. EMP Threats to US National Security: Congressional Responses

    Science.gov (United States)

    Huessy, Peter

    2011-04-01

    The US Congress is considering how best to respond to concerns that EMP is a real and present danger to US security. The threats come from a variety of areas: solar storms, non-nuclear EMP from man-made machines and devices; and nuclear EMP from a nuclear device exploded above CONUS or other critical areas important to the United States and its allies. Responses have to date included passage in the House of legislation to protect the electrical grid in the United States from such threats and hearings before the Homeland Security Committee. Additional efforts include examining missile defense responses, protection of the maritime domain, and hardening of US military and related civilian infrastructure. The House of Representatives has also examined what Europe, the European Union and NATO, both government and private industry, have done in these areas. Complicating matters are related issues of cyber-security and overall homeland security priorities.

  1. Enduring somatic threat perceptions and post-traumatic stress disorder symptoms in survivors of cardiac events.

    Science.gov (United States)

    Meli, Laura; Alcántara, Carmela; Sumner, Jennifer A; Swan, Brendan; Chang, Bernard P; Edmondson, Donald

    2017-04-01

    Post-traumatic stress disorder due to acute cardiovascular events may be uniquely defined by enduring perceptions of somatic threat. We tested whether post-traumatic stress disorder at 1 month post-acute coronary syndrome indeed required both high peritraumatic threat during the acute coronary syndrome and ongoing cardiac threat perceptions. We assessed peritraumatic threat during emergency department enrollment of 284 patients with a provisional acute coronary syndrome diagnosis and cardiac threat perceptions and post-traumatic stress disorder symptoms 1 month post-discharge. In a multiple regression model with adjustment for important covariates, emergency department threat perceptions were associated with higher 1 month post-traumatic stress disorder symptoms only among those with high levels of ongoing cardiac threat.

  2. Automatic Prostate Tracking and Motion Assessment in Volumetric Modulated Arc Therapy With an Electronic Portal Imaging Device

    International Nuclear Information System (INIS)

    Azcona, Juan Diego; Li, Ruijiang; Mok, Edward; Hancock, Steven; Xing, Lei

    2013-01-01

    Purpose: To assess the prostate intrafraction motion in volumetric modulated arc therapy treatments using cine megavoltage (MV) images acquired with an electronic portal imaging device (EPID). Methods and Materials: Ten prostate cancer patients were treated with volumetric modulated arc therapy using a Varian TrueBeam linear accelerator equipped with an EPID for acquiring cine MV images during treatment. Cine MV images acquisition was scheduled for single or multiple treatment fractions (between 1 and 8). A novel automatic fiducial detection algorithm that can handle irregular multileaf collimator apertures, field edges, fast leaf and gantry movement, and MV image noise and artifacts in patient anatomy was used. All sets of images (approximately 25,000 images in total) were analyzed to measure the positioning accuracy of implanted fiducial markers and assess the prostate movement. Results: Prostate motion can vary greatly in magnitude among different patients. Different motion patterns were identified, showing its unpredictability. The mean displacement and standard deviation of the intrafraction motion was generally less than 2.0 ± 2.0 mm in each of the spatial directions. In certain patients, however, the percentage of the treatment time in which the prostate is displaced more than 5 mm from its planned position in at least 1 spatial direction was 10% or more. The maximum prostate displacement observed was 13.3 mm. Conclusion: Prostate tracking and motion assessment was performed with MV imaging and an EPID. The amount of prostate motion observed suggests that patients will benefit from its real-time monitoring. Megavoltage imaging can provide the basis for real-time prostate tracking using conventional linear accelerators

  3. Preoperative headband assessment for semi-implantable bone conduction hearing devices in conductive hearing loss: is it useful or misleading?

    Science.gov (United States)

    Rainsbury, James W; Williams, Blair A; Gulliver, Mark; Morris, David P

    2015-02-01

    To establish whether preoperative assessment using a conventional, percutaneous bone conducting implant (pBCI) processor on a headband accurately represents postoperative performance of a semi-implantable BCI (siBCI). Retrospective case series. Tertiary otology unit. Five patients with chronic otitis media (implanted unilaterally) and one with bilateral congenital ossicular fixation (implanted bilaterally). Semi-implantable bone conduction hearing implant. Functional hearing gain; preoperative (headband) versus postoperative (aided) speech discrimination; unaided bone conduction (BC) versus postoperative (aided) soundfield threshold. Significant functional gain was seen at all frequencies (one-tailed t test p G 0.01; n = 7). There was a 50 dB improvement in median speech reception threshold (SRT) from 70 dB unaided to 20 dB aided. Compared to the preoperative BC, aided siBCI thresholds were worse at 0.5 kHz, but at frequencies from 1 to 6 kHz, the siBCI closely matched the bone curve ( p G 0.01). The siBCI performed better than both pBCI processors on a headband at 3 to 4 kHz, except 1 kHz ( p G 0.01). BC thresholds may be a better indicator of implant performance than headband assessment. Candidacy assessment for siBCI implantation that relies on headband testing with pBCI processors should be interpreted with caution because the headband may under-represent the implanted device. This seems to be especially true at 3 kHz and above and may make it difficult for surgeons to conduct accurate informed consent discussions with patients about the realistic anticipated outcomes and benefits of the procedure.

  4. Does Stereotype Threat Affect Women in Academic Medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-01-01

    Multiple complex factors contribute to the slow pace of women’s advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including: (1) introducing the concept of stereotype threat to the academic medicine community; (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias; (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders; (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards; and (5) building leadership efficacy among female physicians and scientists. PMID:22361794

  5. Does stereotype threat affect women in academic medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists.

  6. Combining multi-criteria decision analysis and mini-health technology assessment: A funding decision-support tool for medical devices in a university hospital setting.

    Science.gov (United States)

    Martelli, Nicolas; Hansen, Paul; van den Brink, Hélène; Boudard, Aurélie; Cordonnier, Anne-Laure; Devaux, Capucine; Pineau, Judith; Prognon, Patrice; Borget, Isabelle

    2016-02-01

    At the hospital level, decisions about purchasing new and oftentimes expensive medical devices must take into account multiple criteria simultaneously. Multi-criteria decision analysis (MCDA) is increasingly used for health technology assessment (HTA). One of the most successful hospital-based HTA approaches is mini-HTA, of which a notable example is the Matrix4value model. To develop a funding decision-support tool combining MCDA and mini-HTA, based on Matrix4value, suitable for medical devices for individual patient use in French university hospitals - known as the IDA tool, short for 'innovative device assessment'. Criteria for assessing medical devices were identified from a literature review and a survey of 18 French university hospitals. Weights for the criteria, representing their relative importance, were derived from a survey of 25 members of a medical devices committee using an elicitation technique involving pairwise comparisons. As a test of its usefulness, the IDA tool was applied to two new drug-eluting beads (DEBs) for transcatheter arterial chemoembolization. The IDA tool comprises five criteria and weights for each of two over-arching categories: risk and value. The tool revealed that the two new DEBs conferred no additional value relative to DEBs currently available. Feedback from participating decision-makers about the IDA tool was very positive. The tool could help to promote a more structured and transparent approach to HTA decision-making in French university hospitals. Copyright © 2015 Elsevier Inc. All rights reserved.

  7. Mobile device security for dummies

    CERN Document Server

    Campagna, Rich; Krishnan, Ashwin

    2011-01-01

    The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate informati

  8. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  9. Military Expenditure, Threats, and Growth

    OpenAIRE

    Aizenman, Joshua; Glick, Reuven

    2003-01-01

    This paper clarifies one of the puzzling results of the economic growth literature: the impact of military expenditure is frequently found to be non-significant or negative, yet most countries spend a large fraction of their GDP on defense and the military. We start by empirical evaluation of the non- linear interactions between military expenditure, external threats, corruption, and other relevant controls. While growth falls with higher levels of military spending, given the values of the o...

  10. Implantable loop recorders for assessment of syncope: increased diagnostic yield and less adverse outcomes with the latest generation devices.

    Science.gov (United States)

    Bartoletti, A; Bocconcelli, P; De Santo, T; Ghidini Ottonelli, A; Giuli, S; Massa, R; Svetlich, C; Tarsi, G; Corbucci, G; Tronconi, F; Vitale, E

    2013-08-01

    Aim of the study was to compare the diagnostic yield of implantable loop recorders (ILR) of two successive generations for the assessment of syncope. Data on patients who had undergone ILR implantation for unexplained syncope in four Italian public hospitals were retrospectively acquired from the Medtronic Clinical Service database. After implantation, routine follow-up examinations were performed every 90 days, while urgent examinations were carried out in the event of syncope recurrence. The following findings were regarded as diagnostic: ECG documentation of a syncope recurrence; documentation of any of the arrhythmias listed by the current guidelines as diagnostic findings even if asymptomatic. Between November 2002 and March 2010, 107 patients received an ILR (40 Medtronic Reveal® Plus; 67 Medtronic Reveal® DX/XT) and underwent at least one follow-up examination. Diagnoses were made in 7 (17.5%) and 24 (35.8%) (P=0.043) patients, with a median time of 228 and 65 days, respectively. Three (42.9%) and 21 (87.5%) (P=0.029) diagnoses were based on automatically detected events, while adverse outcomes occurred in 6 and in 1 (P=0.01) patients, respectively. Our results show that the new-generation device offer a higher diagnostic yield, mainly as a result of its improved automatic detection function, and is associated with fewer adverse outcomes.

  11. An autonomous, automated and mobile device to concurrently assess several cognitive functions in group-living non-human primates.

    Science.gov (United States)

    Fizet, Jonas; Rimele, Adam; Pebayle, Thierry; Cassel, Jean-Christophe; Kelche, Christian; Meunier, Hélène

    2017-11-01

    Research methods in cognitive neuroscience using non-human primates have undergone notable changes over the last decades. Recently, several research groups have described freely accessible devices equipped with a touchscreen interface. Two characteristics of such systems are of particular interest: some apparatuses include automated identification of subjects, while others are mobile. Here, we designed, tested and validated an experimental system that, for the first time, combine automatization and mobility. Moreover, our system allows autonomous learning and testing of cognitive performance in group-living subjects, including follow-up assessments. The mobile apparatus is designed to be available 24h a day, 7days a week, in a typical confined primate breeding and housing facility. Here we present as proof of concept, the results of two pilot studies. We report that rhesus macaques (Macaca mulatta) learned the tasks rapidly and achieved high-level of stable performance. Approaches of this kind should be developed for future pharmacological and biomedical studies in non-human primates. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. FDTD assessment of human exposure to electromagnetic fields from WiFi and bluetooth devices in some operating situations.

    Science.gov (United States)

    Martínez-Búrdalo, M; Martín, A; Sanchis, A; Villar, R

    2009-02-01

    In this work, the numerical dosimetry in human exposure to the electromagnetic fields from antennas of wireless devices, such as those of wireless local area networks (WLAN) access points or phone and computer peripherals with Bluetooth antennas, is analyzed with the objective of assessing guidelines compliance. Several geometrical configurations are considered to simulate possible exposure situations of a person to the fields from WLAN or Bluetooth antennas operating at 2400 MHz. The exposure to radiation from two sources of different frequencies when using a 1800 MHz GSM mobile phone connected via Bluetooth with a hands-free car kit is also considered. The finite-difference time-domain (FDTD) method is used to calculate electric and magnetic field values in the vicinity of the antennas and specific absorption rates (SAR) in a high-resolution model of the human head and torso, to be compared with the limits from the guidelines (reference levels and basic restrictions, respectively). Results show that the exposure levels in worst-case situations studied are lower than those obtained when analyzing the exposure to mobile phones, as could be expected because of the low power of the signals and the distance between the human and the antennas, with both field and SAR values being far below the limits established by the guidelines, even when considering the combined exposure to both a GSM and a Bluetooth antenna. Copyright 2008 Wiley-Liss, Inc.

  13. Health Technology Assessment for Molecular Diagnostics: Practices, Challenges, and Recommendations from the Medical Devices and Diagnostics Special Interest Group.

    Science.gov (United States)

    Garfield, Susan; Polisena, Julie; S Spinner, Daryl; Postulka, Anne; Y Lu, Christine; Tiwana, Simrandeep K; Faulkner, Eric; Poulios, Nick; Zah, Vladimir; Longacre, Michael

    2016-01-01

    Health technology assessments (HTAs) are increasingly used to inform coverage, access, and utilization of medical technologies including molecular diagnostics (MDx). Although MDx are used to screen patients and inform disease management and treatment decisions, there is no uniform approach to their evaluation by HTA organizations. The International Society for Pharmacoeconomics and Outcomes Research Devices and Diagnostics Special Interest Group reviewed diagnostic-specific HTA programs and identified elements representing common and best practices. MDx-specific HTA programs in Europe, Australia, and North America were characterized by methodology, evaluation framework, and impact. Published MDx HTAs were reviewed, and five representative case studies of test evaluations were developed: United Kingdom (National Institute for Health and Care Excellence's Diagnostics Assessment Programme, epidermal growth factor receptor tyrosine kinase mutation), United States (Palmetto's Molecular Diagnostic Services Program, OncotypeDx prostate cancer test), Germany (Institute for Quality and Efficiency in Healthcare, human papillomavirus testing), Australia (Medical Services Advisory Committee, anaplastic lymphoma kinase testing for non-small cell lung cancer), and Canada (Canadian Agency for Drugs and Technologies in Health, Rapid Response: Non-invasive Prenatal Testing). Overall, the few HTA programs that have MDx-specific methods do not provide clear parameters of acceptability related to clinical and analytic performance, clinical utility, and economic impact. The case studies highlight similarities and differences in evaluation approaches across HTAs in the performance metrics used (analytic and clinical validity, clinical utility), evidence requirements, and how value is measured. Not all HTAs are directly linked to reimbursement outcomes. To improve MDx HTAs, organizations should provide greater transparency, better communication and collaboration between industry and HTA

  14. Autobiographical memory sources of threats in dreams.

    Science.gov (United States)

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  15. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  16. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  17. Cybersecurity for Connected Diabetes Devices.

    Science.gov (United States)

    Klonoff, David C

    2015-04-16

    Diabetes devices are increasingly connected wirelessly to each other and to data-displaying reader devices. Threats to the accurate flow of information and commands may compromise the function of these devices and put their users at risk of health complications. Sound cybersecurity of connected diabetes devices is necessary to maintain confidentiality, integrity, and availability of the data and commands. Diabetes devices can be hacked by unauthorized agents and also by patients themselves to extract data that are not automatically provided by product software. Unauthorized access to connected diabetes devices has been simulated and could happen in reality. A cybersecurity standard designed specifically for connected diabetes devices will improve the safety of these products and increase confidence of users that the products will be secure. © 2015 Diabetes Technology Society.

  18. Applying extender devices in patients with penile dysmorphophobia: assessment of tolerability, efficacy, and impact on erectile function.

    Science.gov (United States)

    Nowroozi, Mohammad Reza; Amini, Erfan; Ayati, Mohsen; Jamshidian, Hassan; Radkhah, Kayvan; Amini, Shahab

    2015-05-01

    Most men seeking penile enhancement techniques have a normal penile size. They are either misinformed or suffer from penile dysmorphophobia and should be discouraged from undergoing invasive procedures. Less invasive techniques including penile extenders are not associated with major complications and may be beneficial from a psychological perspective. We conducted this study to assess the efficacy and safety of AndroPenis (Andromedical, Madrid, Spain) penile extender. Between December 2010 and December 2013, 163 men presented to our institution complaining of small penile length and/or girth. All patients received structured psychosexual counseling. Fifty-four patients were willing to use the AndroPenis penile extender after counseling. Patients with major psychiatric disorders were excluded from enrollment. The patients were instructed to wear the device between 4 and 6 hours per day for 6 months. Penile dimensions including flaccid stretched and erected lengths were measured at baseline and after 1, 3, 6, and 9 months. Erectile function was assessed at baseline and 9 months after treatment using the simplified International Index of Erectile Function (IIEF-5). An institutional nonstandardized questionnaire was used to evaluate patient satisfaction at the end of study. Penile length and girth enhancement as well as satisfaction rate and improvement in erectile function were assessed during follow-up. At 6-month follow-up, a mean gain of 1.7 ± 0.8, 1.3 ± 0.4, and 1.2 ± 0.4 cm was noted for the flaccid, stretched, and erected penile lengths, respectively (all P values < 0.001). During the off treatment period, there were no significant changes in penile lengths. No effect on penile girth was observed. Patient satisfaction survey revealed modest satisfaction. From 13 patients with mild baseline erectile dysfunction, nine patients reported normal erectile function after 9 months. Penile extender as a minimally invasive technique is safe and

  19. Use of a mobile device by nursing home residents for long-term care comprehensive geriatric self-assessment: a feasibility study.

    Science.gov (United States)

    Huang, Fanpin; Chang, Polun; Hou, I-Ching; Tu, Ming-Hsiang; Lan, Chung-Fu

    2015-01-01

    Long-term-care comprehensive geriatric assessments, such as the Minimum Data Set 3.0, are used to evaluate the clinical, psychological, and personal status of residents in long-term-care nursing facilities. Nursing staff conducts assessment interviews, thereby increasing the workload of nurses and the cost of patient care. This study explored the ability of nursing home residents to use two different mobile devices for a geriatric self-assessment. Study participants were residents of long-term-care nursing homes. A modified Minimum Data Set 3.0 was converted to a format for use with a 6-inch mobile pad and a 3.7-inch mobile smartphone. The survey completion rate and the response time were measured. A Technology Assessment Model questionnaire analyzed the participants' experience. All participants were able to use a 6-inch pad, with an average completion rate of 92.9% and an average time for completion of 21 minutes. Only 20% of the participants could complete the assessment with the 3.7-inch smartphone. The participants found the 6-inch pad easier to use than the 3.7-inch smartphone. This exploratory study suggests that nursing home residents are able to use a mobile device to perform a geriatric self-assessment and delineates the importance of the ergonomics of the device.

  20. Weapons of mass destruction - current security threat

    International Nuclear Information System (INIS)

    Durdiak, J.; Gafrik, A.; Pulis, P.; Susko, M.

    2005-01-01

    This publication brings a complex and comprehensive view of the weapons of mass destruction phenomenon in the context of present military and political situation. It emphasizes the threat posed by proliferation of these destructive devices and their carriers as well as the threat present in their possession by unpredictable totalitarian regimes or terrorist groups. The publication is structured into four basic parts: Introduction Into The Topic, Nuclear Weapons, Chemical Weapons and Biological Weapons. The Introduction reflects the latest developments on the field of military technologies, which lead to the development of new destructive devices with characteristics comparable to basic types of WMDs - nuclear, chemical and biological. Based on the definition of WMD as 'weapon systems with enormous impact causing mass destruction, population, equipment and material losses', the modern mass destruction devices are assorted here, such as ecological, radiological and beam weapons, aerosol and container intelligent ammunition, the outburst of dangerous chemical substances from infrastructure, non-conventional weapons and military devices. The Nuclear Weapons part depicts the most destructive device of mass destruction mankind ever invented in close detail. It maps the history of most significant discoveries in nuclear physics, development and construction of the first nuclear weapons, accumulation of nuclear warheads and their carriers in the Cold war era, attempts of nuclear disarmament and reducing the number of nuclear weapons in possession of superpowers and their proliferation in the world's crisis regions including North Korea and Iran. The chapters devoted to theoretical grounds and physical principles of nuclear and thermonuclear weapons' functioning, the main categories and types, as well as destructive effects and consequences of use contain an adequate mathematical apparatus. This chapter's conclusion brings the overview of nuclear armament of states that

  1. A reanalysis of the Cu-7 intrauterine contraceptive device clinical trial and the incidence of pelvic inflammatory disease: a paradigm for assessing intrauterine contraceptive device safety.

    Science.gov (United States)

    Roy, S; Azen, C

    1994-06-01

    We calculated and compared the incidence of pelvic inflammatory disease in a 10% random sample of the Cu-7 intrauterine contraceptive device (G.D. Searle & Co., Skokie, Ill.) clinical trial with the rates reported to the Food and Drug Administration and those in subsequent trials published in the world literature. A 10% random sample of the Cu-7 clinical trial was examined because calculations had demonstrated this random sample to be sufficient in size (n = 1614) to detect a difference in rates of pelvic inflammatory disease from those reported to the Food and Drug Administration. An audit of a subset of the patient files, compared with the original files in Skokie, Illinois, confirmed that the files available for analysis were complete. Standard definitions were used to identify cases of pelvic inflammatory disease and to calculate rates of pelvic inflammatory disease. The world literature on Cu-7 clinical trials was reviewed. The calculated crude and Pearl index rates of pelvic inflammatory disease were consistent with those rates previously reported to the Food and Drug Administration and published in the medical literature. Life-table pelvic inflammatory disease rates were not different between nulliparous and parous women and pelvic inflammatory disease did not differ from basal annual rates in fecund women. On the basis of the analysis of this 10% sample, the pelvic inflammatory disease patient rates reported to the Food and Drug Administration for the entire Cu-7 clinical trial are accurate and are similar to those published in the world literature.

  2. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  3. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    26 Threat Detection and Mitigation Strategies...quicker when identifying threats in relevant locations. This task utilized the Flicker paradigm (Rensink, O’Regan, & Clark, 1997; Scholl, 2000...the meaning and implication of threats, why cues were relevant, strategies used to detect and mitigate threats, and challenges when attempting to

  4. The threat of a dirty bomb and possible verification measures

    International Nuclear Information System (INIS)

    Meer, Klaas van der; Hardeman, Frank; Meier, Oliver

    2003-01-01

    The paper discusses technical aspects of the dirty (radiological dispersion) bomb and the threat that this type of bomb poses to societies and international security. Based on the technology and materials needed to construct a dirty bomb, the relevance of the safeguards system for nuclear material accountancy and chemical and biological control systems is discussed. A dirty bomb consists of a conventional explosive charge combined with radioactive material. Its purpose is to contaminate a large area with radioactive material. The main consequences would be loss of life through direct impact and contamination. In comparison with use of nuclear fission devices, the number of direct casualties due to the impact of the explosion are likely to be small. In the long run, there may be casualties due to radioactive contamination, however, probably fewer than is mentioned in public discussions. Other consequences of the use of a radiological device include widespread panic, fear and uncertainty among the public, high decontamination costs, loss of real estate value and disruption of economic activity in the area concerned. If a terrorist is intent on causing maximum havoc and disruption, the radioactive material of choice should have a reasonably long half life. Access should be easy and such material should be available in sufficient quantities. The most obvious candidates from this perspective are 60 Co and 137 Cs and to a lesser extent 90 Sr. Also some more 'exotic' radionuclides or mixtures cannot absolutely be excluded. 60 Co and 137 Cs are frequently used in medical and industrial equipment. There is currently no international material accountancy system for these materials and thousands of sources have been produced in many countries. One or several of these sources contain sufficient material for the construction of an effective 'dirty bomb'. Approximative dispersion calculations will be performed to determine the spread of radioactive material. Dependent on the

  5. Salience of the Nuclear Threat: Operationalization through Spontaneous Concern.

    Science.gov (United States)

    Mayton, Daniel M., II

    An indirect/nonreactive technique of assessing spontaneous concern should be used to examine the salience of the threat of nuclear war. Direct/reactive techniques may produce inconsistent results and inadvertently enhance a false consensus. The procedures for the administration, scoring, and interpretation of a spontaneous concern measure along…

  6. Combating Terrorism: Linking Threats to Strategies and Resources

    National Research Council Canada - National Science Library

    2000-01-01

    ...) gathers intelligence and assesses the threat posed by domestic sources of terrorism. According to the U.S. intelligence community, conventional explosives and firearms continue to be the weapons of choice for terrorists. The intelligence community (both foreign and domestic agencies) reports an increased possibility that terrorists may use CBRN agents in the next decade.

  7. Perceived Threat and Perceived Neglect: Couples' Underlying Concerns during Conflict

    Science.gov (United States)

    Sanford, Keith

    2010-01-01

    The Couples Underlying Concern Inventory assesses 2 fundamental types of distress that couples experience during interpersonal conflict. "Perceived threat" involves a perception that one's partner is blaming and controlling the self. "Perceived neglect" involves a perception that one's partner is failing to make desired contributions or…

  8. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  9. Poster - 46: Intra-fraction tumor position assessment for lung SBRT in patients treated without customized immobilization devices

    Energy Technology Data Exchange (ETDEWEB)

    Alamri, Iqbal; Faria, Sergio; Gluszko, Jessica; Patrocinio, Horacio [McGill University Health Centre (Canada)

    2016-08-15

    Purpose: To assess intra-fraction positional stability of lung cancer tumours in patients treated by kilo-voltage cone-beam computed tomography (CBCT)-guided stereotactic body radiotherapy (SBRT) without the use of customized immobilization devices. Material and Methods: Twenty-two patients underwent 4D-CT in the supine position with the arms in a wing board but without customized immobilization. The PTV was the internal target volume based on maximum intensity projections and a 5mm symmetric setup margin. Treatments were planned using 7–9 static fields or two volumetric modulated arcs. At treatment, the patient position was adjusted using pre-treatment CBCT. A post-treatment CBCT was taken immediately after the treatment ended. The 41 CBCT pairs were automatically matched and the transitional shifts between the two CBCTs recorded. The mean values and standard deviations were calculated for these displacements. Results and conclusions: The mean time between CBCTs (treatment time) was 16.5 ± 6 minutes (range: 10 to 34 minutes). In all cases the tumour remained inside the PTV in the post-treatment CBCT. The mean shifts between pre and post-treatment CBCTs were −0.7 ± 1.6 mm (range −5.0 to 3.0 mm) vertically, −0.3 ± 1.7 mm (range −4.8 to 3.0 mm) longitudinally, and −0.4 ± 1.5 mm (range −4.0 to 2.0 mm) laterally. Our results suggest little systematic shifting during treatment, and standard deviations that are consistent with another published report for treatments where customized immobilization was used. This result is encouraging for SBRT programs in clinics with limited resources.

  10. Poster - 46: Intra-fraction tumor position assessment for lung SBRT in patients treated without customized immobilization devices

    International Nuclear Information System (INIS)

    Alamri, Iqbal; Faria, Sergio; Gluszko, Jessica; Patrocinio, Horacio

    2016-01-01

    Purpose: To assess intra-fraction positional stability of lung cancer tumours in patients treated by kilo-voltage cone-beam computed tomography (CBCT)-guided stereotactic body radiotherapy (SBRT) without the use of customized immobilization devices. Material and Methods: Twenty-two patients underwent 4D-CT in the supine position with the arms in a wing board but without customized immobilization. The PTV was the internal target volume based on maximum intensity projections and a 5mm symmetric setup margin. Treatments were planned using 7–9 static fields or two volumetric modulated arcs. At treatment, the patient position was adjusted using pre-treatment CBCT. A post-treatment CBCT was taken immediately after the treatment ended. The 41 CBCT pairs were automatically matched and the transitional shifts between the two CBCTs recorded. The mean values and standard deviations were calculated for these displacements. Results and conclusions: The mean time between CBCTs (treatment time) was 16.5 ± 6 minutes (range: 10 to 34 minutes). In all cases the tumour remained inside the PTV in the post-treatment CBCT. The mean shifts between pre and post-treatment CBCTs were −0.7 ± 1.6 mm (range −5.0 to 3.0 mm) vertically, −0.3 ± 1.7 mm (range −4.8 to 3.0 mm) longitudinally, and −0.4 ± 1.5 mm (range −4.0 to 2.0 mm) laterally. Our results suggest little systematic shifting during treatment, and standard deviations that are consistent with another published report for treatments where customized immobilization was used. This result is encouraging for SBRT programs in clinics with limited resources.

  11. Interaction of threat and verbal working memory in adolescents.

    Science.gov (United States)

    Patel, Nilam; Vytal, Katherine; Pavletic, Nevia; Stoodley, Catherine; Pine, Daniel S; Grillon, Christian; Ernst, Monique

    2016-04-01

    Threat induces a state of sustained anxiety that can disrupt cognitive processing, and, reciprocally, cognitive processing can modulate an anxiety response to threat. These effects depend on the level of cognitive engagement, which itself varies as a function of task difficulty. In adults, we recently showed that induced anxiety impaired working memory accuracy at low and medium but not high load. Conversely, increasing the task load reduced the physiological correlates of anxiety (anxiety-potentiated startle). The present work examines such threat-cognition interactions as a function of age. We expected threat to more strongly impact working memory in younger individuals by virtue of putatively restricted cognitive resources and weaker emotion regulation. This was tested by examining the influence of age on the interaction of anxiety and working memory in 25 adolescents (10 to 17 years) and 25 adults (22 to 46 years). Working memory load was manipulated using a verbal n-back task. Anxiety was induced using the threat of an aversive loud scream and measured via eyeblink startle. Findings revealed that, in both age groups, accuracy was lower during threat than safe conditions at low and medium but not high load, and reaction times were faster during threat than safe conditions at high load but did not differ at other loads. Additionally, anxiety-potentiated startle was greater during low and medium than high load. Thus, the interactions of anxiety with working memory appear similar in adolescents and adults. Whether these similarities reflect common neural mechanisms would need to be assessed using functional neuroimaging. Published 2015. This article is a U.S. Government work and is in the public domain in the USA.

  12. New threats to academic freedom.

    Science.gov (United States)

    Minerva, Francesca

    2014-05-01

    Using a specific case as an example, the article argues that the Internet allows dissemination of academic ideas to the general public in ways that can sometimes pose a threat to academic freedom. Since academic freedom is a fundamental element of academia and since it benefits society at large, it is important to safeguard it. Among measures that can be taken in order to achieve this goal, the publication of anonymous research seems to be a good option. © 2013 John Wiley & Sons Ltd.

  13. The threat of nuclear war

    International Nuclear Information System (INIS)

    1985-01-01

    This report aims to describe the present threat of nuclear war, with particular reference to New Zealand, and the increasing concern felt by many scientists, from a scientific viewpoint but in non-technical language. It surveys what is known about nuclear weapons and the consequences of their use, and attention is drawn to the importance of penetrating the language and examining the assumptions made in the propaganda about n uclear deterrence . The tasks involved in maintaining the present peace and attempting to establish an agreed disarmament is examined. The report pays particular attention to the roles of scientists in these endeavours

  14. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  15. The energy sector exposed to the cyber-threat

    International Nuclear Information System (INIS)

    Desarnaud, Gabrielle

    2016-01-01

    Technologies of information and communication (TICs) are present at all stages of energy production, transport and distribution, and this development is an opportunity for a better resources allocation, but also makes physical infrastructures more vulnerable to cyber-crime. The example of a cyber-attack against Ukrainian utilities in 2015 showed that this threat is an actual one, and the author outlines how energy companies are particularly vulnerable to these threats for cultural, historical and organisational reasons. Some simulations already assessed the huge costs of a cyber-attack against these infrastructures. The author then discusses the perspective and possibilities of development of a cyber-safety in Europe

  16. Cost and Information Effectiveness Analysis (CIEA): A Methodology for Evaluating a Training Device Operational Readiness Assessment Capability (DORAC).

    Science.gov (United States)

    1981-02-01

    Report 528 COST AIND I*FO•?JidTH ?i EFFECT•• ES1BS ANALYSIS (CDEA): A METiBLOBU Y FOR EVALUATIN1G A TRAINING DEMCE OPERATMDN1AL MAEA3 ],SE 3SSESS$ iElT ...8217, N. Within a military setting, the uses of training devices in performance evaluation have generally mirrored civilian uses and primarily...Technical Report 528 COST AND INFORMATION EFFECTIVENESS ANALYSIS (CIEA): A METHODOLOGY FOR EVALUATING A TRAINING DEVICE OPERATIONAL READINESS

  17. Stereotype threat reduces false recognition when older adults are forewarned.

    Science.gov (United States)

    Wong, Jessica T; Gallo, David A

    2016-01-01

    Exposing older adults to ageing stereotypes can reduce their memory for studied information--a phenomenon attributed to stereotype threat--but little is known about stereotype effects on false memory. Here, we assessed ageing stereotype effects on the Deese-Roediger-McDermott false memory illusion. Older adults studied lists of semantically associated words, and then read a passage about age-related memory decline (threat condition) or an age-neutral passage (control condition). They then took a surprise memory test with a warning to avoid false recognition of non-studied associates. Relative to the control condition, activating stereotype threat reduced the recognition of both studied and non-studied words, implicating a conservative criterion shift for associated test words. These results indicate that stereotype threat can reduce false memory, and they help to clarify mixed results from prior ageing research. Consistent with the regulatory focus hypothesis, threat motivates older adults to respond more conservatively when error-prevention is emphasised at retrieval.

  18. If it bleeds, it leads: separating threat from mere negativity.

    Science.gov (United States)

    Kveraga, Kestutis; Boshyan, Jasmine; Adams, Reginald B; Mote, Jasmine; Betz, Nicole; Ward, Noreen; Hadjikhani, Nouchine; Bar, Moshe; Barrett, Lisa F

    2015-01-01

    Most theories of emotion hold that negative stimuli are threatening and aversive. Yet in everyday experiences some negative sights (e.g. car wrecks) attract curiosity, whereas others repel (e.g. a weapon pointed in our face). To examine the diversity in negative stimuli, we employed four classes of visual images (Direct Threat, Indirect Threat, Merely Negative and Neutral) in a set of behavioral and functional magnetic resonance imaging studies. Participants reliably discriminated between the images, evaluating Direct Threat stimuli most quickly, and Merely Negative images most slowly. Threat images evoked greater and earlier blood oxygen level-dependent (BOLD) activations in the amygdala and periaqueductal gray, structures implicated in representing and responding to the motivational salience of stimuli. Conversely, the Merely Negative images evoked larger BOLD signal in the parahippocampal, retrosplenial, and medial prefrontal cortices, regions which have been implicated in contextual association processing. Ventrolateral as well as medial and lateral orbitofrontal cortices were activated by both threatening and Merely Negative images. In conclusion, negative visual stimuli can repel or attract scrutiny depending on their current threat potential, which is assessed by dynamic shifts in large-scale brain network activity. © The Author (2014). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  19. Benefits of integrating complementarity into priority threat management.

    Science.gov (United States)

    Chadés, Iadine; Nicol, Sam; van Leeuwen, Stephen; Walters, Belinda; Firn, Jennifer; Reeson, Andrew; Martin, Tara G; Carwardine, Josie

    2015-04-01

    Conservation decision tools based on cost-effectiveness analysis are used to assess threat management strategies for improving species persistence. These approaches rank alternative strategies by their benefit to cost ratio but may fail to identify the optimal sets of strategies to implement under limited budgets because they do not account for redundancies. We devised a multiobjective optimization approach in which the complementarity principle is applied to identify the sets of threat management strategies that protect the most species for any budget. We used our approach to prioritize threat management strategies for 53 species of conservation concern in the Pilbara, Australia. We followed a structured elicitation approach to collect information on the benefits and costs of implementing 17 different conservation strategies during a 3-day workshop with 49 stakeholders and experts in the biodiversity, conservation, and management of the Pilbara. We compared the performance of our complementarity priority threat management approach with a current cost-effectiveness ranking approach. A complementary set of 3 strategies: domestic herbivore management, fire management and research, and sanctuaries provided all species with >50% chance of persistence for $4.7 million/year over 20 years. Achieving the same result cost almost twice as much ($9.71 million/year) when strategies were selected by their cost-effectiveness ranks alone. Our results show that complementarity of management benefits has the potential to double the impact of priority threat management approaches. © 2014 Society for Conservation Biology.

  20. Are needs to manage uncertainty and threat associated with political conservatism or ideological extremity?

    Science.gov (United States)

    Jost, John T; Napier, Jaime L; Thorisdottir, Hulda; Gosling, Samuel D; Palfai, Tibor P; Ostafin, Brian

    2007-07-01

    Three studies are conducted to assess the uncertainty- threat model of political conservatism, which posits that psychological needs to manage uncertainty and threat are associated with political orientation. Results from structural equation models provide consistent support for the hypothesis that uncertainty avoidance (e.g., need for order, intolerance of ambiguity, and lack of openness to experience) and threat management (e.g., death anxiety, system threat, and perceptions of a dangerous world) each contributes independently to conservatism (vs. liberalism). No support is obtained for alternative models, which predict that uncertainty and threat management are associated with ideological extremism or extreme forms of conservatism only. Study 3 also reveals that resistance to change fully mediates the association between uncertainty avoidance and conservatism, whereas opposition to equality partially mediates the association between threat and conservatism. Implications for understanding the epistemic and existential bases of political orientation are discussed.